2023
DOI: 10.1109/access.2022.3229766
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Security Maturity Assessment Framework for Technology Startups: A Systematic Literature Review

Abstract: Cybersecurity has gained increasing interest among firms of different sizes and industries due to the significant rise of cyber-attacks over time. Technology start-ups are particularly vulnerable to cyberattacks, as appropriate security measures cannot be executed due to their limited human capital and financial resources to quantify cyber risks and allocate appropriate investments to cyber security. Focusing on technology start-ups, this study conducted a systematic literature review on cyber security maturit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 33 publications
0
2
0
Order By: Relevance
“…The qualitative analysis of cybersecurity frameworks in the financial sector, through a systematic literature review, reveals a landscape marked by evolving threats and the imperative for robust defenses. Marican et al (2022) underscore the vulnerability of technology startups, often integral to the financial sector, to cyber-attacks due to inadequate cybersecurity measures. Their systematic review highlights the absence of a comprehensive cybersecurity maturity assessment framework tailored for technology startups, which are critical nodes in the financial sector's network (Marican et al, 2022).…”
Section: Methodology Of the Study Qualitative Analysis Of Cybersecuri...mentioning
confidence: 99%
See 2 more Smart Citations
“…The qualitative analysis of cybersecurity frameworks in the financial sector, through a systematic literature review, reveals a landscape marked by evolving threats and the imperative for robust defenses. Marican et al (2022) underscore the vulnerability of technology startups, often integral to the financial sector, to cyber-attacks due to inadequate cybersecurity measures. Their systematic review highlights the absence of a comprehensive cybersecurity maturity assessment framework tailored for technology startups, which are critical nodes in the financial sector's network (Marican et al, 2022).…”
Section: Methodology Of the Study Qualitative Analysis Of Cybersecuri...mentioning
confidence: 99%
“…Marican et al (2022) underscore the vulnerability of technology startups, often integral to the financial sector, to cyber-attacks due to inadequate cybersecurity measures. Their systematic review highlights the absence of a comprehensive cybersecurity maturity assessment framework tailored for technology startups, which are critical nodes in the financial sector's network (Marican et al, 2022). Similarly, Abdulrhman and Alodhiani (2023) focus on the fintech sector, identifying prevalent cybercrime threats and the industry's efforts to establish effective cybersecurity frameworks.…”
Section: Methodology Of the Study Qualitative Analysis Of Cybersecuri...mentioning
confidence: 99%
See 1 more Smart Citation
“…Ring-LWE is a cryptographic algorithm that relies on the difficulty of solving a variant of the shortest vector problem in high-dimensional lattices to provide security [26]- [28]. The ring-LWE cryptosystem operates over a ring R q = Z q [x]/f (x), where f (x) is the irreducible polynomial of degree n, n is a power-of-two number, and q is a prime number such that q ≡ 1 mod 2n.…”
Section: Preliminaries Theory a Ring Learning With Errorsmentioning
confidence: 99%
“…Predefined 'important' texts are analyzed according to their textual similarity with different repositories, and maximum similarity is calculated considering the textual importance. [7] The authors present coalitional Insurance as a talented another or complement to the outdated cover plans offered by It resources are mostly affected by cybercrimes. Below the future cyber cover perfect, several broadcast operators form an cover union, and the union premiums take into account system susceptibilities and damage distribution.…”
Section: Introductionmentioning
confidence: 99%