Attributes impacting cybersecurity policy development: An evidence from seven nations

dc.authoridMishra, Alok/0000-0003-1275-2050
dc.authoridAlzoubi, Yehia Ibrahim/0000-0003-4329-4072
dc.authoridAlzoubi, Yehia Ibrahim/0000-0003-4329-4072
dc.authoridGill, Asif/0000-0001-6239-6280
dc.authorscopusid7201441575
dc.authorscopusid36348354800
dc.authorscopusid57210843875
dc.authorscopusid53979600700
dc.authorwosidMishra, Alok/AAE-2673-2019
dc.authorwosidAlzoubi, Yehia Ibrahim/ACQ-8013-2022
dc.authorwosidAlzoubi, Yehia Ibrahim/AAF-7054-2020
dc.authorwosidGill, Asif/K-4375-2017
dc.contributor.authorMıshra, Alok
dc.contributor.authorAlzoubi, Yehia Ibrahim
dc.contributor.authorAnwar, Memoona Javeria
dc.contributor.authorGill, Asif Qumer
dc.contributor.otherSoftware Engineering
dc.date.accessioned2024-07-05T15:23:59Z
dc.date.available2024-07-05T15:23:59Z
dc.date.issued2022
dc.departmentAtılım Universityen_US
dc.department-temp[Mishra, Alok] Molde Univ Coll Specialized Univ Logist, Informat & Digitalizat, N-6410 Molde, Norway; [Mishra, Alok] Atilim Univ, Dept Software Engn, TR-06830 Ankara, Turkey; [Alzoubi, Yehia Ibrahim] Amer Univ Middle East, Coll Business, Management Informat Syst Dept, Egaila 15453, Kuwait; [Anwar, Memoona Javeria; Gill, Asif Qumer] Univ Technol Sydney, Sch Comp Sci, 15 Broadway, Ultimo, NSW 2007, Australiaen_US
dc.descriptionMishra, Alok/0000-0003-1275-2050; Alzoubi, Yehia Ibrahim/0000-0003-4329-4072; Alzoubi, Yehia Ibrahim/0000-0003-4329-4072; Gill, Asif/0000-0001-6239-6280en_US
dc.description.abstractCyber threats have risen as a result of the growing usage of the Internet. Organizations must have effec-tive cybersecurity policies in place to respond to escalating cyber threats. Individual users and corpora-tions are not the only ones who are affected by cyber-attacks; national security is also a serious concern. Different nations' cybersecurity rules make it simpler for cybercriminals to carry out damaging actions while making it tougher for governments to track them down. Hence, a comprehensive cybersecurity policy is needed to enable governments to take a proactive approach to all types of cyber threats. This study investigates cybersecurity regulations and attributes used in seven nations in an attempt to fill this research gap. This paper identified fourteen common cybersecurity attributes such as telecommunication, network, Cloud computing, online banking, E-commerce, identity theft, privacy, and smart grid. Some na-tions seemed to focus, based on the study of key available policies, on certain cybersecurity attributes more than others. For example, the USA has scored the highest in terms of online banking policy, but Canada has scored the highest in terms of E-commerce and spam policies. Identifying the common poli-cies across several nations may assist academics and policymakers in developing cybersecurity policies. A survey of other nations' cybersecurity policies might be included in the future research.(c) 2022 The Author(s). Published by Elsevier Ltd. This is an open access article under the CC BY license ( http://creativecommons.org/licenses/by/4.0/ )en_US
dc.identifier.citation12
dc.identifier.doi10.1016/j.cose.2022.102820
dc.identifier.issn0167-4048
dc.identifier.issn1872-6208
dc.identifier.scopus2-s2.0-85133520974
dc.identifier.urihttps://doi.org/10.1016/j.cose.2022.102820
dc.identifier.urihttps://hdl.handle.net/20.500.14411/2359
dc.identifier.volume120en_US
dc.identifier.wosWOS:000828430200002
dc.identifier.wosqualityQ2
dc.language.isoenen_US
dc.publisherElsevier Advanced Technologyen_US
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanıen_US
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.subjectCybersecurityen_US
dc.subjectPolicyen_US
dc.subjectCyberspaceen_US
dc.subjectInfrastructureen_US
dc.subjectProtectionen_US
dc.subjectSecurityen_US
dc.subjectThreatsen_US
dc.titleAttributes impacting cybersecurity policy development: An evidence from seven nationsen_US
dc.typeArticleen_US
dspace.entity.typePublication
relation.isAuthorOfPublicationde97bc0b-032d-4567-835e-6cd0cb17b98b
relation.isAuthorOfPublication.latestForDiscoveryde97bc0b-032d-4567-835e-6cd0cb17b98b
relation.isOrgUnitOfPublicationd86bbe4b-0f69-4303-a6de-c7ec0c515da5
relation.isOrgUnitOfPublication.latestForDiscoveryd86bbe4b-0f69-4303-a6de-c7ec0c515da5

Files

Collections