2020
DOI: 10.1016/j.future.2019.12.018
|View full text |Cite
|
Sign up to set email alerts
|

Cybersecurity vulnerability mitigation framework through empirical paradigm: Enhanced prioritized gap analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0
8

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 28 publications
(19 citation statements)
references
References 38 publications
0
11
0
8
Order By: Relevance
“…The need for organization and policy rules to be electronically processable while at the same time humanly understandable [109]. In addition, from a policy perspective, there should be constant cybersecurity vulnerability assessment frameworks [110] to reach a cybersecurity maturity while considering the existence of different requirements in the context of various applications [111] and the requirements of other blockchain transactions, such as digital contract [73]. The last set of issues concerning policies discussed aspects such as the trust factor that requires constant assessment when dealing with or implementing blockchain in a specific project [78] or when the critical decision of the technology is based on set protocols [89].…”
Section: Policymentioning
confidence: 99%
See 1 more Smart Citation
“…The need for organization and policy rules to be electronically processable while at the same time humanly understandable [109]. In addition, from a policy perspective, there should be constant cybersecurity vulnerability assessment frameworks [110] to reach a cybersecurity maturity while considering the existence of different requirements in the context of various applications [111] and the requirements of other blockchain transactions, such as digital contract [73]. The last set of issues concerning policies discussed aspects such as the trust factor that requires constant assessment when dealing with or implementing blockchain in a specific project [78] or when the critical decision of the technology is based on set protocols [89].…”
Section: Policymentioning
confidence: 99%
“…Previous research has demonstrated the diversity of blockchain applications and the complexity attributed to the variations of techniques [81,115]. Moreover, blockchain plays a vital role in applications [111,116]. However, the generalization of blockchain is impossible and limits its applications and adherence to various standards [106].…”
Section: Policymentioning
confidence: 99%
“…This has resulted in cyber threats becoming an ever-present reality (Syed 2020 ). Existing defensive mechanisms have proved inadequate to address them and incidents of hacking have dominated the news media (Gourisetti et al 2020 ). The methods employed include ransomware, malware, spam emails, and malicious domains (Khan et al 2020 ).…”
Section: Related Literature Reviewmentioning
confidence: 99%
“…The opposite also applies. [20,59,60] The above-mentioned challenges of implementing water-related and other critical infrastructure cybersecurity safeguards are mostly at an organisational level [61]. However, government policy and legislation and international cooperation on fighting cybercrime can help deter the would-be attackers in various ways.…”
Section: International Water-specific Cybersecurity Challengesmentioning
confidence: 99%