Enterprise information security risks: a systematic review of the literature

Descripción del Articulo

Currently, computer security or cybersecurity is a relevant aspect in the area of networks and communications of a company, therefore, it is important to know the risks and computer security policies that allow a unified management of cyber threats that only seek to affect the reputation or profit f...

Descripción completa

Detalles Bibliográficos
Autores: Lavalle Sandoval, Jenner, Andrade-Arenas, Laberiano, Hernández Celis, Domingo, Cabanillas-Carbonell, Michael
Formato: artículo
Fecha de Publicación:2023
Institución:Universidad Privada Norbert Wiener
Repositorio:UWIENER-Institucional
Lenguaje:inglés
OAI Identifier:oai:repositorio.uwiener.edu.pe:20.500.13053/9597
Enlace del recurso:https://hdl.handle.net/20.500.13053/9597
Nivel de acceso:acceso abierto
Materia:Companies Computer security Cybersecurity Information Information technology infrastructure
3.03.00 -- Ciencias de la salud
id UWIE_ced66dfd3e8e2690591a6c9fa931f4da
oai_identifier_str oai:repositorio.uwiener.edu.pe:20.500.13053/9597
network_acronym_str UWIE
network_name_str UWIENER-Institucional
repository_id_str 9398
dc.title.es_PE.fl_str_mv Enterprise information security risks: a systematic review of the literature
title Enterprise information security risks: a systematic review of the literature
spellingShingle Enterprise information security risks: a systematic review of the literature
Lavalle Sandoval, Jenner
Companies Computer security Cybersecurity Information Information technology infrastructure
3.03.00 -- Ciencias de la salud
title_short Enterprise information security risks: a systematic review of the literature
title_full Enterprise information security risks: a systematic review of the literature
title_fullStr Enterprise information security risks: a systematic review of the literature
title_full_unstemmed Enterprise information security risks: a systematic review of the literature
title_sort Enterprise information security risks: a systematic review of the literature
author Lavalle Sandoval, Jenner
author_facet Lavalle Sandoval, Jenner
Andrade-Arenas, Laberiano
Hernández Celis, Domingo
Cabanillas-Carbonell, Michael
author_role author
author2 Andrade-Arenas, Laberiano
Hernández Celis, Domingo
Cabanillas-Carbonell, Michael
author2_role author
author
author
dc.contributor.author.fl_str_mv Lavalle Sandoval, Jenner
Andrade-Arenas, Laberiano
Hernández Celis, Domingo
Cabanillas-Carbonell, Michael
dc.subject.es_PE.fl_str_mv Companies Computer security Cybersecurity Information Information technology infrastructure
topic Companies Computer security Cybersecurity Information Information technology infrastructure
3.03.00 -- Ciencias de la salud
dc.subject.ocde.es_PE.fl_str_mv 3.03.00 -- Ciencias de la salud
description Currently, computer security or cybersecurity is a relevant aspect in the area of networks and communications of a company, therefore, it is important to know the risks and computer security policies that allow a unified management of cyber threats that only seek to affect the reputation or profit from the confidential information of organizations in the business sector. The objective of the research is to conduct a systematic review of the literature through articles published in databases such as Scopus and Dimension. Thus, in order to perform a complete documentary analysis, inclusion and exclusion criteria were applied to evaluate the quality of each article. Then, using a quantitative scale, articles were filtered according to author, period and country of publication, leaving a total of 86 articles from both databases. The methodology used was the one proposed by Kitchenham, and the conclusion reached was that the vast majority of companies do not make a major investment in the purchase of equipment and improvement of information technology (IT) infrastructure, exposing themselves to cyber-attacks that continue to grow every day. This research provides an opportunity for researchers, companies and entrepreneurs to consult so that they can protect their organization's most important assets.
publishDate 2023
dc.date.accessioned.none.fl_str_mv 2023-10-18T20:59:48Z
dc.date.available.none.fl_str_mv 2023-10-18T20:59:48Z
dc.date.issued.fl_str_mv 2023-05-06
dc.type.es_PE.fl_str_mv info:eu-repo/semantics/article
dc.type.version.es_PE.fl_str_mv info:eu-repo/semantics/publishedVersion
format article
status_str publishedVersion
dc.identifier.uri.none.fl_str_mv https://hdl.handle.net/20.500.13053/9597
dc.identifier.doi.none.fl_str_mv 10.11591/ijeecs.v31.i3.pp1589-1604
url https://hdl.handle.net/20.500.13053/9597
identifier_str_mv 10.11591/ijeecs.v31.i3.pp1589-1604
dc.language.iso.es_PE.fl_str_mv eng
language eng
dc.rights.es_PE.fl_str_mv info:eu-repo/semantics/openAccess
dc.rights.uri.es_PE.fl_str_mv https://creativecommons.org/licenses/by/4.0/
eu_rights_str_mv openAccess
rights_invalid_str_mv https://creativecommons.org/licenses/by/4.0/
dc.format.es_PE.fl_str_mv application/pdf
dc.publisher.es_PE.fl_str_mv Institute of Advanced Engineering and Science
dc.publisher.country.es_PE.fl_str_mv CHE
dc.source.none.fl_str_mv reponame:UWIENER-Institucional
instname:Universidad Privada Norbert Wiener
instacron:UWIENER
instname_str Universidad Privada Norbert Wiener
instacron_str UWIENER
institution UWIENER
reponame_str UWIENER-Institucional
collection UWIENER-Institucional
bitstream.url.fl_str_mv https://dspace-uwiener.metabuscador.org/bitstreams/07dda957-a6dc-4eb2-90da-8c023a48aa55/download
https://dspace-uwiener.metabuscador.org/bitstreams/b03cb95f-9b34-4f81-857b-cbd105b03905/download
https://dspace-uwiener.metabuscador.org/bitstreams/d2284a21-7f4b-4e57-ba49-ce809a9ea0b7/download
https://dspace-uwiener.metabuscador.org/bitstreams/4a00edb5-a74e-4306-af23-5ec2c81175b3/download
bitstream.checksum.fl_str_mv 13a683b95dd9d3e63283e6975f35f9e3
8a4605be74aa9ea9d79846c1fba20a33
8c0ae9a8f0bd528c1af4eb4270e38176
a4bb57fbb1a5f663c2e55f794808e924
bitstream.checksumAlgorithm.fl_str_mv MD5
MD5
MD5
MD5
repository.name.fl_str_mv Repositorio Institucional de la Universidad de Wiener
repository.mail.fl_str_mv bdigital@metabiblioteca.com
_version_ 1835828790972907520
spelling Lavalle Sandoval, JennerAndrade-Arenas, LaberianoHernández Celis, DomingoCabanillas-Carbonell, Michael2023-10-18T20:59:48Z2023-10-18T20:59:48Z2023-05-06https://hdl.handle.net/20.500.13053/959710.11591/ijeecs.v31.i3.pp1589-1604Currently, computer security or cybersecurity is a relevant aspect in the area of networks and communications of a company, therefore, it is important to know the risks and computer security policies that allow a unified management of cyber threats that only seek to affect the reputation or profit from the confidential information of organizations in the business sector. The objective of the research is to conduct a systematic review of the literature through articles published in databases such as Scopus and Dimension. Thus, in order to perform a complete documentary analysis, inclusion and exclusion criteria were applied to evaluate the quality of each article. Then, using a quantitative scale, articles were filtered according to author, period and country of publication, leaving a total of 86 articles from both databases. The methodology used was the one proposed by Kitchenham, and the conclusion reached was that the vast majority of companies do not make a major investment in the purchase of equipment and improvement of information technology (IT) infrastructure, exposing themselves to cyber-attacks that continue to grow every day. This research provides an opportunity for researchers, companies and entrepreneurs to consult so that they can protect their organization's most important assets.application/pdfengInstitute of Advanced Engineering and ScienceCHEinfo:eu-repo/semantics/openAccesshttps://creativecommons.org/licenses/by/4.0/Companies Computer security Cybersecurity Information Information technology infrastructure3.03.00 -- Ciencias de la saludEnterprise information security risks: a systematic review of the literatureinfo:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionreponame:UWIENER-Institucionalinstname:Universidad Privada Norbert Wienerinstacron:UWIENERPublicationORIGINAL30760-66656-1-PB.pdf30760-66656-1-PB.pdfapplication/pdf962794https://dspace-uwiener.metabuscador.org/bitstreams/07dda957-a6dc-4eb2-90da-8c023a48aa55/download13a683b95dd9d3e63283e6975f35f9e3MD51LICENSElicense.txtlicense.txttext/plain; charset=utf-81748https://dspace-uwiener.metabuscador.org/bitstreams/b03cb95f-9b34-4f81-857b-cbd105b03905/download8a4605be74aa9ea9d79846c1fba20a33MD52TEXT30760-66656-1-PB.pdf.txt30760-66656-1-PB.pdf.txtExtracted texttext/plain66071https://dspace-uwiener.metabuscador.org/bitstreams/d2284a21-7f4b-4e57-ba49-ce809a9ea0b7/download8c0ae9a8f0bd528c1af4eb4270e38176MD53THUMBNAIL30760-66656-1-PB.pdf.jpg30760-66656-1-PB.pdf.jpgGenerated Thumbnailimage/jpeg10703https://dspace-uwiener.metabuscador.org/bitstreams/4a00edb5-a74e-4306-af23-5ec2c81175b3/downloada4bb57fbb1a5f663c2e55f794808e924MD5420.500.13053/9597oai:dspace-uwiener.metabuscador.org:20.500.13053/95972024-12-13 11:49:41.897https://creativecommons.org/licenses/by/4.0/info:eu-repo/semantics/openAccessopen.accesshttps://dspace-uwiener.metabuscador.orgRepositorio Institucional de la Universidad de Wienerbdigital@metabiblioteca.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
score 13.905282
Nota importante:
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).