Journal is indexed in following databases:

2022 Journal Impact Factor - 0.6
2022 CiteScore - 1.7




ISSN 2083-6473
ISSN 2083-6481 (electronic version)




Associate Editor
Prof. Tomasz Neumann

Published by
TransNav, Faculty of Navigation
Gdynia Maritime University
3, John Paul II Avenue
81-345 Gdynia, POLAND
Review of Ship Information Security Risks and Safety of Maritime Transportation Issues
1 Odesa National Maritime University, Odessa, Ukraine
2 National University “Odessa Maritime Academy”, Odessa, Ukraine
3 Admiral Makarov National University of Shipbuilding, Mykolaiv, Ukraine
Times cited (SCOPUS): 3
ABSTRACT: In recent years, various types of commerce including transport have suffered significant damage and costs due to cyber-attacks. The geographic scope of freight transportation has no boundaries, attacks can be launched almost anywhere there is an Internet connection. Therefore, there is no immunity from the failure of computer systems and information of delivery processes in the networks of organizations and companies engaged in maritime transportation. In addition, while the consequences of cyber-attacks on major shipping lines and ports, as well as the digital systems of logistics companies, can be comprehensively analyzed, the vulnerability of ships remains insufficiently studied. This paper offers an analysis of the risks in the field of maritime freight transport and the main factors of influence such as digitization on the safety of the transport process. The basic threats to the information system of the ship are defined and the techniques of risk analysis for the ship information security is proposed.
S. Reidy, “The basics that everyone must know about cargo damage”, Arviem (2020). Available at:
Information technology. Methods of ensuring security. Information security management systems. Requirements ISO/IEC 27001, Standartinform (2006), 54 p.
Risk management guide for information technology systems. Recommendations of the National Institute of Standards and Technology, NIST 800-30 (2002), 56 p.
E. Legchekova & O. Titov, “The method of information security risk calculation. Gomel”, BTEU (2017).
O. Melnyk, S. Onyshchenko, O. Onishchenko, O. Lohinov & V. Ocheretna, “Integral approach to vulnerability assessment of ship’s critical equipment and systems”, Transactions on Maritime Science (2023), 12(1).
ISO/IEC 27035, Information technology, Security techniques, Information security incident management, (2011) 78 p.
Information security standard BS ISO/IEC 27001:2005 (BS 7799-2:2005) Information security management.
Common cyber-security vulnerabilities in ships, Hatteland technology. Available at:
The Guidelines on Cyber Security Onboard Ships (BIMCO). The Guidelines on Cyber Security onboard Ships, Version 4.
Keeping cargo moving: Maritime Cybersecurity, Security Practitioner Insights. Webinar series (2016).
Y.C. Lee, S.K. Park, W.K. Lee, & J. Kang, “Improving cyber security awareness in maritime transport: A way forward”, Journal of the Korean Society of Marine Engineering (2017), 41. pp. 738-745. - doi:10.5916/jkosme.2017.41.8.738
P.S. Seemma & Sundaresan, Nandhini & M, Sowmiya, “Overview of Cyber Security”, IJARCCE (2018), 7, pp. 125-128. - doi:10.17148/IJARCCE.2018.71127
G. Srikanth & S. Kandukuri, “CyberSecurity Trends in Information Technology and Emerging Future Threats”, Conference: Recent Trends in Computer Science and Information Technology”, (ICRCSIT–2020).
V. Filinovych, & Z. Hu, “Aviation and the Cybersecurity Threats”, Conference: International Conference on Business, Accounting, Management, Banking, Economic Security and Legal Regulation Research (BAMBEL 2021). - doi:10.2991/aebmr.k.210826.021
A. Sharma, A. Tyagi, & M. Bhardwaj, “Analysis of techniques and attacking pattern in cyber security approach: A survey”, International journal of health sciences (2022), pp. 13779-13798. - doi:10.53730/ijhs.v6nS2.8625
U. Singh & P. Singh, “Managing Cyber Security. Journal of Management and Service Science”, (JMSS), (2022), 2. pp. 1-10. - doi:10.54060/JMSS/002.01.002
T. Lamba & S. Kandwal, “Global Outlook of Cyber Security”, Third International Conference on Information Management and Machine Intelligence (2022), pp. 269-276. - doi:10.1007/978-981-19-2065-3_30
M. Lehto, “Cyber Security in Aviation, Maritime and Automotive”, In book: Computation and Big Data for Transport (2022).
R. Bolz, M. Rumez, F. Sommer, J. Dürrwang & R. Kriesten, “Enhancement of Cyber Security for Cyber Physical Systems in the Automotive Field Through Attack Analysis”, In book: embedded world Conference 2020 Proceedings.
Information Security in Logistics and Transportation, Tadviser (2020). Available at
Visualization of the maritime transportation market. Interlegal. Available at:
S. Chan, E. Yehuda, R. Schaefer, A. Schneuwly, S. Zicherman, S. Deutscher, & O. Klier, “Navigating Rising Cyber Risks in Transportation and Logistics”, Boston Consulting Group (2021).
O. Melnyk, Y. Bychkovsky & A. Voloshyn, “Maritime situational awareness as a key measure for safe ship operation”, Scientific Journal of Silesian University of Technology. Series Transport (2022), 114, pp. 91 - 101. - doi:10.20858/sjsutst.2022.114.8
S. Onyshсhenko & O. Melnyk, “Probabilistic Assessment Method of Hydrometeorological Conditions and their Impact on the Efficiency of Ship Operation”, Journal of Engineering Science and Technology Review (2021), 14 (6), pp. 132 – 136. - doi:10.25103/jestr.146.15
I. Burmaka, I. Vorokhobin, O. Melnyk, O. Burmaka & S. Sagin, “Method of Prompt Evasive Manuever Selection to Alter Ship's Course or Speed”, Transactions on Maritime Science (2022), 11 (1), pp. 1 – 9. - doi:10.7225/toms.v11.n01.w01
N. Malaksiano, “On the stability of economic indicators of complex port equipment usage”, Actual Problems of Economics (2012), 138(12), pp. 226–233.
I. Lapkina, M. Malaksiano & M. Malaksiano, “Optimization of the structure of sea port equipment fleet under unbalanced load”, Actual Problems of Economics (2016), 183(9), pp. 364–371.
A. Weintrit, T. Neumann, T. Safety of marine transport introduction. Safety of marine transport: Marine navigation and safety of sea transportation (2015) (pp. 1-4) doi:10.1201/b18515 - doi:10.1201/b18515
Y. Kirillova & Y. Meleshenko, “Development of an economic and mathematical model of loading a freight and passenger ferry”, Eastern-European Journal of Enterprise Technologies (2016), 3 (4-81), pp. 28 - 37. - doi:10.15587/1729-4061.2016.71215
E. Kirillova, “Justification of stability ranges of commercially reasonable, allowable loss-making and crisis operation of the vessel”, Eastern-European Journal of Enterprise Technologies (2015), 6 (3), pp. 4 – 10. - doi:10.15587/1729-4061.2015.55007
O. Drozhzhyn, Y. Koskina & I. Tykhonina, “Liner shipping”: The evolution of the concept, Pomorstvo (2021), 35 (2), pp. 365 – 371. - doi:10.31217/p.35.2.18
O. Drozhzhyn & Y. Koskina, “The model of container feeder line organization focused on the nature and parameters of external container flows”, Communications - Scientific Letters of the University of Žilina (2021), 23 (2), pp. A94 - A102. - doi:10.26552/com.C.2021.2.A94-A102
Citation note:
Melnyk O., Onyshchenko S., Onishchenko O., Shumylo O., Voloshyn A., Koskina Y., Volianska Y.: Review of Ship Information Security Risks and Safety of Maritime Transportation Issues. TransNav, the International Journal on Marine Navigation and Safety of Sea Transportation, Vol. 16, No. 4, doi:10.12716/1001.16.04.13, pp. 717-722, 2022
Authors in other databases:
Oleksandr Shumylo:
Andrii Voloshyn:
Yana Volianska:

Other publications of authors:

O. Onishchenko, K. Shumilova, S. Volyanskyy, Y. Volyanskaya, Y. Volianskyi
O. Melnyk, O. Onishchenko, S. Onyshchenko, A. Voloshyn, Y. Kalinichenko, O. Rossomakha, G. Naleva, O. Rossomakha
O. Melnyk, O. Onishchenko, S. Onyshchenko, V. Golikov, V. Sapiha, O. Shcherbina, V. Andrievska

File downloaded 175 times

Important: cookie usage
The website uses certain cookies. A cookie is a text-only string of information that the TransNav.EU website transfers to the cookie file of the browser on your computer. Cookies allow the website to perform properly and remember your browsing history. Cookies also help a website to arrange content to match your preferred interests more quickly. Cookies alone cannot be used to identify you.
Akceptuję pliki cookies z tej strony