Enterprise information security risks: asystematic review of the literature
Descripción del Articulo
Currently, computer security or cybersecurity is a relevant aspect in the area of networks and communications of a company, therefore, it is important to know the risks and computer security policies that allow a unified management of cyber threats that only seek to affect the reputation or profit f...
Autores: | , , , |
---|---|
Formato: | tesis de grado |
Fecha de Publicación: | 2023 |
Institución: | Universidad Tecnológica del Perú |
Repositorio: | UTP-Institucional |
Lenguaje: | inglés |
OAI Identifier: | oai:repositorio.utp.edu.pe:20.500.12867/7931 |
Enlace del recurso: | https://hdl.handle.net/20.500.12867/7931 https://doi.org/10.11591/ijeecs.v31.i3 |
Nivel de acceso: | acceso abierto |
Materia: | Information security Cybersecurity Risk management Systematic literature review https://purl.org/pe-repo/ocde/ford#1.02.00 |
id |
UTPD_2f0da511df9abf54d61525850a74ecc7 |
---|---|
oai_identifier_str |
oai:repositorio.utp.edu.pe:20.500.12867/7931 |
network_acronym_str |
UTPD |
network_name_str |
UTP-Institucional |
repository_id_str |
4782 |
dc.title.es_PE.fl_str_mv |
Enterprise information security risks: asystematic review of the literature |
title |
Enterprise information security risks: asystematic review of the literature |
spellingShingle |
Enterprise information security risks: asystematic review of the literature Andrade Arenas, Laberiano Matías Information security Cybersecurity Risk management Systematic literature review https://purl.org/pe-repo/ocde/ford#1.02.00 |
title_short |
Enterprise information security risks: asystematic review of the literature |
title_full |
Enterprise information security risks: asystematic review of the literature |
title_fullStr |
Enterprise information security risks: asystematic review of the literature |
title_full_unstemmed |
Enterprise information security risks: asystematic review of the literature |
title_sort |
Enterprise information security risks: asystematic review of the literature |
author |
Andrade Arenas, Laberiano Matías |
author_facet |
Andrade Arenas, Laberiano Matías Lavalle Sandoval, Jenner Cabanillas-Carbonell, Michael Hernández Celis, Domingo |
author_role |
author |
author2 |
Lavalle Sandoval, Jenner Cabanillas-Carbonell, Michael Hernández Celis, Domingo |
author2_role |
author author author |
dc.contributor.author.fl_str_mv |
Andrade Arenas, Laberiano Matías Lavalle Sandoval, Jenner Cabanillas-Carbonell, Michael Hernández Celis, Domingo |
dc.subject.es_PE.fl_str_mv |
Information security Cybersecurity Risk management Systematic literature review |
topic |
Information security Cybersecurity Risk management Systematic literature review https://purl.org/pe-repo/ocde/ford#1.02.00 |
dc.subject.ocde.es_PE.fl_str_mv |
https://purl.org/pe-repo/ocde/ford#1.02.00 |
description |
Currently, computer security or cybersecurity is a relevant aspect in the area of networks and communications of a company, therefore, it is important to know the risks and computer security policies that allow a unified management of cyber threats that only seek to affect the reputation or profit from the confidential information of organizations in the business sector. The objective of the research is to conduct a systematic review of the literature through articles published in databases such as Scopus and Dimension. Thus, in order to perform a complete documentary analysis, inclusion and exclusion criteria were applied to evaluate the quality of each article. Then, using a quantitative scale, articles were filtered according to author, period and countryof publication, leaving a total of 86 articles from both databases. The methodology used was the one proposed by Kitchenham, and the conclusion reached was that the vast majority of companies do not make a major investment in the purchase of equipment andimprovement of information technology (IT)infrastructure, exposing themselves to cyber-attacks that continue to grow every day. This research provides an opportunity for researchers, companies and entrepreneurs to consult so that they can protect their organization's most important assets |
publishDate |
2023 |
dc.date.accessioned.none.fl_str_mv |
2023-11-24T01:44:14Z |
dc.date.available.none.fl_str_mv |
2023-11-24T01:44:14Z |
dc.date.issued.fl_str_mv |
2023 |
dc.type.es_PE.fl_str_mv |
info:eu-repo/semantics/bachelorThesis |
dc.type.version.es_PE.fl_str_mv |
info:eu-repo/semantics/publishedVersion |
format |
bachelorThesis |
status_str |
publishedVersion |
dc.identifier.issn.none.fl_str_mv |
2502-4760 |
dc.identifier.uri.none.fl_str_mv |
https://hdl.handle.net/20.500.12867/7931 |
dc.identifier.journal.es_PE.fl_str_mv |
Indonesian Journal of Electrical Engineering and Computer Science |
dc.identifier.doi.none.fl_str_mv |
https://doi.org/10.11591/ijeecs.v31.i3 |
identifier_str_mv |
2502-4760 Indonesian Journal of Electrical Engineering and Computer Science |
url |
https://hdl.handle.net/20.500.12867/7931 https://doi.org/10.11591/ijeecs.v31.i3 |
dc.language.iso.es_PE.fl_str_mv |
eng |
language |
eng |
dc.relation.ispartof.fl_str_mv |
SUNEDU |
dc.relation.ispartofseries.none.fl_str_mv |
Indonesian Journal of Electrical Engineering and Computer Science;vol. 31, n° 3 |
dc.rights.es_PE.fl_str_mv |
info:eu-repo/semantics/openAccess |
dc.rights.uri.es_PE.fl_str_mv |
http://creativecommons.org/licenses/by-sa/4.0/ |
eu_rights_str_mv |
openAccess |
rights_invalid_str_mv |
http://creativecommons.org/licenses/by-sa/4.0/ |
dc.format.es_PE.fl_str_mv |
application/pdf |
dc.publisher.es_PE.fl_str_mv |
Institute of Advanced Engineering and Science |
dc.publisher.country.es_PE.fl_str_mv |
ID |
dc.source.es_PE.fl_str_mv |
Repositorio Institucional - UTP Universidad Tecnológica del Perú |
dc.source.none.fl_str_mv |
reponame:UTP-Institucional instname:Universidad Tecnológica del Perú instacron:UTP |
instname_str |
Universidad Tecnológica del Perú |
instacron_str |
UTP |
institution |
UTP |
reponame_str |
UTP-Institucional |
collection |
UTP-Institucional |
bitstream.url.fl_str_mv |
http://repositorio.utp.edu.pe/bitstream/20.500.12867/7931/1/L.Andrade_Articulo_de_Revision_2023.pdf http://repositorio.utp.edu.pe/bitstream/20.500.12867/7931/2/license.txt http://repositorio.utp.edu.pe/bitstream/20.500.12867/7931/3/L.Andrade_Articulo_de_Revision_2023.pdf.txt http://repositorio.utp.edu.pe/bitstream/20.500.12867/7931/4/L.Andrade_Articulo_de_Revision_2023.pdf.jpg |
bitstream.checksum.fl_str_mv |
13a683b95dd9d3e63283e6975f35f9e3 8a4605be74aa9ea9d79846c1fba20a33 8c0ae9a8f0bd528c1af4eb4270e38176 5ce0a563128be93585196cf3365a6a80 |
bitstream.checksumAlgorithm.fl_str_mv |
MD5 MD5 MD5 MD5 |
repository.name.fl_str_mv |
Repositorio Institucional de la Universidad Tecnológica del Perú |
repository.mail.fl_str_mv |
repositorio@utp.edu.pe |
_version_ |
1817984916951924736 |
spelling |
Andrade Arenas, Laberiano MatíasLavalle Sandoval, JennerCabanillas-Carbonell, MichaelHernández Celis, Domingo2023-11-24T01:44:14Z2023-11-24T01:44:14Z20232502-4760https://hdl.handle.net/20.500.12867/7931Indonesian Journal of Electrical Engineering and Computer Sciencehttps://doi.org/10.11591/ijeecs.v31.i3Currently, computer security or cybersecurity is a relevant aspect in the area of networks and communications of a company, therefore, it is important to know the risks and computer security policies that allow a unified management of cyber threats that only seek to affect the reputation or profit from the confidential information of organizations in the business sector. The objective of the research is to conduct a systematic review of the literature through articles published in databases such as Scopus and Dimension. Thus, in order to perform a complete documentary analysis, inclusion and exclusion criteria were applied to evaluate the quality of each article. Then, using a quantitative scale, articles were filtered according to author, period and countryof publication, leaving a total of 86 articles from both databases. The methodology used was the one proposed by Kitchenham, and the conclusion reached was that the vast majority of companies do not make a major investment in the purchase of equipment andimprovement of information technology (IT)infrastructure, exposing themselves to cyber-attacks that continue to grow every day. This research provides an opportunity for researchers, companies and entrepreneurs to consult so that they can protect their organization's most important assetsCampus Lima Centroapplication/pdfengInstitute of Advanced Engineering and ScienceIDIndonesian Journal of Electrical Engineering and Computer Science;vol. 31, n° 3SUNEDUinfo:eu-repo/semantics/openAccesshttp://creativecommons.org/licenses/by-sa/4.0/Repositorio Institucional - UTPUniversidad Tecnológica del Perúreponame:UTP-Institucionalinstname:Universidad Tecnológica del Perúinstacron:UTPInformation securityCybersecurityRisk managementSystematic literature reviewhttps://purl.org/pe-repo/ocde/ford#1.02.00Enterprise information security risks: asystematic review of the literatureinfo:eu-repo/semantics/bachelorThesisinfo:eu-repo/semantics/publishedVersionORIGINALL.Andrade_Articulo_de_Revision_2023.pdfL.Andrade_Articulo_de_Revision_2023.pdfapplication/pdf962794http://repositorio.utp.edu.pe/bitstream/20.500.12867/7931/1/L.Andrade_Articulo_de_Revision_2023.pdf13a683b95dd9d3e63283e6975f35f9e3MD51LICENSElicense.txtlicense.txttext/plain; charset=utf-81748http://repositorio.utp.edu.pe/bitstream/20.500.12867/7931/2/license.txt8a4605be74aa9ea9d79846c1fba20a33MD52TEXTL.Andrade_Articulo_de_Revision_2023.pdf.txtL.Andrade_Articulo_de_Revision_2023.pdf.txtExtracted texttext/plain66071http://repositorio.utp.edu.pe/bitstream/20.500.12867/7931/3/L.Andrade_Articulo_de_Revision_2023.pdf.txt8c0ae9a8f0bd528c1af4eb4270e38176MD53THUMBNAILL.Andrade_Articulo_de_Revision_2023.pdf.jpgL.Andrade_Articulo_de_Revision_2023.pdf.jpgGenerated Thumbnailimage/jpeg20365http://repositorio.utp.edu.pe/bitstream/20.500.12867/7931/4/L.Andrade_Articulo_de_Revision_2023.pdf.jpg5ce0a563128be93585196cf3365a6a80MD5420.500.12867/7931oai:repositorio.utp.edu.pe:20.500.12867/79312023-11-24 11:04:20.471Repositorio Institucional de la Universidad Tecnológica del Perúrepositorio@utp.edu.peTk9URTogUExBQ0UgWU9VUiBPV04gTElDRU5TRSBIRVJFClRoaXMgc2FtcGxlIGxpY2Vuc2UgaXMgcHJvdmlkZWQgZm9yIGluZm9ybWF0aW9uYWwgcHVycG9zZXMgb25seS4KCk5PTi1FWENMVVNJVkUgRElTVFJJQlVUSU9OIExJQ0VOU0UKCkJ5IHNpZ25pbmcgYW5kIHN1Ym1pdHRpbmcgdGhpcyBsaWNlbnNlLCB5b3UgKHRoZSBhdXRob3Iocykgb3IgY29weXJpZ2h0Cm93bmVyKSBncmFudHMgdG8gRFNwYWNlIFVuaXZlcnNpdHkgKERTVSkgdGhlIG5vbi1leGNsdXNpdmUgcmlnaHQgdG8gcmVwcm9kdWNlLAp0cmFuc2xhdGUgKGFzIGRlZmluZWQgYmVsb3cpLCBhbmQvb3IgZGlzdHJpYnV0ZSB5b3VyIHN1Ym1pc3Npb24gKGluY2x1ZGluZwp0aGUgYWJzdHJhY3QpIHdvcmxkd2lkZSBpbiBwcmludCBhbmQgZWxlY3Ryb25pYyBmb3JtYXQgYW5kIGluIGFueSBtZWRpdW0sCmluY2x1ZGluZyBidXQgbm90IGxpbWl0ZWQgdG8gYXVkaW8gb3IgdmlkZW8uCgpZb3UgYWdyZWUgdGhhdCBEU1UgbWF5LCB3aXRob3V0IGNoYW5naW5nIHRoZSBjb250ZW50LCB0cmFuc2xhdGUgdGhlCnN1Ym1pc3Npb24gdG8gYW55IG1lZGl1bSBvciBmb3JtYXQgZm9yIHRoZSBwdXJwb3NlIG9mIHByZXNlcnZhdGlvbi4KCllvdSBhbHNvIGFncmVlIHRoYXQgRFNVIG1heSBrZWVwIG1vcmUgdGhhbiBvbmUgY29weSBvZiB0aGlzIHN1Ym1pc3Npb24gZm9yCnB1cnBvc2VzIG9mIHNlY3VyaXR5LCBiYWNrLXVwIGFuZCBwcmVzZXJ2YXRpb24uCgpZb3UgcmVwcmVzZW50IHRoYXQgdGhlIHN1Ym1pc3Npb24gaXMgeW91ciBvcmlnaW5hbCB3b3JrLCBhbmQgdGhhdCB5b3UgaGF2ZQp0aGUgcmlnaHQgdG8gZ3JhbnQgdGhlIHJpZ2h0cyBjb250YWluZWQgaW4gdGhpcyBsaWNlbnNlLiBZb3UgYWxzbyByZXByZXNlbnQKdGhhdCB5b3VyIHN1Ym1pc3Npb24gZG9lcyBub3QsIHRvIHRoZSBiZXN0IG9mIHlvdXIga25vd2xlZGdlLCBpbmZyaW5nZSB1cG9uCmFueW9uZSdzIGNvcHlyaWdodC4KCklmIHRoZSBzdWJtaXNzaW9uIGNvbnRhaW5zIG1hdGVyaWFsIGZvciB3aGljaCB5b3UgZG8gbm90IGhvbGQgY29weXJpZ2h0LAp5b3UgcmVwcmVzZW50IHRoYXQgeW91IGhhdmUgb2J0YWluZWQgdGhlIHVucmVzdHJpY3RlZCBwZXJtaXNzaW9uIG9mIHRoZQpjb3B5cmlnaHQgb3duZXIgdG8gZ3JhbnQgRFNVIHRoZSByaWdodHMgcmVxdWlyZWQgYnkgdGhpcyBsaWNlbnNlLCBhbmQgdGhhdApzdWNoIHRoaXJkLXBhcnR5IG93bmVkIG1hdGVyaWFsIGlzIGNsZWFybHkgaWRlbnRpZmllZCBhbmQgYWNrbm93bGVkZ2VkCndpdGhpbiB0aGUgdGV4dCBvciBjb250ZW50IG9mIHRoZSBzdWJtaXNzaW9uLgoKSUYgVEhFIFNVQk1JU1NJT04gSVMgQkFTRUQgVVBPTiBXT1JLIFRIQVQgSEFTIEJFRU4gU1BPTlNPUkVEIE9SIFNVUFBPUlRFRApCWSBBTiBBR0VOQ1kgT1IgT1JHQU5JWkFUSU9OIE9USEVSIFRIQU4gRFNVLCBZT1UgUkVQUkVTRU5UIFRIQVQgWU9VIEhBVkUKRlVMRklMTEVEIEFOWSBSSUdIVCBPRiBSRVZJRVcgT1IgT1RIRVIgT0JMSUdBVElPTlMgUkVRVUlSRUQgQlkgU1VDSApDT05UUkFDVCBPUiBBR1JFRU1FTlQuCgpEU1Ugd2lsbCBjbGVhcmx5IGlkZW50aWZ5IHlvdXIgbmFtZShzKSBhcyB0aGUgYXV0aG9yKHMpIG9yIG93bmVyKHMpIG9mIHRoZQpzdWJtaXNzaW9uLCBhbmQgd2lsbCBub3QgbWFrZSBhbnkgYWx0ZXJhdGlvbiwgb3RoZXIgdGhhbiBhcyBhbGxvd2VkIGJ5IHRoaXMKbGljZW5zZSwgdG8geW91ciBzdWJtaXNzaW9uLgo= |
score |
13.95948 |
Nota importante:
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).