Mıshra, AlokMishra, AlokAlzoubi, Yehia IbrahimAnwar, Memoona JaveriaGill, Asif QumerSoftware Engineering2024-07-052024-07-052022120167-40481872-620810.1016/j.cose.2022.1028202-s2.0-85133520974https://doi.org/10.1016/j.cose.2022.102820https://hdl.handle.net/20.500.14411/2359Mishra, Alok/0000-0003-1275-2050; Alzoubi, Yehia Ibrahim/0000-0003-4329-4072; Alzoubi, Yehia Ibrahim/0000-0003-4329-4072; Gill, Asif/0000-0001-6239-6280Cyber threats have risen as a result of the growing usage of the Internet. Organizations must have effec-tive cybersecurity policies in place to respond to escalating cyber threats. Individual users and corpora-tions are not the only ones who are affected by cyber-attacks; national security is also a serious concern. Different nations' cybersecurity rules make it simpler for cybercriminals to carry out damaging actions while making it tougher for governments to track them down. Hence, a comprehensive cybersecurity policy is needed to enable governments to take a proactive approach to all types of cyber threats. This study investigates cybersecurity regulations and attributes used in seven nations in an attempt to fill this research gap. This paper identified fourteen common cybersecurity attributes such as telecommunication, network, Cloud computing, online banking, E-commerce, identity theft, privacy, and smart grid. Some na-tions seemed to focus, based on the study of key available policies, on certain cybersecurity attributes more than others. For example, the USA has scored the highest in terms of online banking policy, but Canada has scored the highest in terms of E-commerce and spam policies. Identifying the common poli-cies across several nations may assist academics and policymakers in developing cybersecurity policies. A survey of other nations' cybersecurity policies might be included in the future research.(c) 2022 The Author(s). Published by Elsevier Ltd. This is an open access article under the CC BY license ( http://creativecommons.org/licenses/by/4.0/ )eninfo:eu-repo/semantics/closedAccessCybersecurityPolicyCyberspaceInfrastructureProtectionSecurityThreatsAttributes impacting cybersecurity policy development: An evidence from seven nationsArticleQ2120WOS:000828430200002