Journals Books 2687-5527
Latest Issue Archive Future Issues About Us
Conference Proceedings

SETSCI - Volume 3 (2018)
ISAS2018-Winter - 2nd International Symposium on Innovative Approaches in Scientific Studies, Samsun, Turkey, Nov 30, 2018

Cyber Terrorism Risk at Ports and Organizational Management Process in Application of Security Plan
Mehmet Sıtkı Saygılı1*, Ahmet Naci Ünal2
1Bahçeşehir University, İstanbul, Turkey
2Bahçeşehir University, İstanbul, Turkey
* Corresponding author:
Published Date: 2019-01-14   |   Page (s): 246-251   |    314     12

ABSTRACT About 90% of world trade in transportation of goods is conducted via maritime transportation. An important
operation area of maritime cargo transportation is ports. It is necessary to keep these ports secure where information and
communication technologies are utilized widely. In terms of security, one of the security parameters is cyber space. Utilization
of information and communication technologies at ports brings about various security flaws for cyber attacks. One of the risks
led by the deficits is terrorist actions carried out by cyber attacks. Today, risk of cyber terrorism has been increasing gradually
and companies which are aware of the threat work on necessary measures. In this study, cyber terrorism threat at ports is
analyzed; also measures to be taken for prevention or decrease of risks, and application process in port organization structure
are evaluated. In this study, literature review was conducted. Also, evaluations were conducted as a result of interviews with
information technologies and security specialists of ports.  
KEYWORDS Maritime Transportation, Port Management, Cyber Terrorism, Security, Risk Management
REFERENCES [1] Z. Ş. Öğüz, “Güvenli yönetim sisteminin donatanın yükle ilgililere karşı sorumsuz olduğu haller üzerindeki etkisi,” İstanbul Üniversitesi Hukuk Fakültesi Mecmuası, vol. LXI, pp. 327-337, 2003.
[2] S., Clarke. (2015) Risk Insights Ports and Terminals: The Growing Threat of Cyber Risks. [Online]. Available:
[3] A. N. Ünal, Siber Güvenlik ve Elektronik Bileşenleri, İstanbul, Turkey: Nobel, 2015.
[4] D. C. Alexander, “Cyber threats against the north atlantic treaty organization (NATO) and selected responses,” İGÜ Sosyal Bilimler Dergisi, Vol 1, pp. 1-36, Oct. 2014.
[5] K. Geers, Strategic Cyber Security, Tallin, Estonia: CCD-COE, 2011.
[6] Information technology - Security techniques - Guidelines for cybersecurity, ISO/IEC 27032:2012(E), 2012.
[7] F. Wamala, “The ITU National Cyber Security Strategy Guide,” International Telecommunication Union, Geneva, 2012.
[8] S. Ruffle and T. Evan, “Cyber terrorism: assessment of the threat to insurance,” Univ. of Cambridge, Cambridge, UK, 2017.
[9] D. Bieda and L. Halawi, “Cyberspace avenue for terrorism,” Issues in Information Systems, vol. 16 (3), pp. 33-42, 2015.
[10] M. Convay, “Cyberterrorism: the story so far,” Journal of Informationn Warfare, vol. 2 (2), pp. 33-42, 2003.
[11] G. Weimann, Terror on the Internet: The New Arena, the New Challenges, Washington, DC: United States Institute of Peace Press, 2006.
[12] J. White, Terrorism: An Introduction, Pacific Grove, CA: Brooks/Cole, 1991.
[13] S. Goodman, J. C. Kirk, M. H. Kirk, “Cyberspace as a medium for terrorists,” Technological Forecasting & Social Change, vol. 74 (2), pp. 193-210, Feb. 2007.
[14] M. Zerzri, “The Threat of Cyber Terrorism and Recommendations for Countermeasures,” Center for Applied Policy Research (CAP) Perspectives on Tunisia, No. 04-2017, 2017.
[15] B. Collin, “The future of cyberterrorism: the physical and virtual worlds converge,” Crime & Justice International, vol. 13 (2), pp. 15-18, Mach 1997.
[16] P.W. Brunst, A War on Terror? The European Stance on a New Threat, Changing Laws and Human Rights Implications: Terrorism and the Internet: New Threats Posed by Cyberterrorism and Terrorist Use of the Internet, M. Wade and A. Maljevic, Ed., London, UK: Springer, 2009.
[17] K. C. Desouza and T. Hensgen, “Semiotic emergent framework to address the reality of cyberterrorism,” Technological Forecasting and Social Change, vol. 70 (4), pp. 385-396, May 2003.
[18] S. Gordon and R. Ford, “Cyberterrorism,” Computer & Security, vol. 21 (7), pp. 636-647, Nov. 2002.
[19] D. E. Denning, “Cyberterrorism,” Global Dialog, vol. 2 (4), pp. 29- 37, Autumn 2000.
[20] Ali Polat, Uluslararası Ticarette Risk Yönetimi, İstanbul, Türkiye: İTO Yayınları, 2008.
[21] M. Yorulmaz and S. Birgün, “Lojistik yetenekler üzerine literatür araştırması ve deniz ulaştırma lojistiği hizmet yeteneklerinin belirlenmesi,” The Journal of Academic Social Science, vol. 4 (25), pp. 313-331, March 2016.
[22] UBAK. (2013) Ulaştırma Denizcilik ve Haberleşme Bakanlığı Ulusal Siber Güvenlik Stratejisi ve 2013-2014 Eylem Planı. [Online].
Available: ents%2FSayfalar%2FBTDNewFolder%2FSiber+G%C3%BCvenlik%2F2_1_Strateji+Eylem+Plan%C4%B1+2013-2014.pdf
[23] W. Price, “Reducing the risk of terror events at seaports,” Review of Policy Research, vol. 21 (3), pp. 329-349, 2004.
[24] P. Burnson, “Defining threats finding solutions for cyber attacks,” Logistics Management, vol. 54 (7), pp. 46-50, June 2015.
[25] A. Ekşi, “KBRN terörizminde risk değerlendirmesi ve yönetimi,” Uluslararası Sosyal Araştırmalar Dergisi, vol. 9 (42), pp. 1489-1498, Feb. 2016.
[26] P. T. Leach. (2015) Marine insurers worry about their ability to meet obligations if catastrophe strikes a mega vessel. [Online]. Available:
[27] IMO. (2002) Guidelines for the Onboard Operational Use of Shipborne Automatic Identification System. [Online]. Available:
[28] M. Dwyer, “Cybercrime - is it a threat to Australia's marine industry,” Austmarine Magazine, vol. 37 (7), p. 22, June 2015.
[29] J. S. Szyliowicz, “International transportation security,” Review of Policy Research, vol. 21 (3), pp. 351-368, May 2004.
[30] D. Walsh, “Maritime Cyber Security: Shoal Water Ahead,” U.S. Naval Institute Proceedings Magazine, vol. 141 (7), p. 88, 2105.
[31] M. G. Burns, Logistics and Transportation Security A Strategic Tactical and Operational Guide to Resilience, Boca Raton, FL: CRC Press, 2016.
[32] Ş. Aydeniz, İşletmelerde Gelecek ve Opsiyon Sözleşmeleri ile Risk Yönetimi, İstanbul, Turkey: Arıkan, 2008.
[33] J. Arvai and L. Rivers, Effective Risk Communication, New York, NY: Routledge, 2014.
[34] UBAK. (2015) 2016-2019 Ulusal Siber Güvenlik Stratejisi. [Online]. Available:
[35] J. Luo, Y. Wu and A. B. Mendes, “Modelling of integrated vehicle scheduling and container storage problems in unloading process at an automated container terminal,” Elsevier Computers and Industrial Engineering, vol. 94, pp. 32-44, 2016.
[36] IMO, ISPS Code 2003 Edition, London, UK: IMO Publications, 2003.
[37] A. G. Bermejo. (2015) Maritime cyber security using ISPS and ISM codes. [Online]. Available: .cfm
[38] İ. Akat, G. Budak and G. Budak, İşletme Yönetimi, İzmir, Turkey: Barış, 1999.
[39] T. Koçel, İşletme Yöneticiliği, 16th ed., İstanbul, Turkey: Beta, 2015.
[40] C. Çetin and L. Arslan, Temel İşletmecilik, 6th ed., İstanbul, Turkey: Beta, 2016.
[41] H. Kişi, R. Fışkın, E. Uçan, C. Şakar, E. Çakır, A. Y. Kaya and T. A. Gülcan, “Limanlarda operasyonel planlama: Türk limanlarının mevcut
durumu üzerine bir çalışma,” Journal of ETA Maritime Science, vol. 3 (1), pp. 37-46, 2015.
[42] B.J.Thomas, UNCTAD Monographs on Port Management, Cardiff, Galler: United Nations, 1985.

SET Technology - Turkey

eISSN  : 2687-5527    

E-mail :
+90 533 2245325

Tokat Technology Development Zone Gaziosmanpaşa University Taşlıçiftlik Campus, 60240 TOKAT-TURKEY
©2018 SET Technology