Cybersecurity Enterprises Policies: A Comparative Study

dc.authoridAlzoubi, Yehia Ibrahim/0000-0003-4329-4072
dc.authoridAlzoubi, Yehia Ibrahim/0000-0003-4329-4072
dc.authoridMishra, Alok/0000-0003-1275-2050
dc.authoridGill, Asif/0000-0001-6239-6280
dc.authorscopusid7201441575
dc.authorscopusid36348354800
dc.authorscopusid53979600700
dc.authorscopusid57210843875
dc.authorwosidAlzoubi, Yehia Ibrahim/ACQ-8013-2022
dc.authorwosidAlzoubi, Yehia Ibrahim/AAF-7054-2020
dc.authorwosidMishra, Alok/AAE-2673-2019
dc.authorwosidGill, Asif/K-4375-2017
dc.contributor.authorMıshra, Alok
dc.contributor.authorAlzoubi, Yehia Ibrahim
dc.contributor.authorGill, Asif Qumer
dc.contributor.authorAnwar, Memoona Javeria
dc.contributor.otherSoftware Engineering
dc.date.accessioned2024-07-05T15:16:26Z
dc.date.available2024-07-05T15:16:26Z
dc.date.issued2022
dc.departmentAtılım Universityen_US
dc.department-temp[Mishra, Alok] Molde Univ Coll, Specialized Univ Logist, Informat & Digitalizat, N-6410 Molde, Norway; [Mishra, Alok] Atilim Univ, Dept Software Engn, TR-06830 Ankara, Turkey; [Alzoubi, Yehia Ibrahim] Amer Univ Middle East, Coll Business, Management Informat Syst Dept, Egaila 15453, Kuwait; [Gill, Asif Qumer; Anwar, Memoona Javeria] Univ Technol Sydney, Sch Comp Sci, 15 Broadway, Ultimo, NSW 2007, Australiaen_US
dc.descriptionAlzoubi, Yehia Ibrahim/0000-0003-4329-4072; Alzoubi, Yehia Ibrahim/0000-0003-4329-4072; Mishra, Alok/0000-0003-1275-2050; Gill, Asif/0000-0001-6239-6280en_US
dc.description.abstractCybersecurity is a critical issue that must be prioritized not just by enterprises of all kinds, but also by national security. To safeguard an organization's cyberenvironments, information, and communication technologies, many enterprises are investing substantially in cybersecurity these days. One part of the cyberdefense mechanism is building an enterprises' security policies library, for consistent implementation of security controls. Significant and common cybersecurity policies of various enterprises are compared and explored in this study to provide robust and comprehensive cybersecurity knowledge that can be used in various enterprises. Several significant common security policies were identified and discussed in this comprehensive study. This study identified 10 common cybersecurity policy aspects in five enterprises: healthcare, finance, education, aviation, and e-commerce. We aimed to build a strong infrastructure in each business, and investigate the security laws and policies that apply to all businesses in each sector. Furthermore, the findings of this study reveal that the importance of cybersecurity requirements differ across multiple organizations. The choice and applicability of cybersecurity policies are determined by the type of information under control and the security requirements of organizations in relation to these policies.en_US
dc.identifier.citation21
dc.identifier.doi10.3390/s22020538
dc.identifier.issn1424-8220
dc.identifier.issue2en_US
dc.identifier.pmid35062504
dc.identifier.scopus2-s2.0-85122706665
dc.identifier.urihttps://doi.org/10.3390/s22020538
dc.identifier.urihttps://hdl.handle.net/20.500.14411/1638
dc.identifier.volume22en_US
dc.identifier.wosWOS:000760292400001
dc.identifier.wosqualityQ2
dc.language.isoenen_US
dc.publisherMdpien_US
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanıen_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.subjectcybersecurity (CS)en_US
dc.subjectcybersecurity policesen_US
dc.subjectcyberspaceen_US
dc.subjectenterprise(s)en_US
dc.subjectinformation and communication technology (ICT)en_US
dc.titleCybersecurity Enterprises Policies: A Comparative Studyen_US
dc.typeArticleen_US
dspace.entity.typePublication
relation.isAuthorOfPublicationde97bc0b-032d-4567-835e-6cd0cb17b98b
relation.isAuthorOfPublication.latestForDiscoveryde97bc0b-032d-4567-835e-6cd0cb17b98b
relation.isOrgUnitOfPublicationd86bbe4b-0f69-4303-a6de-c7ec0c515da5
relation.isOrgUnitOfPublication.latestForDiscoveryd86bbe4b-0f69-4303-a6de-c7ec0c515da5

Files

Collections