Contents |
Authors:
Hanna Yarovenko, ORCID: https://orcid.org/0000-0002-8760-6835 PhD, Associate Professor of the Economic Cybernetics Department, Sumy State University, Ukraine Olha Kuzmenko, ORCID: https://orcid.org/0000-0001-8520-2266 Doctor of Economics, Professor, Head of Economic Cybernetics Department, Sumy State University. Head of Scientific and Educational Center for Business Analytics, Ukraine Mario Stumpo, ORCID: https://orcid.org/0000-0001-5132-6041 Founder & Director at Bmybit LTD, London, United Kingdom
Pages: 142-153
Language: English
DOI: https://doi.org/10.21272/sec.4(3).142-153.2020
Download: |
Views: |
Downloads: |
|
|
|
Abstract
The consequences of the fourth industrial revolution caused an increase in the level of computerization and digitalization of society, which led to problems related to the protection of information of individual users, companies and the state as a whole. The aim of this paper is to analyze the effectiveness of the information security system of countries in terms of its ability to counter information threats. Two groups of input indicators were used for this purpose. The first group was formed by 12 indicators of the country’s world development, which were selected from the World Bank database and based on the results of correlation analysis. The second group includes 5 information technology indicators that characterize certain areas of information security: information technology development, digitalization of the country, countries’ commitment to cybersecurity, readiness to counter cyber threats and use the latest information and communication technologies. The country’s information security threat index is used as a starting point. Data from 159 countries of the world for 2018 were taken for the analysis, as for this number of countries and period there is a complete set of data on selected indicators. Country data were considered based on clusters, which allowed the use of 7 groups. The analysis was performed using the analytical tool Frontier Analyst. The study built CRR and BCC models, among which CRR was preferred, which allowed a more critical assessment of the potential of countries. The paper analyzes the structural effectiveness of socio-economic development indicators and information security indicators of countries, considering the current level of the information security threat index. As a result, the following were identified: an increase in government security spending for zero-cluster countries; the need to transform the information technology component for the countries of the first and second clusters; increasing personal protection, strengthening corruption control and legal regulation for third cluster countries; the need for economic growth and higher social standards for the fourth, fifth and sixth clusters. The obtained models allowed us to estimate the maximum level of growth of the information security threat index with the available resource potential of the country. As a result, it was found that the largest increase in the information security threat index is possible due to the existing potential of the countries of the zero and fifth clusters, which will increase the effectiveness of their response to information threats.
Keywords: BBC-model, CCR-model, Data Envelopment Analysis, socio-economic development, information, threat, security.
JEL Classification: C10, C43, O30.
Cite as: Yarovenko, H., Kuzmenko, O., Stumpo, M. (2020). DEA-Analysis Of The Effectiveness Of The Country’s Information Security System. SocioEconomic Challenges, 4(3), 142-153. https://doi.org/10.21272/sec.4(3).142-153.2020
This work is licensed under a Creative Commons Attribution 4.0 International License
References
- Ponemon Institute (2019). Cost of a Data Breach Report 2019. Retrieved from https://www.all-about-security.de/fileadmin/micropages/Fachartikel_28/2019_Cost_of_a_Data_Breach_Report_final.pdf
- IBM Security and Ponemon Institute (2020). Cost of a Data Breach Report 2019. Retrieved from https://www.all-about-security.de/fileadmin/micropages/Fachartikel_28/2019_Cost_of_a_Data_Breach_Report_final.pdf.
- Morrow, S. and Crabtree, T. (2019). The future of cybercrime & security. Threat Analysis, Impact Assessment & Mitigation Strategies 2019-2024. Retrieved from Juniper Research: https://www.juniperresearch.com/researchstore/key-vertical-markets/cybercrime-cybersecurity-research-report?utm_campaign=pr1_thefutureofcybercrime_technology_aug19&utm_source=businesswire&utm_medium=pr.
- Loshytskyi, M., Kostenko, O., Koropatnik, I., Tereshchuk, G. and Karelin V. (2020). Organizational competence of NATO information security policy. Journal of Security and Sustainability Issues, 9(3), 735-746. DOI: 10.9770/JSSI.2020.9.3(1).
- Frolova, E.E., Polyakova, T.A., Dudin, M.N., Rusakova, E.P. and Kucherenko, P.A. (2018). Information security of Russia in the digital economy: The economic and legal aspects. Journal of Advanced Research in Law and Economics, 9(1), 89-95. DOI: 10.14505/jarle.v9.1(31).12.
- Deane, J.K., Goldberg, D.M., Rakes, T.R. and Rees, L.P. (2019). The effect of information security certification announcements on the market value of the firm. Information Technology and Management, 20(3), 107-121. DOI: 10.1007/s10799-018-00297-3.
- Kosevich, E. (2020). Cyber security strategies of Latin America countries | [Estrategias de seguridad cibernética en los países de América Latina]. Iberoamerica (Russian Federation), 1, 137-159. DOI: 10.37656/S20768400-2020-1-07. [in Spanish].
- Sorokivska, O. (2015). Economic security of ukrainian enterprises under information war. Actual Problems of Economics, 174(12), 198-202.
- Jazri, H., Zakaria, O., and Chikohora, E. (2018, May). Measuring Cybersecurity Wellness Index of Critical Organisations. In 2018 IST-Africa Week Conference (IST-Africa). IEEE, 2018. pp. 1 – 8.
- Yunis, M.M. and Koong, K.S. (2015). A conceptual model for the development of a national cybersecurity index: An integrated framework. In 21st Americas Conference on Information Systems, AMCIS 2015 (Puerto Rico, El Conquistador Resort and Convention CenterFajardo), AMCIS 2015. Retrieved from https://aisel.aisnet.org/amcis2015/ISSecurity/GeneralPresentations/44/.
- Tolubko, V., Kozelkov, S., Zybin, S., Kozlovskyi, V., & Boiko, Y. (2018, January). Criteria for evaluating the effectiveness of the decision support system. In International Conference on Computer Science, Engineering and Education Applications (pp. 320-330). Springer, Cham.
- Fedotova, G.V., Kovalenko, O.A., Malyutina, T.D., Glushchenko, A.V. and Sukhinin, A.V. (2019). Transformation of information security systems of enterprises in the context of digitization of the national economy. In Studies in Computational Intelligence (pp. 811-822. DOI: 10.1007/978-3-030-13397-9_84).
- Hu, Z., Khokhlachova, Y., Sydorenko, V. and Opirskyy, I. (2017). Method for optimization of information security systems behavior under conditions of influences. International Journal of Intelligent Systems and Applications, 9(12), 46-58. DOI: 10.5815/ijisa.2017.12.05.
- Chen, J., Pedrycz, W., Ma, L. and Wang, C. (2014). A new information security risk analysis method based on membership degree. Kybernetes, 43(5), 686-698. DOI: 10.1108/K-10-2013-0235.
- Dudykevych, V., Prokopyshyn, I., Chekurin, V., Opirskyy, I., Lakh, Y., Kret, T., Ivanchenko, Y. and Ivanchenko, I. (2019). A multicriterial analysis of the efficiency of conservative information security systems. Eastern-European Journal of Enterprise Technologies, 3(9-99), 6-13. DOI: 10.15587/1729-4061.2019.166349.
- e-Governance Academy Foundation (2020). National Cyber Security Index. Retrieved from NCSI: https://ncsi.ega.ee/ncsi-index/.
- The World Bank (2020). World Development Indicators. Retrieved from https://databank.worldbank.org/source/world-development-indicators/Type/TABLE/preview/on.
- Yarovenko, H. (2020a). Use of Kohonen maps to analyze the information security level of countries taking into account their development [Vykorystannia kart Kokhonena dlia analizu rivnia informatsiinoi bezpeky krain z urakhuvanniam yikh rozvytku]. Economic space, 157, 118-124. DOI: 10.32782/2224-6282/157-21. [in Ukrainian]
- Yarovenko, H. (2020b). Evaluating the threat to national information security. Problems and Perspectives in Management, 18(3), 195-210. DOI: 10.21511/ppm.18(3).2020.17.
- Сharnes, A., Cooper, W.W. and Rhodes, E. (1978). Measuring the efficiency of decision making units. European Journal of Operational Research, 2, 429-444.
- Banker, R.D., Charnes, A. and Cooper, W.W. (1984). Some Models for Estimating Technical and Scale Inefficiencies in Data Envelopment Analysis. Managment Science, 30(9), 1031-1142. DOI: 10.1287/mnsc.30.9.1078.
- Banxia Software (2020). Frontier Analyst. Retrieved from https://banxia.com/frontier/resources/demodownload/.
|