Abstract

The consequences of the fourth industrial revolution caused an increase in the level of computerization and digitalization of society, which led to problems related to the protection of information of individual users, companies and the state as a whole. The aim of this paper is to analyze the effectiveness of the information security system of countries in terms of its ability to counter information threats. Two groups of input indicators were used for this purpose. The first group was formed by 12 indicators of the country’s world development, which were selected from the World Bank database and based on the results of correlation analysis. The second group includes 5 information technology indicators that characterize certain areas of information security: information technology development, digitalization of the country, countries’ commitment to cybersecurity, readiness to counter cyber threats and use the latest information and communication technologies. The country’s information security threat index is used as a starting point. Data from 159 countries of the world for 2018 were taken for the analysis, as for this number of countries and period there is a complete set of data on selected indicators. Country data were considered based on clusters, which allowed the use of 7 groups. The analysis was performed using the analytical tool Frontier Analyst. The study built CRR and BCC models, among which CRR was preferred, which allowed a more critical assessment of the potential of countries. The paper analyzes the structural effectiveness of socio-economic development indicators and information security indicators of countries, considering the current level of the information security threat index. As a result, the following were identified: an increase in government security spending for zero-cluster countries; the need to transform the information technology component for the countries of the first and second clusters; increasing personal protection, strengthening corruption control and legal regulation for third cluster countries; the need for economic growth and higher social standards for the fourth, fifth and sixth clusters. The obtained models allowed us to estimate the maximum level of growth of the information security threat index with the available resource potential of the country. As a result, it was found that the largest increase in the information security threat index is possible due to the existing potential of the countries of the zero and fifth clusters, which will increase the effectiveness of their response to information threats. Keywords: BBC-model, CCR-model, Data Envelopment Analysis, socio-economic development, information, threat, security.

Highlights

  • The consequences of the fourth industrial revolution “Industry 4.0” led to the emergence of the latest cyberphysical systems and digital technologies, which have influenced the development of many areas of the economy

  • When determining the minimum weights, it was taken into account that security indicators have an equivalent effect on the index of information security threats

  • The application of Data Envelopment Analysis in this work allowed to determine the effectiveness of the information security system of the countries grouped in clusters, considering the level of their socioeconomic development and the development of various areas of information security

Read more

Summary

Introduction

The consequences of the fourth industrial revolution “Industry 4.0” led to the emergence of the latest cyberphysical systems and digital technologies, which have influenced the development of many areas of the economy. “smart” businesses have emerged, most trading operations have been transferred online to web platforms, and the use of mobile and Internet banking has supplanted cash transactions. The population prefers to use the Internet, software, and mobile applications in everyday life, which facilitates many transactions, from fares on public transport to banking transactions. The rapid computerization, digitization, and informatization of many processes have contributed to the rise of cybercrime in society This manifests itself in hacking attacks, cyber-fraud to steal personal and confidential information of a person or company, creating and spreading viruses to damage user data, conducting information wars aimed at shaking society, which can lead to economic and social crisis, and so on. There is a need to create a set of measures to combat such threats, which is manifested in the formation of information security, which aims to ensure the integrity, confidentiality and protection of information to prevent its unauthorized use, theft, distortion, alteration, damage and destruction

Objectives
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.