Enterprise information security risks: a systematic review of the literature

Descripción del Articulo

Currently, computer security or cybersecurity is a relevant aspect in the area of networks and communications of a company, therefore, it is important to know the risks and computer security policies that allow a unified management of cyber threats that only seek to affect the reputation or profit f...

Descripción completa

Detalles Bibliográficos
Autores: Andrade Arenas, Laberiano Matías, Lavalle Sandoval, Jenner, Cabanillas-Carbonell, Michael, Hernández Celis, Domingo
Formato: artículo
Fecha de Publicación:2023
Institución:Universidad Tecnológica del Perú
Repositorio:UTP-Institucional
Lenguaje:inglés
OAI Identifier:oai:repositorio.utp.edu.pe:20.500.12867/7931
Enlace del recurso:https://hdl.handle.net/20.500.12867/7931
https://doi.org/10.11591/ijeecs.v31.i3
Nivel de acceso:acceso abierto
Materia:Information security
Cybersecurity
Risk management
Systematic literature review
https://purl.org/pe-repo/ocde/ford#1.02.00
id UTPD_2f0da511df9abf54d61525850a74ecc7
oai_identifier_str oai:repositorio.utp.edu.pe:20.500.12867/7931
network_acronym_str UTPD
network_name_str UTP-Institucional
repository_id_str 4782
dc.title.es_PE.fl_str_mv Enterprise information security risks: a systematic review of the literature
title Enterprise information security risks: a systematic review of the literature
spellingShingle Enterprise information security risks: a systematic review of the literature
Andrade Arenas, Laberiano Matías
Information security
Cybersecurity
Risk management
Systematic literature review
https://purl.org/pe-repo/ocde/ford#1.02.00
title_short Enterprise information security risks: a systematic review of the literature
title_full Enterprise information security risks: a systematic review of the literature
title_fullStr Enterprise information security risks: a systematic review of the literature
title_full_unstemmed Enterprise information security risks: a systematic review of the literature
title_sort Enterprise information security risks: a systematic review of the literature
author Andrade Arenas, Laberiano Matías
author_facet Andrade Arenas, Laberiano Matías
Lavalle Sandoval, Jenner
Cabanillas-Carbonell, Michael
Hernández Celis, Domingo
author_role author
author2 Lavalle Sandoval, Jenner
Cabanillas-Carbonell, Michael
Hernández Celis, Domingo
author2_role author
author
author
dc.contributor.author.fl_str_mv Andrade Arenas, Laberiano Matías
Lavalle Sandoval, Jenner
Cabanillas-Carbonell, Michael
Hernández Celis, Domingo
dc.subject.es_PE.fl_str_mv Information security
Cybersecurity
Risk management
Systematic literature review
topic Information security
Cybersecurity
Risk management
Systematic literature review
https://purl.org/pe-repo/ocde/ford#1.02.00
dc.subject.ocde.es_PE.fl_str_mv https://purl.org/pe-repo/ocde/ford#1.02.00
description Currently, computer security or cybersecurity is a relevant aspect in the area of networks and communications of a company, therefore, it is important to know the risks and computer security policies that allow a unified management of cyber threats that only seek to affect the reputation or profit from the confidential information of organizations in the business sector. The objective of the research is to conduct a systematic review of the literature through articles published in databases such as Scopus and Dimension. Thus, in order to perform a complete documentary analysis, inclusion and exclusion criteria were applied to evaluate the quality of each article. Then, using a quantitative scale, articles were filtered according to author, period and countryof publication, leaving a total of 86 articles from both databases. The methodology used was the one proposed by Kitchenham, and the conclusion reached was that the vast majority of companies do not make a major investment in the purchase of equipment andimprovement of information technology (IT)infrastructure, exposing themselves to cyber-attacks that continue to grow every day. This research provides an opportunity for researchers, companies and entrepreneurs to consult so that they can protect their organization's most important assets
publishDate 2023
dc.date.accessioned.none.fl_str_mv 2023-11-24T01:44:14Z
dc.date.available.none.fl_str_mv 2023-11-24T01:44:14Z
dc.date.issued.fl_str_mv 2023
dc.type.es_PE.fl_str_mv info:eu-repo/semantics/article
dc.type.version.es_PE.fl_str_mv info:eu-repo/semantics/publishedVersion
format article
status_str publishedVersion
dc.identifier.issn.none.fl_str_mv urn:issn: 2502-4760
dc.identifier.uri.none.fl_str_mv https://hdl.handle.net/20.500.12867/7931
dc.identifier.journal.es_PE.fl_str_mv Indonesian Journal of Electrical Engineering and Computer Science
dc.identifier.doi.none.fl_str_mv https://doi.org/10.11591/ijeecs.v31.i3
identifier_str_mv urn:issn: 2502-4760
Indonesian Journal of Electrical Engineering and Computer Science
url https://hdl.handle.net/20.500.12867/7931
https://doi.org/10.11591/ijeecs.v31.i3
dc.language.iso.es_PE.fl_str_mv eng
language eng
dc.relation.ispartof.none.fl_str_mv urn:issn: 2502-4760
dc.relation.ispartofseries.none.fl_str_mv Indonesian Journal of Electrical Engineering and Computer Science;vol. 31, n° 3
dc.rights.es_PE.fl_str_mv info:eu-repo/semantics/openAccess
dc.rights.uri.es_PE.fl_str_mv http://creativecommons.org/licenses/by-sa/4.0/
eu_rights_str_mv openAccess
rights_invalid_str_mv http://creativecommons.org/licenses/by-sa/4.0/
dc.format.es_PE.fl_str_mv application/pdf
dc.publisher.es_PE.fl_str_mv Institute of Advanced Engineering and Science
dc.publisher.country.es_PE.fl_str_mv ID
dc.source.es_PE.fl_str_mv Universidad Tecnológica del Perú
Repositorio Institucional - UTP
dc.source.none.fl_str_mv reponame:UTP-Institucional
instname:Universidad Tecnológica del Perú
instacron:UTP
instname_str Universidad Tecnológica del Perú
instacron_str UTP
institution UTP
reponame_str UTP-Institucional
collection UTP-Institucional
bitstream.url.fl_str_mv https://repositorio.utp.edu.pe/backend/api/core/bitstreams/11f17185-a51c-42c4-b311-015e39c40765/download
https://repositorio.utp.edu.pe/backend/api/core/bitstreams/78bc1830-4e36-4eab-a08e-9510eedb0262/download
https://repositorio.utp.edu.pe/backend/api/core/bitstreams/4a9dfcd9-a0d1-4890-82b3-334cca40d250/download
https://repositorio.utp.edu.pe/backend/api/core/bitstreams/9a7617ce-e451-4600-a39f-dc327c062641/download
bitstream.checksum.fl_str_mv 13a683b95dd9d3e63283e6975f35f9e3
8a4605be74aa9ea9d79846c1fba20a33
852b04d910097c486f1a8925d8bab3de
eb58be3f7323673b39ea0e19e4724f18
bitstream.checksumAlgorithm.fl_str_mv MD5
MD5
MD5
MD5
repository.name.fl_str_mv Repositorio de la Universidad Tecnológica del Perú
repository.mail.fl_str_mv repositorio@utp.edu.pe
_version_ 1853500046799011840
spelling Andrade Arenas, Laberiano MatíasLavalle Sandoval, JennerCabanillas-Carbonell, MichaelHernández Celis, Domingo2023-11-24T01:44:14Z2023-11-24T01:44:14Z2023urn:issn: 2502-4760https://hdl.handle.net/20.500.12867/7931Indonesian Journal of Electrical Engineering and Computer Sciencehttps://doi.org/10.11591/ijeecs.v31.i3Currently, computer security or cybersecurity is a relevant aspect in the area of networks and communications of a company, therefore, it is important to know the risks and computer security policies that allow a unified management of cyber threats that only seek to affect the reputation or profit from the confidential information of organizations in the business sector. The objective of the research is to conduct a systematic review of the literature through articles published in databases such as Scopus and Dimension. Thus, in order to perform a complete documentary analysis, inclusion and exclusion criteria were applied to evaluate the quality of each article. Then, using a quantitative scale, articles were filtered according to author, period and countryof publication, leaving a total of 86 articles from both databases. The methodology used was the one proposed by Kitchenham, and the conclusion reached was that the vast majority of companies do not make a major investment in the purchase of equipment andimprovement of information technology (IT)infrastructure, exposing themselves to cyber-attacks that continue to grow every day. This research provides an opportunity for researchers, companies and entrepreneurs to consult so that they can protect their organization's most important assetsCampus Lima Centroapplication/pdfengInstitute of Advanced Engineering and ScienceIDurn:issn: 2502-4760Indonesian Journal of Electrical Engineering and Computer Science;vol. 31, n° 3info:eu-repo/semantics/openAccesshttp://creativecommons.org/licenses/by-sa/4.0/Universidad Tecnológica del PerúRepositorio Institucional - UTPreponame:UTP-Institucionalinstname:Universidad Tecnológica del Perúinstacron:UTPInformation securityCybersecurityRisk managementSystematic literature reviewhttps://purl.org/pe-repo/ocde/ford#1.02.00Enterprise information security risks: a systematic review of the literatureinfo:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionORIGINALL.Andrade_Articulo_de_Revision_2023.pdfL.Andrade_Articulo_de_Revision_2023.pdfapplication/pdf962794https://repositorio.utp.edu.pe/backend/api/core/bitstreams/11f17185-a51c-42c4-b311-015e39c40765/download13a683b95dd9d3e63283e6975f35f9e3MD51LICENSElicense.txtlicense.txttext/plain; charset=utf-81748https://repositorio.utp.edu.pe/backend/api/core/bitstreams/78bc1830-4e36-4eab-a08e-9510eedb0262/download8a4605be74aa9ea9d79846c1fba20a33MD52TEXTL.Andrade_Articulo_de_Revision_2023.pdf.txtL.Andrade_Articulo_de_Revision_2023.pdf.txtExtracted texttext/plain67557https://repositorio.utp.edu.pe/backend/api/core/bitstreams/4a9dfcd9-a0d1-4890-82b3-334cca40d250/download852b04d910097c486f1a8925d8bab3deMD55THUMBNAILL.Andrade_Articulo_de_Revision_2023.pdf.jpgL.Andrade_Articulo_de_Revision_2023.pdf.jpgGenerated Thumbnailimage/jpeg37636https://repositorio.utp.edu.pe/backend/api/core/bitstreams/9a7617ce-e451-4600-a39f-dc327c062641/downloadeb58be3f7323673b39ea0e19e4724f18MD5620.500.12867/7931oai:repositorio.utp.edu.pe:20.500.12867/79312025-11-30 17:33:26.339http://creativecommons.org/licenses/by-sa/4.0/info:eu-repo/semantics/openAccessopen.accesshttps://repositorio.utp.edu.peRepositorio de la Universidad Tecnológica del Perúrepositorio@utp.edu.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
score 13.138715
Nota importante:
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).