Author:
Thomas Godwin,Sule Mary-Jane
Abstract
PurposeThis paper proposes a holistic, proactive and adaptive approach to cybersecurity from a service lens, given the continuously evolving cyber-attack techniques, threat and vulnerability landscape that often overshadow existing cybersecurity approaches.Design/methodology/approachThrough an extensive literature review of relevant concepts and analysis of existing cybersecurity frameworks, standards and best practices, a logical argument is made to produce a dynamic end-to-end cybersecurity service system model.FindingsCyberspace has provided great value for businesses and individuals. The COVID-19 pandemic has significantly motivated the move to cyberspace by organizations. However, the extension to cyberspace comes with additional risks as traditional protection techniques are insufficient and isolated, generally focused on an organization's perimeter with little attention to what is out there. More so, cyberattacks continue to grow in complexity creating overwhelming consequences. Existing cybersecurity approaches and best practices are limited in scope, and implementation strategies, differing in strength and focus, at different levels of granularity. Nevertheless, the need for a proactive, adaptive and responsive cybersecurity solution is recognized.Originality/valueThis paper presents a model that promises proactive, adaptive and responsive end-to-end cybersecurity. The proposed cybersecurity continuity and management model premised on a service system, leveraging on lessons learned from existing solutions, takes a holistic analytical view of service activities from source (service provider) to destination (Customer) to ensure end-to-end security, whether internally (within an organization) or externally.
Reference51 articles.
1. Integration of ITIL V3, ISO 20000 and ISO 27001: 2013 for IT services and security management system;International Journal of Advanced Trends in Computer Science and Engineering,2020
2. Service system fundamentals: work system, value chain, and life cycle;IBM Systems Journal,2008
3. Defining information systems as work systems: implications for the IS field. European;Journal of Information Systems,2008
4. Viewing systems as services: a fresh approach in the IS field;Communications of the Association for Information Systems,2010
5. Work system theory: overview of core concepts, extensions, and challenges for the future;Journal of the Association for Information Systems,2013
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Securing the Supply Chain;Advances in Information Security, Privacy, and Ethics;2024-02-02
2. Adaptive AI for Dynamic Cybersecurity Systems;Advances in Computational Intelligence and Robotics;2023-12-29
3. Relevance and Applicability of Cybersecurity Frameworks in the Context of BFSI Vertical in India;2023 International Conference on Integrated Intelligence and Communication Systems (ICIICS);2023-11-24
4. Mitigating cybercrimes in an evolving organizational landscape;Continuity & Resilience Review;2023-03-21