The research objectives were: 1) to develop cyber resilient model, 2) to develop the cyber resilient capability maturity model and 3) to develop self-assessment model for cyber resilient capability of cloud computing services which are qualitative and applicative research. Referring to the cybersecurity concept from National Institute of Standards and Technology (NIST) from the in-depth interview, focusgroup discussion was developed with cybersecurity experts and data collection from cloud services providers. It was found that trend of cyber-attacks was violent with smarter method. The authors had synthesized the concept of cyber resilient capability maturity model for cloud computing services including developed application for cloud services providers to evaluate their organization in order to improve the better cybersecurity level in cloud computing services and the cyber resilient capability maturity model in the future.
Thailand like many other nations and governments has been plagued with countless incidents of corruption and inefficiency. However, even though the primary causes of these problems remain uncertain, there are methods available today to reduce the ongoing systemic problems. One of the potential solutions lies in using secure document interchange architecture (DIA) with blockchain technology. Using a quantitative research design and cluster sampling across 20 Thai ministries and related agencies, 500 individuals eventually participated in the study. A five-level scale questionnaire was used as the research instrument. The structural equation model (SEM) was analysed to validate the consistency of the empirical data. The results of the research indicated that after adjusting the SEM by increasing the relationship between the errors, the consistency with the empirical data of the model was very good. Of the eight hypotheses examined, all were found to be positive. However, social and cultural aspects (SCA) had the greatest positive influence on strategy/policies/legal approaches (SPL) (r = 0.72*). This was closely followed by SPL’s influence on secure electronic transaction DIA (SET) (r = 0.68*), and technology (TEC) on security semantics (SEC) (r = 0.62*). However, SEC was deemed to have the least influence on secure electronic transaction DIA (SET) (r = 0.31*). Overall, there was a high level of satisfaction with the prototype system, with the architectural efficiency showing networked integrity while verifying and authenticating with the accuracy of the electronic documents. Also from the use of electronic signatures, electronic documents could be verified and authenticated as well. Networked integrity was also proven as the DIA system could validate the accuracy and authenticity of electronic documents.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.