Measurement of the Cybersecurity Strategy Effectiveness with a Scorecard Based On Risk Analysis

Author:

GÖRKAN EVRE Özlem1ORCID,CİYLAN Bünyamin1ORCID

Affiliation:

1. GAZI UNIVERSITY

Abstract

Although the rapid acceleration of technology offers solutions that will make life easier, it also brings technological threats that will negatively affect human life and cause serious problems. Attacks, thefts and espionage using technology increase exponentially every year compared to the previous. In order to eliminate this problem that affects the whole world, many countries give priority to creating cybersecurity strategies in order to protect their information and re-sources, and develop effective implementation methods. Despite the abundant literature, there is a large gap in the effective implementation of strategies. While evaluating the strategy, measurement is made regardless of the risks that will arise if the action plan is not fulfilled. For this reason, it is recommended to evaluate the risk that will arise if the action titles are not implemented in order to eliminate this shortcoming. The aim is to emphasize that sustainability and continuous improvement will be increased by using the scorecard based on risk analysis by implementing the proposed action plan through the strategy model. The use of scorecards to over-come the increasing challenges arising from digital transformation today will contribute to the evaluation of the strategy and eliminate its shortcomings, as well as provide self-assessment. This study suggests that measuring as a method of increasing efficiency, which has not been discussed much until now, may be the solution. In order to ensure the security of the smart world, there is a need for a sustainable and effective strategy that can keep up with digital realities, renewing itself.

Publisher

Gazi Universitesi Fen Bilimleri Dergisi Part C: Tasarim ve Teknoloji

Subject

General Medicine

Reference43 articles.

1. [1] Tsaruk O, Korniiets M. Hybrid nature of modern threats for cybersecurity and information security. Smart Cities and Regional Development (SCRD) Journal. 2020; 4(1): 57-78.

2. [2] Flowerday S, Tuyikeze T. Information security policy development and implementation: The what, how and who. Computers & Security. 2016; 61: 169-183.

3. [3] Mills J, Stuban SMF, Dever, J. Predict insider threats using human behaviors. IEEE Engineering Management Review. 2017; 45(1): 39-48.

4. [4] Kovacs L. National cybersecurity strategy framework. Academic and Applied Research in Military and Public Management Science. 2019: 18(2).

5. [5] TR Ministry of Transport, Maritime Affairs and Communications. National cyber security strategy and 2013-2014 action plan. 2013. Available online: https://www.btk.gov.tr/uploads/pages/2-1-strateji-eylem-plani-2013-2014-5a3412cf8f45a.pdf (accessed on 12 June 2023).

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3