确保网络安全的网络治理研究:网络安全治理概述。

International cybersecurity law review Pub Date : 2022-01-01 Epub Date: 2022-01-11 DOI:10.1365/s43439-021-00045-4
Serkan Savaş, Süleyman Karataş
{"title":"确保网络安全的网络治理研究:网络安全治理概述。","authors":"Serkan Savaş,&nbsp;Süleyman Karataş","doi":"10.1365/s43439-021-00045-4","DOIUrl":null,"url":null,"abstract":"<p><p>With the exponential increase of digital data in cyber environments, security measures have gained more importance. Cybersecurity threats are revealed by national and international units, and the number of these threats is increasing daily. The elimination of cybersecurity risks is possible with an effective cybersecurity strategy. Since the concept of management is not sufficient, the implementation of this strategy is possible with cyber governance, which includes all stakeholders in the management processes. This study emphasizes the importance and necessity of cyber governance in ensuring cybersecurity. The research and results for cybersecurity governance have been examined. A descriptive research model was used to this end. In terms of research philosophy, a basic research model and a documentary research model have been created with regard to the application method. The universe of the research consists of studies obtained from Web of Science, EBSCO, Scopus, Google Scholar, and TR Index. Studies from the last 5 years have been downloaded with the determined keywords. The result showed that although there are studies that produce local solutions for cybersecurity governance in different countries, a general governance framework has not been established as yet. On the contrary, there is a latent struggle to retain the management of this area, not its governance.</p>","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"3 1","pages":"7-34"},"PeriodicalIF":0.0000,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8750646/pdf/","citationCount":"6","resultStr":"{\"title\":\"Cyber governance studies in ensuring cybersecurity: an overview of cybersecurity governance.\",\"authors\":\"Serkan Savaş,&nbsp;Süleyman Karataş\",\"doi\":\"10.1365/s43439-021-00045-4\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p><p>With the exponential increase of digital data in cyber environments, security measures have gained more importance. Cybersecurity threats are revealed by national and international units, and the number of these threats is increasing daily. The elimination of cybersecurity risks is possible with an effective cybersecurity strategy. Since the concept of management is not sufficient, the implementation of this strategy is possible with cyber governance, which includes all stakeholders in the management processes. This study emphasizes the importance and necessity of cyber governance in ensuring cybersecurity. The research and results for cybersecurity governance have been examined. A descriptive research model was used to this end. In terms of research philosophy, a basic research model and a documentary research model have been created with regard to the application method. The universe of the research consists of studies obtained from Web of Science, EBSCO, Scopus, Google Scholar, and TR Index. Studies from the last 5 years have been downloaded with the determined keywords. The result showed that although there are studies that produce local solutions for cybersecurity governance in different countries, a general governance framework has not been established as yet. On the contrary, there is a latent struggle to retain the management of this area, not its governance.</p>\",\"PeriodicalId\":73412,\"journal\":{\"name\":\"International cybersecurity law review\",\"volume\":\"3 1\",\"pages\":\"7-34\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8750646/pdf/\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International cybersecurity law review\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1365/s43439-021-00045-4\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"2022/1/11 0:00:00\",\"PubModel\":\"Epub\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International cybersecurity law review","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1365/s43439-021-00045-4","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"2022/1/11 0:00:00","PubModel":"Epub","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6

摘要

随着网络环境中数字数据的指数级增长,安全措施变得越来越重要。网络安全威胁由国家和国际单位揭示,这些威胁的数量每天都在增加。通过有效的网络安全战略,消除网络安全风险是可能的。由于管理的概念还不够,通过网络治理可以实施这一战略,网络治理包括管理过程中的所有利益相关者。本研究强调了网络治理在确保网络安全方面的重要性和必要性。对网络安全治理的研究和结果进行了审查。为此采用了描述性研究模型。在研究哲学方面,在应用方法方面创建了基础研究模式和文献研究模式。研究的范围包括从科学网、EBSCO、Scopus、谷歌学者和TR指数获得的研究。下载了过去5年的研究,并确定了关键词。结果表明,尽管有研究为不同国家的网络安全治理提供了本地解决方案,但总体治理框架尚未建立。相反,为了保留这一地区的管理权,而不是其治理权,存在着一场潜在的斗争。
本文章由计算机程序翻译,如有差异,请以英文原文为准。

摘要图片

摘要图片

摘要图片

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Cyber governance studies in ensuring cybersecurity: an overview of cybersecurity governance.

With the exponential increase of digital data in cyber environments, security measures have gained more importance. Cybersecurity threats are revealed by national and international units, and the number of these threats is increasing daily. The elimination of cybersecurity risks is possible with an effective cybersecurity strategy. Since the concept of management is not sufficient, the implementation of this strategy is possible with cyber governance, which includes all stakeholders in the management processes. This study emphasizes the importance and necessity of cyber governance in ensuring cybersecurity. The research and results for cybersecurity governance have been examined. A descriptive research model was used to this end. In terms of research philosophy, a basic research model and a documentary research model have been created with regard to the application method. The universe of the research consists of studies obtained from Web of Science, EBSCO, Scopus, Google Scholar, and TR Index. Studies from the last 5 years have been downloaded with the determined keywords. The result showed that although there are studies that produce local solutions for cybersecurity governance in different countries, a general governance framework has not been established as yet. On the contrary, there is a latent struggle to retain the management of this area, not its governance.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Cybersecurity Regulation—Types, Principles, and Country Deep Dives in Asia VAT/GST harmonisation challenges for digital assets such as bitcoin and NFTs in the EU following Case C-264/14 (Skatteverket v David Hedqist) Cyberstalking in Nigeria: An Exploratory Study of Section 24 of the Nigerian Cybercrimes (Prohibition, Prevention, etc.) (Amendment) Act, 2024 Shared intelligence, enhanced resilience: sharing cyber threat information and intelligence under DORA A multi-layered security model to counter social engineering attacks: a learning-based approach
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1