Integration of Fuzzy AHP for Cybersecurity Strategy Development in International Organizations


Abstract views: 135 / PDF downloads: 63

Authors

DOI:

https://doi.org/10.5281/zenodo.10029089

Keywords:

Strategic Management, Cybersecurity, Risk Management, International Organizations

Abstract

In the rapidly evolving landscape of digitalization, international organizations face escalating challenges concerning cybersecurity. This study addresses this critical concern by proposing an innovative approach that integrates the Fuzzy Analytic Hierarchy Process (AHP) with criteria determined from the literature review. The aim is to enhance the effectiveness of cybersecurity strategies by leveraging the insights from the depth of knowledge from scholarly literature. By applying Fuzzy AHP, this research ensures a more nuanced understanding of the criteria's relative importance and accommodates the inherent uncertainties in decision-making. This research not only contributes to the academic understanding of cybersecurity strategy formulation but also offers practical implications for international organizations seeking to fortify their digital leadership and cybersecurity efforts in the era of digitization.

Downloads

Download data is not yet available.

References

Ahmad, A., Desouza, K. C., Maynard, S. B., Naseer, H., & Baskerville, R. L. (2020). How integration of cyber security management and incident response enables organizational learning. Journal of the Association for Information Science and Technology, 71(8), 939-953. https://doi.org/10.1002/ asi.2431.

Alahmari, A., & Duncan, B. (2020, June). Cybersecurity risk management in small and medium-sized enterprises: A systematic review of recent evidence. In 2020 international conference on cyber situational awareness, data analytics and assessment (CyberSA) (pp. 1-5). IEEE.

Alawida, M., Omolara, A. E., Abiodun, O. I., & Al-Rajab, M. (2022). A deeper look into cybersecurity issues in the wake of Covid-19: A survey. Journal of King Saud University-Computer and Information Sciences, 34(2022), 8176-8206. https://doi.org/10.1016/j.jksuci.2022.08.003.

AlDaajeh, S., Saleous, H., Alrabaee, S., Barka, E., Breitinger, F., & Choo, K. K. R. (2022). The role of national cybersecurity strategies on the improvement of cybersecurity education. Computers & Security, 119(2022), 1-21. https://doi.org/10.1016/j.cose.2022.102754.

Belalcázar, A., Ron, M., Díaz, J., & Molinari, L. (2017, November). Towards a strategic resilience of applications through the NIST cybersecurity framework and the strategic alignment model (SAM). In 2017 International Conference on Information Systems and Computer Science (INCISCOS) (pp. 181-187). IEEE.

Chang, D. Y. (1996). Applications of the extent analysis method on fuzzy AHP. European journal of operational research, 95(3), 649-655. https://doi.org/10.1016/0377-2217(95)00300-2.

Cheng, E. C., & Wang, T. (2022). Institutional strategies for cybersecurity in higher education institutions. Information, 13(4), 1-14. https://doi.org/10.3390/info13040192.

Cvitić, I., Peraković, D., Periša, M., & Botica, M. (2017). An overview of the cyber security strategic management in Republic of Croatia. In RCITD—Proceedings in research conference in technical disciplines (pp. 13-18). Zilina: EDIS—Publishing Institution of the University of Zilina.

Dupont, B. (2019). The cyber-resilience of financial institutions: significance and applicability. Journal of cybersecurity, 5(1), 1-17. https://doi.org/10.1093/cybsec/tyz013.

Ganin, A. A., Quach, P., Panwar, M., Collier, Z. A., Keisler, J. M., Marchese, D., & Linkov, I. (2020). Multicriteria decision framework for cybersecurity risk assessment and management. Risk Analysis, 40(1), 183-199. https://doi.org/10.1111/risa.12891.

Ghafur, S., Grass, E., Jennings, N. R., & Darzi, A. (2019). The challenges of cybersecurity in health care: the UK National Health Service as a case study. The Lancet Digital Health, 1(1), 10-12. https://doi.org/10.1016/S2589-7500(19)30005-6.

Ghelani, D., Hua, T. K., & Koduru, S. K. R. (2022). Cyber Security Threats, Vulnerabilities, and Security Solutions Models in Banking. Authorea Preprints, 1(1), 1-9. https://doi.org/10.22541/ au.166385206.63311335/v1.

Goel, R., Kumar, A., & Haddow, J. (2020). PRISM: a strategic decision framework for cybersecurity risk assessment. Information & Computer Security, 28(4), 591-625. https://doi.org/10.1108/ICS-11-2018-0131.

He, S., Ficke, E., Pritom, M. M. A., Chen, H., Tang, Q., Chen, Q., Pendeleton, M., Nijilla, L., & Xu, S. (2022). Blockchain-based automated and robust cyber security management. Journal of Parallel and Distributed Computing, 163(2022), 62-82. https://doi.org/10.1016/j.jpdc.2022.01.002.

Jakka, G., Yathiraju, N., & Ansari, M. F. (2022). Artificial Intelligence in Terms of Spotting Malware and Delivering Cyber Risk Management. Journal of Positive School Psychology, 6(3), 6156-6165. https://journalppw.com/index.php/jpsp/article/view/3522.

Kabanov, I., & Madnick, S. (2021). Applying the Lessons from the Equifax Cybersecurity Incident to Build a Better Defense. MIS Quarterly Executive, 20(2), 109-125. https://aisel.aisnet.org/misqe/ vol20/iss2/4.

Kızılcan, L. S., & Mızrak, K. C. (2022). Cyber Attacks In Civil Aviation And The Concept Of Cyber Security. Idea Studies, 8(47), 742-752. http://dx.doi.org/10.2922.

Kure, H. I., Islam, S., & Razzaque, M. A. (2018). An integrated cyber security risk management approach for a cyber-physical system. Applied Sciences, 8(6), 898. https://doi.org/10.3390/app8060898.

Kumar, S., & Mallipeddi, R. R. (2022). Impact of cybersecurity on operations and supply chain management: Emerging trends and future research directions. Production and Operations Management, 31(12), 4488-4500. https://doi.org/10.1111/poms.13859.

Lee, I. (2021). Cybersecurity: Risk management framework and investment cost analysis. Business Horizons, 64(5), 659-671. https://doi.org/10.1016/j.bushor.2021.02.022.

Manley, M. (2015). Cyberspace’s dynamic duo: Forging a cybersecurity public-private partnership. Journal of Strategic Security, 8(3), 85-98. https://www.jstor.org/stable/26465248.

Mızrak, K. C., & Mızrak, F. (2020). Role of Agility in the Banking Sector in Competitive Globalization Era: Evidence From the Turkish Banking Sector. Hasan Dinçer, Serhat Yüksel (Ed). In Handbook of Research on Decision-Making Techniques in Financial Marketing içinde (pp. 317-334). IGI Global.

Mızrak, K. C. (2021). A Research on Effect of Performance Evaluation and Efficiency on Work Life. Hasan Dinçer, Serhat Yüksel (Ed). In Management Strategies to Survive in a Competitive Environment: How to Improve Company Performance içinde (pp. 387-400). Cham: Springer International Publishing.

Mohamed Mizan, N. S., Ma’arif, M. Y., Mohd Satar, N. S., & Shahar, S. M. (2019). CNDS-cybersecurity: issues and challenges in ASEAN countries. International Journal of Advanced Trends in Computer Science and Engineering, 8(1), 113-119. https://doi.org/10.30534/ijatcse/2019/1781.42019.

Munaiah, N., Pelletier, J., Su, S. H., Yang, S. J., & Meneely, A. (2019, November). A cybersecurity dataset derived from the national collegiate penetration testing competition. In HICSS Symposium on cybersecurity big data analytics.

Peterson, J., Haney, M., & Borrelli, R. A. (2019). An overview of methodologies for cybersecurity vulnerability assessments conducted in nuclear power plants. Nuclear Engineering and Design, 346(2019), 75-84. https://doi.org/10.1016/j.nucengdes.2019.02.025.

Raimundo, R. J., & Rosário, A. T. (2022). Cybersecurity in the internet of things in industrial management. Applied Sciences, 12(3), 1-19. https://doi.org/10.3390/app12031598.

Samtani, S., Abate, M., Benjamin, V., & Li, W. (2020). Cybersecurity as an industry: A cyber threat intelligence perspective. Thomas J. Holt, Adam M. Bossler (Ed). The Palgrave Handbook of International Cybercrime and Cyberdeviance içinde, 135-154.

Solfa, F. D. G. (2022). Impacts of Cyber Security and Supply Chain Risk on Digital Operations: Evidence from the Pharmaceutical Industry. International Journal of Technology, Innovation and Management (IJTIM), 2(2), 18-32. https://doi.org/10.54489/ijtim.v2i2.98.

Thach, N. N., Hanh, H. T., Huy, D. T. N., & Vu, Q. N. (2021). Technology quality management of the industry 4.0 and cybersecurity risk management on current banking activities in emerging markets-the case in Vietnam. International Journal for Quality Research, 15(3), 845-856. https://doi:10.24874/IJQR15.03-10.

Tvaronavičienė, M., Plėta, T., Della Casa, S., & Latvys, J. (2020). Cyber security management of critical energy infrastructure in national cybersecurity strategies: Cases of USA, UK, France, Estonia and Lithuania. Insights into regional development, 2(4), 802-813. https://dx.doi.org/10.9770/ ird.2020.2.4(6).

Wallis, T., & Dorey, P. (2023). Implementing Partnerships in Energy Supply Chain Cybersecurity Resilience. Energies, 16(4), 1-11. https://doi.org/10.3390/en16041868.

Downloads

Published

2023-10-18

How to Cite

Mızrak, F. (2023). Integration of Fuzzy AHP for Cybersecurity Strategy Development in International Organizations. Premium E-Journal of Social Science (PEJOSS), 7(35), 1272–1292. https://doi.org/10.5281/zenodo.10029089