TY - GEN
T1 - Evaluating the People, Process, and Technology Priorities for NIST Cybersecurity Framework Implementation in E-Government
AU - Handri, Eko Yon
AU - Putro, Prasetyo Adi Wibowo
AU - Sensuse, Dana Indra
N1 - Publisher Copyright:
© 2023 IEEE.
PY - 2023
Y1 - 2023
N2 - Implementing a cybersecurity framework plays a critical role in protecting e-government systems and infrastructure from cyber threats and attacks. However, there is no consensus on prioritizing the five core components: identify, protect, detect, respond, and recover. It is also unclear whether these components should be implemented equally or customized. Similarly, no agreement exists on the importance of people, processes, and technology in implementing a cybersecurity framework This paper aims to address this gap by evaluating and comparing the priorities of the five core components and three aspects using the Analytic Hierarchy Process (AHP). The evaluation outcomes emphasize that the identify component takes precedence over the other core components, underscoring the significance of preventive measures against cyberattacks. In addition, the people aspect received the highest priority among the three implementation aspects, which highlighted the critical role of individuals in successfully implementing process-related measures and leveraging technological advancements. This research provides valuable insights for designing strategies and implementing effective and sustainable cybersecurity measures in e-government. By prioritizing the identify component and recognizing the importance of people, organizations can improve their ability to protect against threats and ensure the resilience of e-government systems.
AB - Implementing a cybersecurity framework plays a critical role in protecting e-government systems and infrastructure from cyber threats and attacks. However, there is no consensus on prioritizing the five core components: identify, protect, detect, respond, and recover. It is also unclear whether these components should be implemented equally or customized. Similarly, no agreement exists on the importance of people, processes, and technology in implementing a cybersecurity framework This paper aims to address this gap by evaluating and comparing the priorities of the five core components and three aspects using the Analytic Hierarchy Process (AHP). The evaluation outcomes emphasize that the identify component takes precedence over the other core components, underscoring the significance of preventive measures against cyberattacks. In addition, the people aspect received the highest priority among the three implementation aspects, which highlighted the critical role of individuals in successfully implementing process-related measures and leveraging technological advancements. This research provides valuable insights for designing strategies and implementing effective and sustainable cybersecurity measures in e-government. By prioritizing the identify component and recognizing the importance of people, organizations can improve their ability to protect against threats and ensure the resilience of e-government systems.
KW - analytic hierarchy process
KW - cybersecurity
KW - cybersecurity framework
KW - e-government
KW - people process technology
UR - http://www.scopus.com/inward/record.url?scp=85175465075&partnerID=8YFLogxK
U2 - 10.1109/ICoCICs58778.2023.10277024
DO - 10.1109/ICoCICs58778.2023.10277024
M3 - Conference contribution
AN - SCOPUS:85175465075
T3 - Proceedings - 2023 IEEE International Conference on Cryptography, Informatics, and Cybersecurity: Cryptography and Cybersecurity: Roles, Prospects, and Challenges, ICoCICs 2023
SP - 82
EP - 87
BT - Proceedings - 2023 IEEE International Conference on Cryptography, Informatics, and Cybersecurity
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 1st IEEE International Conference on Cryptography, Informatics, and Cybersecurity, ICoCICs 2023
Y2 - 22 August 2023 through 24 August 2023
ER -