Company Cybersecurity System: Assessment, Risks and Expectations
Aleksandra Kuzior,
Hanna Yarovenko,
Paulina Brożek
et al.
Abstract:The consequences of Industry 4.0 have adverse side effects on cybercrime growth, which requires creating an effective cybersecurity system for companies. Therefore, this study aims to develop a composite indicator of company cybersecurity to assess its development needs. For this purpose, the authors modified Porter’s method by constructing a superposition matrix based on the growth rates of cyber threats and risks, calculating their quantitative characteristics and a composite indicator. The computations are … Show more
“…Step 𝑡 𝑖 𝑚𝑖𝑛 𝑡 𝑖 𝑚𝑎𝑥 𝑇 𝑖 = The study was also conducted to compare the time characteristics of the proposed method with the process of countering the spread and detection of malicious information in social networks without using the proposed approach [24,25]. The experts were asked to estimate the time to form a corresponding request to the monitoring system, the time to make a decision on the selection of an informational object of influence on the threat, the time to make an adequate decision on the selection of countermeasures.…”
Section: Table 1 Time Characteristics Of the Operator's Work Using Th...mentioning
The development of the post-industrial society requires the acceleration of the integration of the national economy into the globalized economic space. This stage is characterized by active informatization of all spheres of life in society, which requires information security and cyber protection for high-quality information provision of the country’s population, intellectualization of economic processes and prevention of destructive informational influence on the social status of the individual. It is also necessary to consider that for Ukraine the specified stage is complicated by the hybrid war with Russia, which requires strengthening the protection of information from cyber-attacks and the formation of new approaches in preserving the quality of information on social networks. Therefore, the purpose of this article is the development of scientific and methodological approaches in information security management, strengthening its social significance. This requires solving a certain range of tasks of identifying and preventing socially dangerous information based on the use of economic and mathematical methods and models. The article highlights the main directions of socialization of modern technological development and theoretically substantiates its significant impact on human consciousness and behavior, puts a person in front of serious challenges and, under conditions of hybrid warfare, requires strengthening of information security in social networks. In the work, the components of information security are supplemented, its impact on social aspects of society’s life is highlighted. As a result of the research, the authors proposed a scientific and methodical approach to the construction of a system for countering the spread of socially dangerous information in social networks. Besides, its functional elements are highlighted. A method of combating the spread of harmful information in social networks has been developed, which solves the problem of information support of the decision-making process and includes providing the chosen and alternative options to the person making the decision, with the justification of the choice. This creates prerequisites for information support for making a well-founded management decision.
“…Step 𝑡 𝑖 𝑚𝑖𝑛 𝑡 𝑖 𝑚𝑎𝑥 𝑇 𝑖 = The study was also conducted to compare the time characteristics of the proposed method with the process of countering the spread and detection of malicious information in social networks without using the proposed approach [24,25]. The experts were asked to estimate the time to form a corresponding request to the monitoring system, the time to make a decision on the selection of an informational object of influence on the threat, the time to make an adequate decision on the selection of countermeasures.…”
Section: Table 1 Time Characteristics Of the Operator's Work Using Th...mentioning
The development of the post-industrial society requires the acceleration of the integration of the national economy into the globalized economic space. This stage is characterized by active informatization of all spheres of life in society, which requires information security and cyber protection for high-quality information provision of the country’s population, intellectualization of economic processes and prevention of destructive informational influence on the social status of the individual. It is also necessary to consider that for Ukraine the specified stage is complicated by the hybrid war with Russia, which requires strengthening the protection of information from cyber-attacks and the formation of new approaches in preserving the quality of information on social networks. Therefore, the purpose of this article is the development of scientific and methodological approaches in information security management, strengthening its social significance. This requires solving a certain range of tasks of identifying and preventing socially dangerous information based on the use of economic and mathematical methods and models. The article highlights the main directions of socialization of modern technological development and theoretically substantiates its significant impact on human consciousness and behavior, puts a person in front of serious challenges and, under conditions of hybrid warfare, requires strengthening of information security in social networks. In the work, the components of information security are supplemented, its impact on social aspects of society’s life is highlighted. As a result of the research, the authors proposed a scientific and methodical approach to the construction of a system for countering the spread of socially dangerous information in social networks. Besides, its functional elements are highlighted. A method of combating the spread of harmful information in social networks has been developed, which solves the problem of information support of the decision-making process and includes providing the chosen and alternative options to the person making the decision, with the justification of the choice. This creates prerequisites for information support for making a well-founded management decision.
The rapid development of digital technologies and their active implementation in all spheres of the economy, on the one hand, contribute to increased control over the activities of economic entities, and on the other hand, create new challenges associated with the dynamic development of cybercrime. The purpose of the article is to analyze the global trends in cybercrime in 2016-2023 (by calculating national levels of cybercrime) and to model the mechanisms of combating it in order to form a global, open and safe cyberspace, protect the population from cyber threats and cyber fraud, increase the effectiveness of financial monitoring procedures and control over transactions in cyberspace. The article presents the dominant directions, evolutionary, temporal and spatial patterns of the development of crime in cyberspace, clustering of the countries, and identification of leaders and outsiders in the field of cybercrime (through visualization density maps based on the construction of self-organized Kohonen maps). The results of the calculations confirm a significant increase in the level of cybercrime in the world since 2016 (in particular, due to the COVID-19 pandemic and active digital transformation). A comparative analysis of the indicator across countries made it possible to distinguish those with the highest rates of cybercrime (Slovenia, Iceland, Moldova, Georgia) and those with a significantly higher level of cyber security (Greece, Belgium, France, Germany).
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.