References
[1] Weimann, G. (2004, December). Cyber-terrorism: How real is the threat? United States Institute of Peace, Special Report No. 119. Available at https://shorturl.at/ektIO
[2] El Bahi, R. (2019, September 30). Cyber terrorism: Concept, characteristics, and patterns. Egyptian Center for Strategic Studies. Available at https://ecss.com.eg/7141/
[3] Zerzri, M. (2017). The threat of cyber terrorism and recommendations for countermeasures. C·A· Perspectives on Tunisia, No. 4. Available at https://shorturl.at/uwIMR
[4] Wigan Council. (n.d.). Cyber terrorism. Available at https://shorturl.at/ewRS7
[5] Achkoski, J., & Dojchinovski, M. (2012, June 9). Cyber terrorism and cyber crime – Threats for cyber security. In Proceedings of the First Annual International Scientific Conference. MIT University–Skopje, Makedonski Brod, Macedonia. Available at https://shorturl.at/oEJU0
[6] Charvat, J. P. I. A. G. (2009). Cyber terrorism: A new dimension in battlespace. The Virtual Battlefield: Perspectives on Cyber Warfare, (3), 77–87.
[7] Dogrul, M., Aslan, A., & Celik, E. (2011). Developing an international cooperation on cyber defense and deterrence against cyber terrorism. In 3rd International Conference on Cyber Conflict (p. 10). Tallinn, Estonia.
[8] Tawfiq, S. (2025). The role of the Great Arab Revolt in shaping Jordanian national identity. Al-Biruni Journal of Humanities and Social Sciences, 3(6). https://doi.org/10.64440/BIRUNI/BIR002
[9] Grabosky, P. (2006). Computer crimes: Global dimensions. In Internet Networks and Their Social and Security Impacts (p. 338). General Directorate of Abu Dhabi Police, Center for Security Research and Studies.
[10] Alcaide, J. I., & Llave, R. G. (2020). Critical infrastructures cybersecurity and the maritime sector. Transportation Research Procedia, 45, 547–554.
[11] Fell, J. (2015). Mayflower tribute set to sail unmanned [automated marine transport]. Engineering & Technology, 10, 42–44.
[12] Ben Farah, M. A., Ukwandu, E., Hindy, H., Brosset, D., Bures, M., Andonovic, I., & Bellekens, X. (2022). Cybersecurity in the maritime industry: A systematic survey of recent advances and future trends. Information, 13, 22.
[13] Almarabeh, H., & Sulieman, A. (2019). The impact of cyber threats on social networking sites. International Journal of Advanced Research in Computer Science, 10(2).
[14] Ghelani, D. (2022). Cyber security, cyber threats, implications, and future perspectives: A review. Authorea Preprints.
[15] Abouyounes, M. W. A. (2025). The legal underpinnings of Jordanian and Iraqi law's administrative penalty systems. Al-Biruni Journal of Humanities and Social Sciences, 3(9). https://doi.org/10.64440/BIRUNI/BIR003
[16] Polikarovskykh, O., Daus, Y., Larin, D., & Tkachenko, M. (2023). Systematization of cyber threats in maritime transport. Security of Infocommunication Systems and Internet of Things, 1(1), 01008–01008.
[17] Simola, J., & Pöyhönen, J. (2022, March). Emerging cyber risk challenges in maritime transportation. In International Conference on Cyber Warfare and Security (Vol. 17, No. 1, pp. 306–314).
[18] Metalla, O., Golgota, A., Pupa, K. S., Ndokaj, E., Beqiraj, P., Thana, E., & Çerma, U. (2023). Cyber security in the maritime transport. Interdisciplinary Journal of Research and Development, 10(2), 74–74.
[19] Silgado, D. M. (2018). Cyber-attacks: A digital threat reality affecting the maritime industry.
[20] Melnyk, O., Onyshchenko, S., Onishchenko, O., Shumylo, O., Voloshyn, A., Koskina, Y., & Volianska, Y. (2022). Review of ship information security risks and safety of maritime transportation issues. TransNav: International Journal on Marine Navigation and Safety of Sea Transportation, 16.
[21] Ashraf, I., Park, Y., Hur, S., Kim, S. W., Alroobaea, R., Zikria, Y. B., & Nosheen, S. (2022). A survey on cyber security threats in IoT-enabled maritime industry. IEEE Transactions on Intelligent Transportation Systems, 24(2), 2677–2690.
[22] Simola, J., & Pöyhönen, J. (2022, March). Emerging cyber risk challenges in maritime transportation. In International Conference on Cyber Warfare and Security (Vol. 17, No. 1, pp. 306–314).
[23] Lagouvardou, S. (2018). Maritime cyber security: Concepts, problems, and models. Kongens Lyngby, Copenhagen.
[24] Ahmad, R. W., Hasan, H., Jayaraman, R., Salah, K., & Omar, M. (2021). Blockchain applications and architectures for port operations and logistics management. Research in Transportation Business & Management, 41, 100620.
[25] Bechtsis, D., Tsolakis, N., Bizakis, A., & Vlachos, D. (2019). A blockchain framework for containerized food supply chains. In Computer Aided Chemical Engineering (Vol. 46, pp. 1369–1374). Elsevier, Amsterdam, The Netherlands.