2022
DOI: 10.1504/ijes.2022.124854
|View full text |Cite
|
Sign up to set email alerts
|

National cybersecurity: assessment, risks and trends

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…The architecture of the system for countering the spread of harmful information in social networks includes eight components and three levels (Figure 6) -management level: visualization component, management component; content assessment level: component of assessment and analysis of message sources, database, SQL server; level of implementation of countermeasures: component of selection of countermeasures, component of implementation of countermeasures. The input data of the method of countering the spread of harmful information in social networks are: parameters of objects of influence, according to which the operator distributes the sequence of making a decision on countermeasures; established "target-countermeasure" matches to counter the spread of harmful information in social networks through available implementation agents; countermeasures and their coefficients, information threats, available agents for the implementation of countermeasures, signs [21].…”
Section: Fig 5 Methods Of Countering the Spread And Detection Of Harm...mentioning
confidence: 99%
“…The architecture of the system for countering the spread of harmful information in social networks includes eight components and three levels (Figure 6) -management level: visualization component, management component; content assessment level: component of assessment and analysis of message sources, database, SQL server; level of implementation of countermeasures: component of selection of countermeasures, component of implementation of countermeasures. The input data of the method of countering the spread of harmful information in social networks are: parameters of objects of influence, according to which the operator distributes the sequence of making a decision on countermeasures; established "target-countermeasure" matches to counter the spread of harmful information in social networks through available implementation agents; countermeasures and their coefficients, information threats, available agents for the implementation of countermeasures, signs [21].…”
Section: Fig 5 Methods Of Countering the Spread And Detection Of Harm...mentioning
confidence: 99%
“…Nguyen, et al (2022) use DEA to evaluate the production efficiency of cybersecurity firms. Voronenko, et al (2022) use DEA to analyze various European countries' efficiencies in the context of cybersecurity, and then use that analysis to identify main vulnerabilities in the specific country of Ukraine.…”
Section: Data Envelopment Analysis (Dea) Efficiency Modelmentioning
confidence: 99%
“…Global challenges also contribute to their development. For example, such crises as the COVID-19 pandemic impose severe restrictions on societal changes, which can cause destructive processes in society and the economy (Dečman et al, 2022;Voronenko et al, 2022). On the other hand, such challenges cause an even more rapid development of digitalization, which becomes a favourable factor for minimizing the negative consequences for the countries' socio-economic development (Dluhopolskyi et al, 2023).…”
Section: Literature Reviewmentioning
confidence: 99%