Detailed Information

Cited 5 time in webofscience Cited 10 time in scopus
Metadata Downloads

Analyzing and Evaluating Critical Cyber Security Challenges Faced by Vendor Organizations in Software Development: SLR Based Approachopen access

Authors
Khan, Abdul WahidZaib, ShahKhan, FaheemTarimer, IlhanSeo, Jung TaekShin, Jiho
Issue Date
Jun-2022
Publisher
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
Keywords
Computer crime; Organizations; Computer security; Information security; Safety; Bibliographies; Licenses; Cybersecurity; challenges; SLR; vendor; software development; SPSS
Citation
IEEE ACCESS, v.10, pp.65044 - 65054
Journal Title
IEEE ACCESS
Volume
10
Start Page
65044
End Page
65054
URI
https://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/85326
DOI
10.1109/ACCESS.2022.3179822
ISSN
2169-3536
Abstract
Security is the protection from various kinds of threats and most organizations engage in the challenge of security especially cyber-attacks. The attacks are increasing rapidly, due to which cyber security does not now change on supervised and pattern-based detection algorithms which assure continuous security observing. There are many kinds of problems in vendor organizations like cyber theft, which is the most common attack in cyberspace. This research study is developing a Cyber Security Challenges Model (CSCM) that will facilitate vendors' organizations to identify challenges of cyber security during the development of software in a vendor organization. To find cyber security issues/challenges, a Systematic Literature Review (SLR) is conducted on 44 relevant research publications by developing a search string based on research questions. As the final selected research publications were less in number and did not complete our aim, therefore, snow bowling technique is applied to 67 relevant research publications. This relevant data was comprised of different databases/sources e.g., Google Scholar, IEEE Explore, SpringerLink, ACM Digital Library, anFffid ScienceDirect. Furthermore, for the distinctive literature review, we've carried out all of the steps in SLR, for example, improvement of SLR protocol, initials, and a very last collection of the applicable information, data extraction, data quality assessment, and data synthesis. Thirteen (13) critical cyber security challenges are identified which are; "Security issues/Access of Cyberattacks", "Lack of Right Knowledge", "Framework", "Lack of Technical Support", "Disaster Issues", "Cost Security issues", "Lack of Confidentiality and Trust", "Lack of Management", "Unauthorized Access issues", "Lack of Resources", "Lack of Metrics", "Administrative Mistakes during Development" and "Lack of Quality, Liability, and Reliability". The findings of our analysis study signify the similarities and dissimilarities in the recognized cybersecurity challenges in different decades, companies/firms, continents, databases, and methodologies.
Files in This Item
There are no files associated with this item.
Appears in
Collections
IT융합대학 > 컴퓨터공학과 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Khan, Faheem photo

Khan, Faheem
College of IT Convergence (컴퓨터공학부(컴퓨터공학전공))
Read more

Altmetrics

Total Views & Downloads

BROWSE