The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2023
DOI: 10.30657/pea.2023.29.43
|View full text |Cite
|
Sign up to set email alerts
|

Company Cybersecurity System: Assessment, Risks and Expectations

Aleksandra Kuzior,
Hanna Yarovenko,
Paulina Brożek
et al.

Abstract: The consequences of Industry 4.0 have adverse side effects on cybercrime growth, which requires creating an effective cybersecurity system for companies. Therefore, this study aims to develop a composite indicator of company cybersecurity to assess its development needs. For this purpose, the authors modified Porter’s method by constructing a superposition matrix based on the growth rates of cyber threats and risks, calculating their quantitative characteristics and a composite indicator. The computations are … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(1 citation statement)
references
References 45 publications
0
1
0
Order By: Relevance
“…Step 𝑡 𝑖 𝑚𝑖𝑛 𝑡 𝑖 𝑚𝑎𝑥 𝑇 𝑖 = The study was also conducted to compare the time characteristics of the proposed method with the process of countering the spread and detection of malicious information in social networks without using the proposed approach [24,25]. The experts were asked to estimate the time to form a corresponding request to the monitoring system, the time to make a decision on the selection of an informational object of influence on the threat, the time to make an adequate decision on the selection of countermeasures.…”
Section: Table 1 Time Characteristics Of the Operator's Work Using Th...mentioning
confidence: 99%
“…Step 𝑡 𝑖 𝑚𝑖𝑛 𝑡 𝑖 𝑚𝑎𝑥 𝑇 𝑖 = The study was also conducted to compare the time characteristics of the proposed method with the process of countering the spread and detection of malicious information in social networks without using the proposed approach [24,25]. The experts were asked to estimate the time to form a corresponding request to the monitoring system, the time to make a decision on the selection of an informational object of influence on the threat, the time to make an adequate decision on the selection of countermeasures.…”
Section: Table 1 Time Characteristics Of the Operator's Work Using Th...mentioning
confidence: 99%