Evaluating the threat to national information security
-
DOIhttp://dx.doi.org/10.21511/ppm.18(3).2020.17
-
Article InfoVolume 18 2020, Issue #3, pp. 195-210
- Cited by
- 858 Views
-
137 Downloads
This work is licensed under a
Creative Commons Attribution 4.0 International License
An effective strategy for managing the national information security with capabilities to resist information threats significantly impacts its further development. This study aims to assess the level of threat to the information security of countries based on the integral index. It is proposed to use five indicators characterizing individual areas of information security and 37 world development indicators, selected from the World Bank database. Correlation analysis selected 12 out of 37 development indicators relevant to security indicators for which the correlation coefficient exceeded 0.5 or –0.5. The Harrington-Mencher function is proposed to determine the information security threat index. Nonlinear normalization was carried out to bring the initial data to a comparable measurement. Canonical analysis was performed to determine the indicator weights. The data from 159 countries were taken for 2018 to assess the index. The result was presented on the map showing countries’ distribution by the information security threat index, thus forming five groups. The group with a “very well” resistance to threats includes economically developed countries with a high level of information security. The “well” group was formed by new industrial and developing countries with economic potential sufficient to prevent information threats and combat their consequences. The information security level in developing countries, where the results of overcoming information threats will affect the economic sphere, is defined as “acceptable”. Countries with a low level of development and information security formed groups designated as “bad” and “very bad”, which indicates a high level of threats to their information security.
Acknowledgment
This work is carried out with in the tax payer – funded researches: No. 0118U003574 “Cybersecurity in the banking fraud enforcement: protection of financial service consumers and the financial and economic security growth in Ukraine”.
- Keywords
-
JEL Classification (Paper profile tab)C10, C43, O30
-
References34
-
Tables6
-
Figures5
-
- Figure 1. Bibliometric map constructed based on keywords from publications on the Scopus database
- Figure 2. Results of correlation analysis
- Figure 3. Graph of the second type of the curve for GDP per capita
- Figure 4. Graph of the first type of curve for Control of corruption: estimate
- Figure 5. Map of the distribution of countries according to the information security threat index
-
- Table 1. Quantitative and qualitative interpretation of the information security threat level index
- Table 2. Normalized components of the information security threat index (fragment)
- Table 3. Results of canonical analysis
- Table 4. The values of components of the information security threat index reduced to the dimensionless Harrington desirability scale (fragment)
- Table 5. Calculations of Harrington-Mencher transformation values (fragment)
- Table 1A. World Development Indicators
-
- Aldhous, P. (2020). A Security Breach Exposed More Than One Million DNA Profiles On A Major Genealogy Database.
- Anscombe, T. (2020). Beware scams exploiting coronavirus fears.
- Bekmuratov, T. F., Ganiev, A. A., & Botirov, F. B. (2020). Concept of establishing multi-agent intellectual automatically systems in the enterprise. International Journal of Scientific and Technology Research, 9(4), 347-352.
- Brožová, H., Šup, L., Rydval, J., Sadok, M., & Bednar, P. (2016). Information security management: ANP based approach for risk analysis and decision making. Agris On-line Papers in Economics and Informatics, 8(1), 13-23.
- Burke, W., Oseni, T., Jolfaei, A., & Gondal, I. (2019, January). Cybersecurity Indexes for eHealth. In Proceedings of the 2019 Australasian Computer Science Week Multiconference, ACSW 2019 (Australia, Sydney, January, 2019), ACM International Conference Proceeding Series, Article No.: 17 (pp. 1-8).
- Cardholm, L. (2015). Identifying the business value of information security. In Banking, Finance, and Accounting: Concepts, Methodologies, Tools, and Applications (pp. 1056-1079).
- Deane, J. K., Goldberg, D. M., Rakes, T. R., & Rees, L. P. (2019). The effect of information security certification announcements on the market value of the firm. Information Technology and Management, 20(3), 107-121.
- Dincelli, E. (2018). The role of national culture in shaping information security and privacy behaviors. In D. Siegel (Ed.), World Scientific Reference on Innovation: Volume 4: Innovation in Information Security (pp. 47-68).
- Dorosh, M., Voitsekhovska, M., & Balchenko, I. (2019, January). Research and Determination of Personal Information Security Culture Level Using Fuzzy Logic Methods. In Proceedings of the 2nd International Conference on Computer Science, Engineering and Education Applications, ICCSEEA 2019 (Ukraine, Kiev, 29 March 2019), Advances in Intelligent Systems and Computing, Volume 938 (pp. 503-512).
- Dumas, E. (2020). Mobile adware: The Silent Plague with No Origin.
- e-Governance Academy Foundation. (2020). National Cyber Security Index.
- Frolova, E. E., Polyakova, T. A., Dudin, M. N., Rusakova, E. P., & Kucherenko, P. A. (2018). Information security of Russia in the digital economy: The economic and legal aspects. Journal of Advanced Research in Law and Economics, 9(1), 89-95.
- Harrington, E. (1965). The Desirability Function. Industrial Quality Control, 21, 10, 494-498.
- Jazri, H., Zakaria, O., & Chikohora, E. (2018, May). Measuring cybersecurity wellness index of critical organisations. Paper presented at 2018 IST-Africa Week Conference, IST-Africa 2018 (Botswana, Gaborone, May 2018), Institute of Electrical and Electronics Engineers Inc.
- Kirilenko, V. P., & Alexeyev, G. V. (2018). Political technologies and international conflicts in the information space of the Baltic Sea region. Baltic Region, 10(4), 20-38.
- Ključnikov, A., Mura, L., & Sklenár, D. (2019). Information security management in smes: Factors of success. Entrepreneurship and Sustainability Issues, 6(4), 2081-2094.
- Klyaus, T. K., & Gatchin, Yu. A. (2020, June). Mathematical model for information security system effectiveness evaluation against advanced persistent threat attacks. Paper presented at 2020 Wave Electronics and its Application in Information and Telecommunication Systems, WECONF 2020 (Russian Federation, Saint-Petersburg, 1-5 June 2020), Institute of Electrical and Electronics Engineers Inc.
- Kosevich, E. (2020). Estrategias de seguridad cibernética en los países de América Latina [Cyber security strategies of Latin America countries]. Iberoamerica, 1, 137-159. (In Spanish).
- Kshetri, N. (2017). An opinion on the ‘Report on Securing and Growing the Digital Economy. IEEE Security and Privacy, 15(1), 80-85.
- Mencher, Eh. M., & Zemshman, A. Ja. (1986). Osnovy planirovaniya eksperimenta s elementami matematicheskoy statistiki v issledovanii po vinogradstvu [Basics of planning an experiment with elements of mathematical statistics in a study on viticulture]. Kishinev: Shtiintsa. (In Russian).
- Morrow, S., & Crabtree, T. (2019). The future of cybercrime & security. Threat Analysis, Impact Assessment & Mitigation Strategies 2019–2024.
- Omirzhanov, Y., Baimagambetova, Z., Tusupova, A., Omirtay, R., & Uteuliev, S. (2017). On the national security correlation with freedom of speech in Kazakhstan. Journal of Advanced Research in Law and Economics, 8(3), 980-986.
- Park, S. (2019). Why information security law has been ineffective in addressing security vulnerabilities: Evidence from California data breach notifications and relevant court and government records. International Review of Law and Economics, 58, 132-145.
- Popova, L., Korostelkina, I., Dedkova, E., & Korostelkin, M. (2019, October). Information Risks and Threats of the Digital Economy of the XXI Century: Objective Prerequisites and Management Mechanisms. In T. Antipova & Á. Rocha (Eds.), Digital Science 2019. DSIC 2019. Advances in Intelligent Systems and Computing, vol. 1114. Springer, Cham.
- Schmitz, C., & Pape, S. (2020). LiSRA: Lightweight Security Risk Assessment for decision support in information security. Computers and Security, 90, 101656.
- Scopus. (2020). Analyze search results.
- Singh, A. N., & Gupta, M. P. (2019). Information Security Management Practices: Case Studies from India. Global Business Review, 20(1), 253-271.
- Sonny, Z. (2011). National security in Malaysia’s digital economy: Redefinition, reaction and legal reform. Journal of Applied Sciences Research, 7(special issue), 2316-2325.
- StatSoft. (2020). Produkty STATISTICA [STATISTICA products]. (In Russian).
- The World Bank. (2020). World Development Indicators.
- Topa, I., & Karyda, M. (2019). From theory to practice: guidelines for enhancing information security management. Information and Computer Security, 27(3), 326-342.
- VOSviewer. (2020). Download VOSviewer.
- Warkentin, M., & Orgeron, C. (2020). Using the security triad to assess blockchain technology in public sector applications. International Journal of Information Management, 52, 102090.
- Yunis, M. M., & Koong, K. S. (2015). A conceptual model for the development of a national cybersecurity index: An integrated framework. Paper presented at 21st Americas Conference on Information Systems, AMCIS 2015 (Puerto Rico,El Conquistador Resort and Convention Center Fajardo).