Cybersecurity, Threat Analysis and the Management of Risk

A special issue of Big Data and Cognitive Computing (ISSN 2504-2289).

Deadline for manuscript submissions: closed (15 November 2021) | Viewed by 67711

Special Issue Editors

Special Issue Information

Dear Colleagues,

The Special Issue “Cybersecurity, Threat Analysis and the Management of Risk” aims to bring together researchers from various fields of study, across academia and industry, to provide insights into the cybersecurity issues and challenges that managers within organizations and policymakers are generally confronted with. A key focus of the Special Issue will be to show how researchers are investigating the various forms of cyber threats that exist and how they are deriving solutions to current and unexpected acts of cybercrime. It is envisaged that a range of papers will be forthcoming that cover various perspectives of the topic. For example, papers of a quantitative nature as well as papers of a qualitative nature are welcome. Papers may be theoretical, empirical, written in the form of a literature review or presented as a case study. The main emphasis is to have a collection of papers that broaden the scope and interpretation of cybersecurity so that the threats identified can be prioritized and the risk established. Of interest is a mix of theoretical and applied papers outlining current knowledge and offering unique solutions or interpretations of the subject matter; alternatively, critique based on the facts established would be appreciated.      

The Special Issue will complement the existing literature and broaden our knowledge by placing cybersecurity within a wider context. The papers submitted are expected to cover a number of academic fields and link concepts and models with management applications and government policy. Papers can be very specific in nature or broad-based and need to be of interest to various audiences including academics, researchers, students, business practitioners and government representatives. 

Potential topics include, but are not limited to the following:

Artifical intelligence and human interaction;

Big data—in the context of management systems, government guidelines and policies and keeping data secure;

Cognitive prcoesses and learning;

Cybercrime and its various forms;

Cybersecurity challenges and solutions;

Cyberterrorism and the nature of the threat;

Cyberwarfare in the context of new approaches to warfare;

Impact analysis and how to undertake it;

Information management and the role of the risk manager;

Information systems and how to secure intra- and intercompany connections;

People and technology and identifying vulnenerabilites;

Risk analysis and various approaches;

Risk managament and associated responsibilities;

Strategy and planning in the context of dealing with risk and uncertainty;

Threat analysis and how it is managed;

Scenario analysis and planning in the context of dealing with crises.

Dr. Peter R.J. Trim
Dr. Yang-Im Lee
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Big Data and Cognitive Computing is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1800 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • artifical intelligence
  • big data
  • the cloud, cognitive prcoesses
  • cybercrime
  • cybersecurity
  • cyberterrorism
  • cyberwarfare
  • data storage
  • impact analysis
  • information management
  • information systems
  • people and technology
  • risk analysis
  • risk management
  • strategy and planning
  • threat analysis
  • scenario analysis and planning

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (3 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

16 pages, 865 KiB  
Article
The Global Cyber Security Model: Counteracting Cyber Attacks through a Resilient Partnership Arrangement
by Peter R.J. Trim and Yang-Im Lee
Big Data Cogn. Comput. 2021, 5(3), 32; https://doi.org/10.3390/bdcc5030032 - 13 Jul 2021
Cited by 13 | Viewed by 7047
Abstract
In this paper, insights are provided into how senior managers can establish a global cyber security model that raises cyber security awareness among staff in a partnership arrangement and ensures that cyber attacks are anticipated and dealt with in real time. We deployed [...] Read more.
In this paper, insights are provided into how senior managers can establish a global cyber security model that raises cyber security awareness among staff in a partnership arrangement and ensures that cyber attacks are anticipated and dealt with in real time. We deployed a qualitative research strategy that involved a group interview involving cyber security and intelligence experts. The coding approach was used to identify the themes in the data and, in addition, a number of categories and subcategories were identified. The mind map approach was utilized to identify the thought processes of senior managers in relation to ensuring that the cyber security management process is effective. The global cyber security model can be used by senior managers to establish a framework for dealing with a range of cyber security attacks, as well as to upgrade the cyber security skill and knowledge base of individuals. In order for a cyber security mentality to be established, senior managers need to ensure that staff are focused on organizational vulnerability and resilience, there is an open and transparent communication process in place, and staff are committed to sharing cyber security knowledge. By placing cyber security within the context of a partnership arrangement, senior managers can adopt a collectivist approach to cyber security and benefit from the knowledge of external experts. Full article
(This article belongs to the Special Issue Cybersecurity, Threat Analysis and the Management of Risk)
Show Figures

Figure 1

19 pages, 1727 KiB  
Article
Proposal for Customer Identification Service Model Based on Distributed Ledger Technology to Transfer Virtual Assets
by Keundug Park and Heung-Youl Youm
Big Data Cogn. Comput. 2021, 5(3), 31; https://doi.org/10.3390/bdcc5030031 - 13 Jul 2021
Cited by 5 | Viewed by 4744
Abstract
Recently, cross-border transfers using blockchain-based virtual assets (cryptocurrency) have been increasing. However, due to the anonymity of blockchain, there is a problem related to money laundering because the virtual asset service providers cannot identify the originators and the beneficiaries. In addition, the international [...] Read more.
Recently, cross-border transfers using blockchain-based virtual assets (cryptocurrency) have been increasing. However, due to the anonymity of blockchain, there is a problem related to money laundering because the virtual asset service providers cannot identify the originators and the beneficiaries. In addition, the international anti-money-laundering organization (the Financial Action Task Force, FATF) has placed anti-money-laundering obligations on virtual asset service providers through anti-money-laundering guidance for virtual assets issued in June 2019. This paper proposes a customer identification service model based on distributed ledger technology (DLT) that enables virtual asset service providers to verify the identity of the originators and beneficiaries. Full article
(This article belongs to the Special Issue Cybersecurity, Threat Analysis and the Management of Risk)
Show Figures

Figure 1

15 pages, 303 KiB  
Article
Assessment of Cybersecurity Awareness among Students of Majmaah University
by Talal Alharbi and Asifa Tassaddiq
Big Data Cogn. Comput. 2021, 5(2), 23; https://doi.org/10.3390/bdcc5020023 - 10 May 2021
Cited by 46 | Viewed by 54049
Abstract
Information exchange has become increasingly faster and efficient through the use of recent technological advances, such as instant messaging and social media platforms. Consequently, access to information has become easier. However, new types of cybersecurity threats that typically result in data loss and [...] Read more.
Information exchange has become increasingly faster and efficient through the use of recent technological advances, such as instant messaging and social media platforms. Consequently, access to information has become easier. However, new types of cybersecurity threats that typically result in data loss and information misuse have emerged simultaneously. Therefore, maintaining data privacy in complex systems is important and necessary, particularly in organizations where the vast majority of individuals interacting with these systems is students. In most cases, students engage in data breaches and digital misconduct due to the lack of knowledge and awareness of cybersecurity and the consequences of cybercrime. The aim of this study was to investigate and evaluate the level of cybersecurity awareness and user compliance among undergraduate students at Majmaah University using a scientific questionnaire based on several safety factors for the use of the Internet. We quantitatively evaluated the knowledge of cybercrime and protection among students to show the need for user education, training, and awareness. In this study, we used a quantitative research methodology and conducted different statistical tests, such as ANOVA, Kaiser–Meyer–Olkin (KMO), and Bartlett’s tests, to evaluate and analyze the hypotheses. Safety concerns for electronic emails, computer viruses, phishing, forged ads, popup windows, and supplementary outbreaks on the Internet were well-examined in this study. Finally, we present recommendations based on the collected data to deal with this common problem. Full article
(This article belongs to the Special Issue Cybersecurity, Threat Analysis and the Management of Risk)
Show Figures

Figure 1

Back to TopTop