Analyzing and Evaluating Critical Cyber Security Challenges Faced by Vendor Organizations in Software Development: SLR Based Approach
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Khan, Abdul Wahid | - |
dc.contributor.author | Zaib, Shah | - |
dc.contributor.author | Khan, Faheem | - |
dc.contributor.author | Tarimer, Ilhan | - |
dc.contributor.author | Seo, Jung Taek | - |
dc.contributor.author | Shin, Jiho | - |
dc.date.accessioned | 2022-08-29T03:40:07Z | - |
dc.date.available | 2022-08-29T03:40:07Z | - |
dc.date.created | 2022-08-19 | - |
dc.date.issued | 2022-06 | - |
dc.identifier.issn | 2169-3536 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/85326 | - |
dc.description.abstract | Security is the protection from various kinds of threats and most organizations engage in the challenge of security especially cyber-attacks. The attacks are increasing rapidly, due to which cyber security does not now change on supervised and pattern-based detection algorithms which assure continuous security observing. There are many kinds of problems in vendor organizations like cyber theft, which is the most common attack in cyberspace. This research study is developing a Cyber Security Challenges Model (CSCM) that will facilitate vendors' organizations to identify challenges of cyber security during the development of software in a vendor organization. To find cyber security issues/challenges, a Systematic Literature Review (SLR) is conducted on 44 relevant research publications by developing a search string based on research questions. As the final selected research publications were less in number and did not complete our aim, therefore, snow bowling technique is applied to 67 relevant research publications. This relevant data was comprised of different databases/sources e.g., Google Scholar, IEEE Explore, SpringerLink, ACM Digital Library, anFffid ScienceDirect. Furthermore, for the distinctive literature review, we've carried out all of the steps in SLR, for example, improvement of SLR protocol, initials, and a very last collection of the applicable information, data extraction, data quality assessment, and data synthesis. Thirteen (13) critical cyber security challenges are identified which are; "Security issues/Access of Cyberattacks", "Lack of Right Knowledge", "Framework", "Lack of Technical Support", "Disaster Issues", "Cost Security issues", "Lack of Confidentiality and Trust", "Lack of Management", "Unauthorized Access issues", "Lack of Resources", "Lack of Metrics", "Administrative Mistakes during Development" and "Lack of Quality, Liability, and Reliability". The findings of our analysis study signify the similarities and dissimilarities in the recognized cybersecurity challenges in different decades, companies/firms, continents, databases, and methodologies. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC | - |
dc.relation.isPartOf | IEEE ACCESS | - |
dc.title | Analyzing and Evaluating Critical Cyber Security Challenges Faced by Vendor Organizations in Software Development: SLR Based Approach | - |
dc.type | Article | - |
dc.type.rims | ART | - |
dc.description.journalClass | 1 | - |
dc.identifier.wosid | 000815505600001 | - |
dc.identifier.doi | 10.1109/ACCESS.2022.3179822 | - |
dc.identifier.bibliographicCitation | IEEE ACCESS, v.10, pp.65044 - 65054 | - |
dc.description.isOpenAccess | Y | - |
dc.identifier.scopusid | 2-s2.0-85131741515 | - |
dc.citation.endPage | 65054 | - |
dc.citation.startPage | 65044 | - |
dc.citation.title | IEEE ACCESS | - |
dc.citation.volume | 10 | - |
dc.contributor.affiliatedAuthor | Khan, Faheem | - |
dc.contributor.affiliatedAuthor | Seo, Jung Taek | - |
dc.type.docType | Article | - |
dc.subject.keywordAuthor | Computer crime | - |
dc.subject.keywordAuthor | Organizations | - |
dc.subject.keywordAuthor | Computer security | - |
dc.subject.keywordAuthor | Information security | - |
dc.subject.keywordAuthor | Safety | - |
dc.subject.keywordAuthor | Bibliographies | - |
dc.subject.keywordAuthor | Licenses | - |
dc.subject.keywordAuthor | Cybersecurity | - |
dc.subject.keywordAuthor | challenges | - |
dc.subject.keywordAuthor | SLR | - |
dc.subject.keywordAuthor | vendor | - |
dc.subject.keywordAuthor | software development | - |
dc.subject.keywordAuthor | SPSS | - |
dc.subject.keywordPlus | INFORMATION SECURITY | - |
dc.subject.keywordPlus | CYBERSECURITY | - |
dc.subject.keywordPlus | THREATS | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
1342, Seongnam-daero, Sujeong-gu, Seongnam-si, Gyeonggi-do, Republic of Korea(13120)031-750-5114
COPYRIGHT 2020 Gachon University All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.