<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Cyber Hygiene Issues in the Naval Security Environment</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2022</style></year></dates><volume><style face="normal" font="default" size="100%">53</style></volume><pages><style face="normal" font="default" size="100%">205-218</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">In the present study, the main characteristics and components of cyber hygiene as a subclass of cybersecurity are discussed. Based on institutional experience in the scope of security in the digital environment, a sequence of activities to keep resilient and reliable cyber hygiene in naval institutions is recommended. Main cyber hygiene definitions are given. Cyber hygiene software issues and institutional information security controls are analyzed. Malware infection as the main cyber hygiene concern is analyzed. Basic cyber hygiene instructions to ensure Internet users stay protected are defined.</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">205</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Analysis of Cybersecurity Issues in the Maritime Industry</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">47</style></volume><pages><style face="normal" font="default" size="100%">27-43</style></pages><abstract><style face="normal" font="default" size="100%">The maritime industry with its main components—port logistics, ships, cargo and container distribution systems, autonomous control and navigation systems, global identification and navigation systems—is a substantial and plausible target of cyberattacks. The goal of the present study is to reveal and de-scribe all components of the shipping industry’s cybersecurity policy, the main types of cyberattacks, methods, means, and stages of implementation, cyber vulnerability assessment of on-board information and communication systems, as well as technological measures for cyber defence.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">27</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Cyber Protection of Critical Infrastructures, Novel Big Data and Artificial Intelligence Solutions</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">47</style></volume><pages><style face="normal" font="default" size="100%">7-10</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This editorial article introduces the reader to the Second International Scientific Conference “Digital Transformation, Cyber Security and Resilience,” DIGILIENCE 2020, and summarises the results from five of its sessions: Protecting Critical Infrastructures from Cyberattacks; Security Implications and Solutions for IoT Systems; Big Data and Artificial Intelligence for Cybersecurity; Secure Communication and Information Protection; and Advanced ICT Security Solutions.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">7</style></section></record></records></xml>