2023
DOI: 10.1109/access.2022.3229766
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Security Maturity Assessment Framework for Technology Startups: A Systematic Literature Review

Abstract: Cybersecurity has gained increasing interest among firms of different sizes and industries due to the significant rise of cyber-attacks over time. Technology start-ups are particularly vulnerable to cyberattacks, as appropriate security measures cannot be executed due to their limited human capital and financial resources to quantify cyber risks and allocate appropriate investments to cyber security. Focusing on technology start-ups, this study conducted a systematic literature review on cyber security maturit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
2
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 33 publications
0
2
0
Order By: Relevance
“…Ring-LWE is a cryptographic algorithm that relies on the difficulty of solving a variant of the shortest vector problem in high-dimensional lattices to provide security [26]- [28]. The ring-LWE cryptosystem operates over a ring R q = Z q [x]/f (x), where f (x) is the irreducible polynomial of degree n, n is a power-of-two number, and q is a prime number such that q ≡ 1 mod 2n.…”
Section: Preliminaries Theory a Ring Learning With Errorsmentioning
confidence: 99%
“…Ring-LWE is a cryptographic algorithm that relies on the difficulty of solving a variant of the shortest vector problem in high-dimensional lattices to provide security [26]- [28]. The ring-LWE cryptosystem operates over a ring R q = Z q [x]/f (x), where f (x) is the irreducible polynomial of degree n, n is a power-of-two number, and q is a prime number such that q ≡ 1 mod 2n.…”
Section: Preliminaries Theory a Ring Learning With Errorsmentioning
confidence: 99%
“…Predefined 'important' texts are analyzed according to their textual similarity with different repositories, and maximum similarity is calculated considering the textual importance. [7] The authors present coalitional Insurance as a talented another or complement to the outdated cover plans offered by It resources are mostly affected by cybercrimes. Below the future cyber cover perfect, several broadcast operators form an cover union, and the union premiums take into account system susceptibilities and damage distribution.…”
Section: Introductionmentioning
confidence: 99%