Cybersecurity and Strategic Management
PDF (Русский)
PDF

Keywords

strategic management
intelligence
risk management
сybersecurity
bibliometrics analysis

How to Cite

GunawanB., RatmonoB. M., & AbdullahA. G. (2023). Cybersecurity and Strategic Management. Foresight and STI Governance, 17(3), 88-97. https://doi.org/10.17323/2500-2597.2023.3.88.97

Abstract

Against the backdrop of rapidly evolving technologies and increasingly complex communications networks, cybersecurity is becoming a key aspect of strategic planning. Protecting information, financial, reputational and other assets from increasingly frequent and sophisticated cyberattacks depends on the ability to develop and continually update a comprehensive, proactive approach that takes into account a wide range of factors. The state of national cybersecurity has become one of the key indicators of the level of development along with «classic» indicators (GDP, etc.). The recently emerged research area of «cybersecurity economics» is constantly being enriched with new knowledge and approaches.The article analyzes the risks to the cybersecurity system at different levels and the main measures to strengthen it, and assesses the dynamics of management trends. Key competencies relevant for professionals in this field are outlined.

https://doi.org/10.17323/2500-2597.2023.3.88.97
PDF (Русский)
PDF

References

Aghajani G., Ghadimi N. (2018) Multi-Objective Energy Management in a Micro-Grid. Energy Reports, 4, 218-225. 10. DOI: https://doi.org/10.1016/j.egyr.2017.10.002

AlDaajeh S., Saleous H., Alrabaee S., Barka E., Breitinger F., Choo K.K.R. (2022) The Role of National Cybersecurity Strategies on the Improvement of Cybersecurity Education. Computers and Security, 119, 102754. DOI: https://doi.org/10.1016/j.cose.2022.102754

Alahmari A., Duncan B. (2020) Cybersecurity Risk Management in Small and Medium-Sized Enterprises: A Systematic Review of Recent Evidence. Paper presented at the 2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment, Cyber SA 2020, 15-19 June 2020, Dublin, Ireland). DOI: https://doi.org/10.1109/CyberSA49311.2020.9139638

Alsharif M., Mishra S., AlShehri M. (2021) Impact of Human Vulnerabilities on Cybersecurity. Computer Systems Science and Engineering, 40(3), 1153-66. DOI: https://doi.org/10.32604/CSSE.2022.019938

Alsuliman F., Bhattacharyya S., Slhoub K., Nur N., Chambers C.N. (2022) Social Media vs. News Platforms: A Cross-Analysis for Fake News Detection Using Web Scraping and NLP. In: PETRA'22: Proceedings of the 15th International Conference on PErvasive Technologies Related to Assistive Environments, June 2022, pp. 190-196. DOI: https://doi.org/10.1145/3529190.3534755190-96

Amir M., Givargis T. (2020) Pareto Optimal Design Space Exploration of Cyber-Physical Systems. Internet of Things,12, 100308. DOI: https://doi.org/10.1016/j.iot.2020.100308

Carayannis E.G., Grigoroudis E., Rehman S.S., Samarakoon N. (2021) Ambidextrous Cybersecurity: The Seven Pillars (7Ps) of Cyber Resilience. IEEE Transactions on Engineering Management, 68(1), 223-34. DOI: https://doi.org/10.1109/TEM.2019.2909909

Carr M. (2016) Public Private Partnerships in India. International Affairs, 92(1), 43-62.

Catota F.E., Granger M.M., Sicker D.C. (2019) Cybersecurity Education in a Developing Nation: The Ecuadorian Environment. Journal of Cybersecurity, 5(1), 1-19. DOI: https://doi.org/10.1093/cybsec/tyz001

De Soto B.G., Georgescu A., Mantha B., Turk Z., Maciel A., Sonkor S.M. (2022) Construction Cybersecurity and Critical Infrastructure Protection: New Horizons for Construction 4.0. Journal of Information Technology in Construction, 27, 571-594. DOI: https://doi.org/10.36680/j.itcon.2022.028

Dhawan S.M., Gupta B.M., Elango B. (2021) Global Cyber Security Research Output (1998-2019): A Scientometric Analysis. Science and Technology Libraries, 40(2), 172-189. DOI: https://doi.org/10.1080/0194262X.2020.1840487

Falagas M.E., Pitsouni E.I., Malietzis G.A., Pappas G. (2008) Comparison of PubMed, Scopus, Web of Science, and Google Scholar: Strengths and Weaknesses. The FASEB Journal, 22(2), 338-342. DOI: https://doi.org/10.1096/fj.07-9492lsf

Firoozjaei M.D., Mahmoudyar N., Baseri Y., Ghorbani A.A. (2022) An Evaluation Framework for Industrial Control System Cyber Incidents. International Journal of Critical Infrastructure Protection, 36(C), 100487. DOI: https://doi.org/10.1016/j.ijcip.2021.100487

Furnell S., Bishop M. (2020) Addressing Cyber Security Skills: The Spectrum, Not the Silo. Computer Fraud and Security, 2020(2), 6-11. DOI: https://doi.org/10.1016/S1361-3723(20)30017-8

Gratian M., Bandi S., Cukier M., Dykstra J., Ginther A. (2018) Correlating Human Traits and Cyber Security Behavior Intentions. Computers and Security, 73, 345-358. DOI: https://doi.org/10.1016/j.cose.2017.11.015

Hautamaki J., Kokkonen T. (2020) Model for Cyber Security Information Sharing in Healthcare Sector. Paper presented at the 2nd International Conference on Electrical, Communication and Computer Engineering, ICECCE 2020, June 12-13, Istanbul, Turkey. DOI: https://doi.org/10.1109/ICECCE49384.2020.9179175

Härtel J.C.R., Härtel C.E.J. (2022) What the Digital Age Is and Means for Workers, Services, and Emotions Scholars and Practitioners. Research on Emotion in Organizations, 16, 9-17. DOI: https://doi.org/10.1108/S1746-979120200000016003

Isa S.M., Nico G., Permana M. (2022) Indobert for Indonesian Fake News Detection. ICIC Express Letters, 16(3), 289-297. DOI: https://doi.org/10.24507/icicel.16.03.289

Jentzsch N. (2018) State-of-the-Art of the Economics of Cyber-Security and Privacy (IPACSO Deliverable D4.1). DOI: https://doi.org/10.2139/ssrn.2671291

Jiang L., Jayatilaka A., Nasim M., Grobler M., Zahedi M., Ali Babar M. (2022) Systematic Literature Review on Cyber Situational Awareness Visualizations. IEEE Access, 10, 57525-57554. DOI: https://doi.org/10.1109/access.2022.3178195

Katsikeas S., Johnson P., Ekstedt M., Lagerström R. (2021) Research Communities in Cyber Security: A Comprehensive Literature Review. Computer Science Review, 42, 100431. DOI: https://doi.org/10.1016/j.cosrev.2021.100431

Kharchenko V., Dotsenko S., Illiashenko O., Kamenskyi S. (2019) Integrated Cyber Safety Security Management System: Industry 4.0 Issue. In: Conference Proceedings of 2019 10th International Conference on Dependable Systems, Services and Technologies, DESSERT 2019, June 5-7, pp. 197-201. DOI: https://doi.org/10.1109/DESSERT.2019.8770010

Kopotun I., Nikitin A., Dombrovan N., Tulinov V., Kyslenko D. (2020) Expanding the Potential of the Preventive and Law Enforcement Function of the Security Police in Combating Cybercrime in Ukraine and the EU. TEM Journal, 9(2), 460-468. DOI: https://doi.org/10.18421/TEM92-06

Kure H.I., Islam S., Abdur Razzaque M. (2018) An Integrated Cyber Security Risk Management Approach for a Cyber-Physical System. Applied Sciences (Switzerland), 8(6), 8060898. DOI: https://doi.org/10.3390/app8060898

Li Y., Liu Q. (2021) A Comprehensive Review Study of Cyber-Attacks and Cyber Security. Emerging Trends and Recent Developments. Energy Reports, 7, 8176-8186. DOI: https://doi.org/10.1016/j.egyr.2021.08.126

Limba T., Plėta T., Agafonov K., Damkus M. (2017) Cyber security management model for critical infrastructure. Entrepreneurship and Sustainability Issues, 4(4), 559-573. DOI: https://doi.org/10.9770/jesi.2017.4.4(12)

Mantha B.R.K., de Soto B.G. (2021) Assessment of the Cybersecurity Vulnerability of Construction Networks. Engineering, Construction and Architectural Management, 28(10), 3078-3105. DOI: https://doi.org/10.1108/ECAM-06-2020-0400

Marcantoni M., Jayawardhana B., Perez Chaher M., Bunte K. (2022) Secure Formation Control via Edge Computing Enabled by Fully Homomorphic Encryption and Mixed Uniform-Logarithmic Quantization. IEEE Control Systems Letters, 7, 395-400. DOI: https://doi.org/10.1109/LCSYS.2022.3188944

McEvoy R., Kowalski S. (2019) Cassandra's Calling Card: Socio-Technical Risk Analysis and Management in Cyber Security Systems. In: CEUR Workshop Proceedings, vol. 2398, pp. 65-80.

Michalec O., Milyaeva S., Rashid A. (2022) When the Future Meets the Past: Can Safety and Cyber Security Coexist in Modern Critical Infrastructures? Big Data & Society, 9(1), 205395172211083. DOI: https://doi.org/10.1177/20539517221108369

Mitrofanova A., Konovalova V., Mitrofanova E., Ashurbekov R., Trubitsyn T. (2017) Human Resource Risk Management in Organization: Methodological Aspect. Paper presented at the International Conference on Trends of Technologies and Innovations in Economic and Social Studies 2017. DOI: https://doi.org/10.2991/ttiess-17.2017.114

Mongeon P., Paul-Hus A. (2016) The Journal Coverage of Web of Science and Scopus: A Comparative Analysis. Scientometrics, 106(1), 213-228. DOI: https://doi.org/10.1007/s11192-015-1765-5

Morgan P.L., Collins E.I.M., Spiliotopoulos T., Greeno D.J, Jones D.M. (2022) Reducing Risk to Security and Privacy in the Selection of Trigger-Action Rules: Implicit vs. Explicit Priming for Domestic Smart Devices. International Journal of Human - Computer Studies, 168, 102902. DOI: https://doi.org/10.1016/j.ijhcs.2022.102902

Mouti S., Kumar S., Althubiti S.A., Altaf M., Alenezi F., Arumugam M. (2022) Cyber Security Risk Management with Attack Detection Frameworks Using Multi Connect Variational Auto-Encoder with Probabilistic Bayesian Networks. Computers and Electrical Engineering, 103, 108308. DOI: https://doi.org/10.1016/j.compeleceng.2022.108308

Pollini A., Callari T.C., Tedeschi A., Ruscio D., Save L., Chiarugi F., Guerri D. (2022) Leveraging Human Factors in Cybersecurity: An Integrated Methodological Approach. Cognition, Technology and Work, 24(2), 371-390. DOI: https://doi.org/10.1007/s10111-021-00683-y

Qi A., Shao G., Zheng W. (2018) Assessing China's Cybersecurity Law. Computer Law and Security Review, 34(6),1342-1354. DOI: https://doi.org/10.1016/j.clsr.2018.08.007

Quincozes S.E., Mosse D., Passos D., Albuquerque C., Ochi L.S., Dos Santos V.F. (2022) On the Performance of GRASP-Based Feature Selection for CPS Intrusion Detection. IEEE Transactions on Network and Service Management, 19(1), 614-626. DOI: https://doi.org/10.1109/TNSM.2021.3088763

Rajan R., Rana N.P., Parameswar N., Dhir S., Sushil S., Dwivedi Y.K. (2021) Developing a Modified Total Interpretive Structural Model (M-TISM) for Organizational Strategic Cybersecurity Management. Technological Forecasting and Social Change, 170, 120872. DOI: https://doi.org/10.1016/j.techfore.2021.120872

Rosado D.G., Santos-Olmo A., Sánchez L.E., Serrano M.A., Blanco C., Mouratidis H., Fernández-Medina E. (2022) Managing Cybersecurity Risks of Cyber-Physical Systems: The MARISMA-CPS Pattern. Computers in Industry, 142, 103715. DOI: https://doi.org/10.1016/j.compind.2022.103715

Scanlan J., Thomas T., Tan T., Chen Y.P., Watters P.A., Fieldhouse M., Fung L., Girdler S. (2020) Neurodiverse Knowledge, Skills and Ability Assessment for Cyber Security. Paper presented at the Australasian Conference on Information Systems 2020, Wellington. https://www.researchgate.net/publication/350964865_Neurodiverse_Knowledge_Skills_and_Ability_Assessment_for_Cyber_Security, дата обращения 19.04.2023.

Sobb T., Turnbull B., Moustafa N. (2020) Supply Chain 4.0: A Survey of Cyber Security Challenges, Solutions and Future Directions. Electronics (Switzerland), 9(11), 9111864. DOI: https://doi.org/10.3390/electronics9111864

Watanabe K. (2019) PPP (Public-Private Partnership)-Based Cyber Resilience Enhancement Efforts for National Critical Infrastructures Protection in Japan. In: Critical Information Infrastructures Security (Proceedings of the 13th International Conference, CRITIS 2018, Kaunas, Lithuania, September 24-26, 2018), Heidelberg, Dordrecht, London, New York: Springer, pp. 169-178. DOI: https://doi.org/10.1007/978-3-030-05849-4_13

Zyoud H., Fuchs-Hanusch D. (2017) A bibliometric-based survey on AHP and TOPSIS techniques. Expert Systems with Applications, 78, 158-181. DOI: https://doi.org/10.1016/j.eswa.2017.02.016

Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 International License.

Downloads

Download data is not yet available.