Affiliation:
1. College of Engineering and Information Technology, Surigao del Norte State University, Surigao City, Philippines
Abstract
Amidst an era characterized by dependence on digital systems, this study delves into the crucial interplay of integrating cybersecurity into contemporary enterprise information system development. Drawing insights from a diverse array of 60 participants, including cybersecurity specialists, information system developers, and decision-makers within organizations, the research reveals unanimous consensus (85%) on the "extremely high importance" attributed to cybersecurity integration. This collective acknowledgement underscores a heightened recognition of the evolving landscape of cyber threats. The identified challenges, encompassing the delicate balance between security and usability, along with the scarcity of proficient experts, mirror the intricate dynamics faced by organizations. The advocated strategies, aligned with established practices, underscore the prominence of risk-based methodologies and adaptive security measures. The influence of regulatory adherence and human factors brings to light nuanced aspects of the subject. Ultimately, the study underscores the compelling need to embed cybersecurity seamlessly into information system development, culminating in resilient, secure, and forward-oriented systems within an interconnected digital milieu
Reference18 articles.
1. Arif, M., Kulonda, D., Jones, J., & Proctor, M. (2005). Enterprise information systems: technology first or process first?. Business Process Management Journal, 11(1), 5-21.
2. Zhang, W. J., & Lin, Y. (2010). On the principle of design of resilient systems–application to enterprise information systems. Enterprise Information Systems, 4(2), 99-110.
3. Wang, J. W., Wang, H. F., Ding, J. L., Furuta, K., Kanno, T., Ip, W. H., & Zhang, W. J. (2016). On domain modelling of the service system with its application to enterprise information systems. Enterprise Information Systems, 10(1), 1-16.
4. Walker-Roberts, S., Hammoudeh, M., & Dehghantanha, A. (2018). A systematic review of the availability and efficacy of countermeasures to internal threats in healthcare critical infrastructure. IEEE Access, 6, 25167-25177.
5. Alharbi, F. S. (2020). Dealing with Data Breaches Amidst Changes In Technology. International Journal of Computer Science and Security (IJCSS), 14(3), 108-115.