Uluslararası Organizasyonlarda Siber Güvenlik Stratejisi Geliştirmek İçin Fuzzy AHP Entegrasyonu


Özet Görüntüleme: 134 / PDF İndirme: 62

Yazarlar

DOI:

https://doi.org/10.5281/zenodo.10029089

Anahtar Kelimeler:

Stratejik Yönetim, Siber Güvenlik, Risk Yönetimi, Uluslararası Organizasyonlar

Özet

Hızla gelişen dijitalleşme ortamında, uluslararası organizasyonlar siber güvenlikle ilgili artan zorluklarla karşı karşıya kalmaktadır. Bu çalışma, bu önemli endişeyi ele alarak Fuzzy Analitik Hiyerarşi Süreci'nin (AHP) literatür taramasından belirlenen kriterlerle entegre edildiği yenilikçi bir yaklaşım önermektedir. Amaç, gerçek dünya vaka çalışmalarının içgörülerini ve bilimsel literatürün derinliğini kullanarak siber güvenlik stratejilerinin etkinliğini artırmaktır. Fuzzy AHP uygulanarak bu araştırma, kriterlerin göreceli önemini daha ayrıntılı bir şekilde anlama ve karar vermedeki içsel belirsizlikleri ele alma olanağı sağlamaktadır. Araştırma, siber güvenlik stratejisi oluşturmanın akademik anlayışına katkı sağlamakla kalmamakta, aynı zamanda dijital liderliklerini güçlendirmek ve dijitalleşme çağında siber güvenlik çabalarını pekiştirmek isteyen uluslararası organizasyonlar için pratik sonuçlar sunmaktadır.

İndirmeler

İndirme verileri henüz mevcut değil.

Referanslar

Ahmad, A., Desouza, K. C., Maynard, S. B., Naseer, H., & Baskerville, R. L. (2020). How integration of cyber security management and incident response enables organizational learning. Journal of the Association for Information Science and Technology, 71(8), 939-953. https://doi.org/10.1002/ asi.2431.

Alahmari, A., & Duncan, B. (2020, June). Cybersecurity risk management in small and medium-sized enterprises: A systematic review of recent evidence. In 2020 international conference on cyber situational awareness, data analytics and assessment (CyberSA) (pp. 1-5). IEEE.

Alawida, M., Omolara, A. E., Abiodun, O. I., & Al-Rajab, M. (2022). A deeper look into cybersecurity issues in the wake of Covid-19: A survey. Journal of King Saud University-Computer and Information Sciences, 34(2022), 8176-8206. https://doi.org/10.1016/j.jksuci.2022.08.003.

AlDaajeh, S., Saleous, H., Alrabaee, S., Barka, E., Breitinger, F., & Choo, K. K. R. (2022). The role of national cybersecurity strategies on the improvement of cybersecurity education. Computers & Security, 119(2022), 1-21. https://doi.org/10.1016/j.cose.2022.102754.

Belalcázar, A., Ron, M., Díaz, J., & Molinari, L. (2017, November). Towards a strategic resilience of applications through the NIST cybersecurity framework and the strategic alignment model (SAM). In 2017 International Conference on Information Systems and Computer Science (INCISCOS) (pp. 181-187). IEEE.

Chang, D. Y. (1996). Applications of the extent analysis method on fuzzy AHP. European journal of operational research, 95(3), 649-655. https://doi.org/10.1016/0377-2217(95)00300-2.

Cheng, E. C., & Wang, T. (2022). Institutional strategies for cybersecurity in higher education institutions. Information, 13(4), 1-14. https://doi.org/10.3390/info13040192.

Cvitić, I., Peraković, D., Periša, M., & Botica, M. (2017). An overview of the cyber security strategic management in Republic of Croatia. In RCITD—Proceedings in research conference in technical disciplines (pp. 13-18). Zilina: EDIS—Publishing Institution of the University of Zilina.

Dupont, B. (2019). The cyber-resilience of financial institutions: significance and applicability. Journal of cybersecurity, 5(1), 1-17. https://doi.org/10.1093/cybsec/tyz013.

Ganin, A. A., Quach, P., Panwar, M., Collier, Z. A., Keisler, J. M., Marchese, D., & Linkov, I. (2020). Multicriteria decision framework for cybersecurity risk assessment and management. Risk Analysis, 40(1), 183-199. https://doi.org/10.1111/risa.12891.

Ghafur, S., Grass, E., Jennings, N. R., & Darzi, A. (2019). The challenges of cybersecurity in health care: the UK National Health Service as a case study. The Lancet Digital Health, 1(1), 10-12. https://doi.org/10.1016/S2589-7500(19)30005-6.

Ghelani, D., Hua, T. K., & Koduru, S. K. R. (2022). Cyber Security Threats, Vulnerabilities, and Security Solutions Models in Banking. Authorea Preprints, 1(1), 1-9. https://doi.org/10.22541/ au.166385206.63311335/v1.

Goel, R., Kumar, A., & Haddow, J. (2020). PRISM: a strategic decision framework for cybersecurity risk assessment. Information & Computer Security, 28(4), 591-625. https://doi.org/10.1108/ICS-11-2018-0131.

He, S., Ficke, E., Pritom, M. M. A., Chen, H., Tang, Q., Chen, Q., Pendeleton, M., Nijilla, L., & Xu, S. (2022). Blockchain-based automated and robust cyber security management. Journal of Parallel and Distributed Computing, 163(2022), 62-82. https://doi.org/10.1016/j.jpdc.2022.01.002.

Jakka, G., Yathiraju, N., & Ansari, M. F. (2022). Artificial Intelligence in Terms of Spotting Malware and Delivering Cyber Risk Management. Journal of Positive School Psychology, 6(3), 6156-6165. https://journalppw.com/index.php/jpsp/article/view/3522.

Kabanov, I., & Madnick, S. (2021). Applying the Lessons from the Equifax Cybersecurity Incident to Build a Better Defense. MIS Quarterly Executive, 20(2), 109-125. https://aisel.aisnet.org/misqe/ vol20/iss2/4.

Kızılcan, L. S., & Mızrak, K. C. (2022). Cyber Attacks In Civil Aviation And The Concept Of Cyber Security. Idea Studies, 8(47), 742-752. http://dx.doi.org/10.2922.

Kure, H. I., Islam, S., & Razzaque, M. A. (2018). An integrated cyber security risk management approach for a cyber-physical system. Applied Sciences, 8(6), 898. https://doi.org/10.3390/app8060898.

Kumar, S., & Mallipeddi, R. R. (2022). Impact of cybersecurity on operations and supply chain management: Emerging trends and future research directions. Production and Operations Management, 31(12), 4488-4500. https://doi.org/10.1111/poms.13859.

Lee, I. (2021). Cybersecurity: Risk management framework and investment cost analysis. Business Horizons, 64(5), 659-671. https://doi.org/10.1016/j.bushor.2021.02.022.

Manley, M. (2015). Cyberspace’s dynamic duo: Forging a cybersecurity public-private partnership. Journal of Strategic Security, 8(3), 85-98. https://www.jstor.org/stable/26465248.

Mızrak, K. C., & Mızrak, F. (2020). Role of Agility in the Banking Sector in Competitive Globalization Era: Evidence From the Turkish Banking Sector. Hasan Dinçer, Serhat Yüksel (Ed). In Handbook of Research on Decision-Making Techniques in Financial Marketing içinde (pp. 317-334). IGI Global.

Mızrak, K. C. (2021). A Research on Effect of Performance Evaluation and Efficiency on Work Life. Hasan Dinçer, Serhat Yüksel (Ed). In Management Strategies to Survive in a Competitive Environment: How to Improve Company Performance içinde (pp. 387-400). Cham: Springer International Publishing.

Mohamed Mizan, N. S., Ma’arif, M. Y., Mohd Satar, N. S., & Shahar, S. M. (2019). CNDS-cybersecurity: issues and challenges in ASEAN countries. International Journal of Advanced Trends in Computer Science and Engineering, 8(1), 113-119. https://doi.org/10.30534/ijatcse/2019/1781.42019.

Munaiah, N., Pelletier, J., Su, S. H., Yang, S. J., & Meneely, A. (2019, November). A cybersecurity dataset derived from the national collegiate penetration testing competition. In HICSS Symposium on cybersecurity big data analytics.

Peterson, J., Haney, M., & Borrelli, R. A. (2019). An overview of methodologies for cybersecurity vulnerability assessments conducted in nuclear power plants. Nuclear Engineering and Design, 346(2019), 75-84. https://doi.org/10.1016/j.nucengdes.2019.02.025.

Raimundo, R. J., & Rosário, A. T. (2022). Cybersecurity in the internet of things in industrial management. Applied Sciences, 12(3), 1-19. https://doi.org/10.3390/app12031598.

Samtani, S., Abate, M., Benjamin, V., & Li, W. (2020). Cybersecurity as an industry: A cyber threat intelligence perspective. Thomas J. Holt, Adam M. Bossler (Ed). The Palgrave Handbook of International Cybercrime and Cyberdeviance içinde, 135-154.

Solfa, F. D. G. (2022). Impacts of Cyber Security and Supply Chain Risk on Digital Operations: Evidence from the Pharmaceutical Industry. International Journal of Technology, Innovation and Management (IJTIM), 2(2), 18-32. https://doi.org/10.54489/ijtim.v2i2.98.

Thach, N. N., Hanh, H. T., Huy, D. T. N., & Vu, Q. N. (2021). Technology quality management of the industry 4.0 and cybersecurity risk management on current banking activities in emerging markets-the case in Vietnam. International Journal for Quality Research, 15(3), 845-856. https://doi:10.24874/IJQR15.03-10.

Tvaronavičienė, M., Plėta, T., Della Casa, S., & Latvys, J. (2020). Cyber security management of critical energy infrastructure in national cybersecurity strategies: Cases of USA, UK, France, Estonia and Lithuania. Insights into regional development, 2(4), 802-813. https://dx.doi.org/10.9770/ ird.2020.2.4(6).

Wallis, T., & Dorey, P. (2023). Implementing Partnerships in Energy Supply Chain Cybersecurity Resilience. Energies, 16(4), 1-11. https://doi.org/10.3390/en16041868.

Yayınlanmış

2023-10-18

Nasıl Atıf Yapılır

Mızrak, F. (2023). Uluslararası Organizasyonlarda Siber Güvenlik Stratejisi Geliştirmek İçin Fuzzy AHP Entegrasyonu. Premium E-Journal of Social Sciences (PEJOSS), 7(35), 1272–1292. https://doi.org/10.5281/zenodo.10029089