Cybersecurity Assessment Methods—Why Aren’t They Used? - Publication - Bridge of Knowledge

Search

Cybersecurity Assessment Methods—Why Aren’t They Used?

Abstract

A recent survey of cybersecurity assessment methods proposed in academic and research environments revealed that their adoption in operational settings was extremely scarce. At the same time, the frameworks developed by industrial communities have been met with broad reception. The question arises of what contributed to the success of the methods. To answer it, three-part research that employed evaluation criteria, qualitative metrics, and continuity of support assessment was conducted. Among other findings, it shows that the continuity of support plays an important role in the adoption of a method. This, in turn, is connected to a sound funding model and a well-developed and active community of supporters.

Citations

  • 0

    CrossRef

  • 0

    Web of Science

  • 0

    Scopus

Cite as

Full text

full text is not available in portal

Keywords

Details

Category:
Articles
Type:
artykuły w czasopismach
Published in:
IT Professional no. 26, pages 71 - 79,
ISSN: 1520-9202
Language:
English
Publication year:
2024
Bibliographic description:
Leszczyna R.: Cybersecurity Assessment Methods—Why Aren’t They Used?// IT Professional -Vol. 26,iss. 4 (2024), s.71-79
DOI:
Digital Object Identifier (open in new tab) 10.1109/mitp.2024.3392415
Sources of funding:
  • Free publication
Verified by:
Gdańsk University of Technology

seen 35 times

Recommended for you

Meta Tags