Abstract
A recent survey of cybersecurity assessment methods proposed in academic and research environments revealed that their adoption in operational settings was extremely scarce. At the same time, the frameworks developed by industrial communities have been met with broad reception. The question arises of what contributed to the success of the methods. To answer it, three-part research that employed evaluation criteria, qualitative metrics, and continuity of support assessment was conducted. Among other findings, it shows that the continuity of support plays an important role in the adoption of a method. This, in turn, is connected to a sound funding model and a well-developed and active community of supporters.
Citations
-
0
CrossRef
-
0
Web of Science
-
0
Scopus
Author (1)
Cite as
Full text
full text is not available in portal
Keywords
Details
- Category:
- Articles
- Type:
- artykuły w czasopismach
- Published in:
-
IT Professional
no. 26,
pages 71 - 79,
ISSN: 1520-9202 - Language:
- English
- Publication year:
- 2024
- Bibliographic description:
- Leszczyna R.: Cybersecurity Assessment Methods—Why Aren’t They Used?// IT Professional -Vol. 26,iss. 4 (2024), s.71-79
- DOI:
- Digital Object Identifier (open in new tab) 10.1109/mitp.2024.3392415
- Sources of funding:
-
- Free publication
- Verified by:
- Gdańsk University of Technology
seen 35 times