Cybersecurity Enterprises Policies: a Comparative Study

dc.contributor.author Mishra, Alok
dc.contributor.author Alzoubi, Yehia Ibrahim
dc.contributor.author Gill, Asif Qumer
dc.contributor.author Anwar, Memoona Javeria
dc.date.accessioned 2024-07-05T15:16:26Z
dc.date.available 2024-07-05T15:16:26Z
dc.date.issued 2022
dc.description Alzoubi, Yehia Ibrahim/0000-0003-4329-4072; Alzoubi, Yehia Ibrahim/0000-0003-4329-4072; Mishra, Alok/0000-0003-1275-2050; Gill, Asif/0000-0001-6239-6280 en_US
dc.description.abstract Cybersecurity is a critical issue that must be prioritized not just by enterprises of all kinds, but also by national security. To safeguard an organization's cyberenvironments, information, and communication technologies, many enterprises are investing substantially in cybersecurity these days. One part of the cyberdefense mechanism is building an enterprises' security policies library, for consistent implementation of security controls. Significant and common cybersecurity policies of various enterprises are compared and explored in this study to provide robust and comprehensive cybersecurity knowledge that can be used in various enterprises. Several significant common security policies were identified and discussed in this comprehensive study. This study identified 10 common cybersecurity policy aspects in five enterprises: healthcare, finance, education, aviation, and e-commerce. We aimed to build a strong infrastructure in each business, and investigate the security laws and policies that apply to all businesses in each sector. Furthermore, the findings of this study reveal that the importance of cybersecurity requirements differ across multiple organizations. The choice and applicability of cybersecurity policies are determined by the type of information under control and the security requirements of organizations in relation to these policies. en_US
dc.identifier.doi 10.3390/s22020538
dc.identifier.issn 1424-8220
dc.identifier.scopus 2-s2.0-85122706665
dc.identifier.uri https://doi.org/10.3390/s22020538
dc.identifier.uri https://hdl.handle.net/20.500.14411/1638
dc.language.iso en en_US
dc.publisher Mdpi en_US
dc.relation.ispartof Sensors
dc.rights info:eu-repo/semantics/openAccess en_US
dc.subject cybersecurity (CS) en_US
dc.subject cybersecurity polices en_US
dc.subject cyberspace en_US
dc.subject enterprise(s) en_US
dc.subject information and communication technology (ICT) en_US
dc.title Cybersecurity Enterprises Policies: a Comparative Study en_US
dc.type Article en_US
dspace.entity.type Publication
gdc.author.id Alzoubi, Yehia Ibrahim/0000-0003-4329-4072
gdc.author.id Alzoubi, Yehia Ibrahim/0000-0003-4329-4072
gdc.author.id Mishra, Alok/0000-0003-1275-2050
gdc.author.id Gill, Asif/0000-0001-6239-6280
gdc.author.scopusid 7201441575
gdc.author.scopusid 36348354800
gdc.author.scopusid 53979600700
gdc.author.scopusid 57210843875
gdc.author.wosid Alzoubi, Yehia Ibrahim/ACQ-8013-2022
gdc.author.wosid Alzoubi, Yehia Ibrahim/AAF-7054-2020
gdc.author.wosid Mishra, Alok/AAE-2673-2019
gdc.author.wosid Gill, Asif/K-4375-2017
gdc.bip.impulseclass C3
gdc.bip.influenceclass C4
gdc.bip.popularityclass C3
gdc.coar.access open access
gdc.coar.type text::journal::journal article
gdc.collaboration.industrial false
gdc.description.department Atılım University en_US
gdc.description.departmenttemp [Mishra, Alok] Molde Univ Coll, Specialized Univ Logist, Informat & Digitalizat, N-6410 Molde, Norway; [Mishra, Alok] Atilim Univ, Dept Software Engn, TR-06830 Ankara, Turkey; [Alzoubi, Yehia Ibrahim] Amer Univ Middle East, Coll Business, Management Informat Syst Dept, Egaila 15453, Kuwait; [Gill, Asif Qumer; Anwar, Memoona Javeria] Univ Technol Sydney, Sch Comp Sci, 15 Broadway, Ultimo, NSW 2007, Australia en_US
gdc.description.issue 2 en_US
gdc.description.publicationcategory Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı en_US
gdc.description.scopusquality Q1
gdc.description.startpage 538
gdc.description.volume 22 en_US
gdc.description.wosquality Q2
gdc.identifier.openalex W4206370054
gdc.identifier.pmid 35062504
gdc.identifier.wos WOS:000760292400001
gdc.oaire.accesstype GOLD
gdc.oaire.diamondjournal false
gdc.oaire.impulse 54.0
gdc.oaire.influence 5.2417675E-9
gdc.oaire.isgreen true
gdc.oaire.keywords cyberspace
gdc.oaire.keywords Chemical technology
gdc.oaire.keywords cybersecurity (CS)
gdc.oaire.keywords enterprise(s)
gdc.oaire.keywords Commerce
gdc.oaire.keywords TP1-1185
gdc.oaire.keywords cybersecurity polices
gdc.oaire.keywords Article
gdc.oaire.keywords Policy
gdc.oaire.keywords cybersecurity (CS); cybersecurity polices; cyberspace; enterprise(s); information and communication technology (ICT)
gdc.oaire.keywords information and communication technology (ICT)
gdc.oaire.keywords Delivery of Health Care
gdc.oaire.keywords Computer Security
gdc.oaire.popularity 4.39483E-8
gdc.oaire.publicfunded false
gdc.oaire.sciencefields 02 engineering and technology
gdc.oaire.sciencefields 0202 electrical engineering, electronic engineering, information engineering
gdc.openalex.collaboration International
gdc.openalex.fwci 26.21938663
gdc.openalex.normalizedpercentile 0.99
gdc.openalex.toppercent TOP 1%
gdc.opencitations.count 36
gdc.plumx.crossrefcites 28
gdc.plumx.mendeley 443
gdc.plumx.pubmedcites 3
gdc.plumx.scopuscites 61
gdc.scopus.citedcount 61
gdc.virtual.author Mıshra, Alok
gdc.wos.citedcount 35
relation.isAuthorOfPublication de97bc0b-032d-4567-835e-6cd0cb17b98b
relation.isAuthorOfPublication.latestForDiscovery de97bc0b-032d-4567-835e-6cd0cb17b98b
relation.isOrgUnitOfPublication d86bbe4b-0f69-4303-a6de-c7ec0c515da5
relation.isOrgUnitOfPublication 4abda634-67fd-417f-bee6-59c29fc99997
relation.isOrgUnitOfPublication 50be38c5-40c4-4d5f-b8e6-463e9514c6dd
relation.isOrgUnitOfPublication.latestForDiscovery d86bbe4b-0f69-4303-a6de-c7ec0c515da5

Files

Collections