Business Research

1.0 Literature review:

The prominent aspects that have been focused on in the literature review are the description of the possible implications of cyber security for the performance of business along with the visible barriers related to it. The effects of the issues regarding cyber security have been noticed broadly in the different literature sources along with the activities associated with the research.

The potential barriers that are related to the application of cyber security reflect the importance of securing the integrity of the information about the organization and the data related to the customers (Buczak & Guven, 2016).

The evolving threats in the sector of cyber security along with the inability of the organizations to identify security infrastructure that could be effective could also be accepted as thorough features of the literature associated with the security of information in businesses. According to (Dacier, et al., 2017), comprehension regarding different theoretical impressions associated with cyber security and the barriers related to the same could be accepted as probable contributions of the literature review in the direction of obtaining an observable impression of the gaps in the report including the professional applications for the cyber security (Donaldson, et al., 2015).

Most of the part of the literature review is directed towards the threats associated with cyber security which can be assembled with the research findings that are varying to depict the rational outcomes like the recommendations made to develop the frameworks that can be used in addressing the constraints of the cyber security confronted by businesses.

Definition of cyber security:

Cyber security can be appropriately described as the protection of the information of the business and the intellectual property that is stored in the digital form against the issues and threats of misuse and theft. As Donaldson, et al, have stated, the issues and concerns for cyber security have remained a major problem for strategic management in traditional business organizations. This has also been a high concern for the challenges of economic and national security (Donaldson, et al., 2015).

The need to obtain cyber security is analyzed more importantly for recognizing the issues as the employees who are involved in the breach of confidential information, engagement in the fraud that takes place online, theft of intellectual property by the consistent threats and the competitors of cyber attackers. Hence, the concerns of the makers of the policies regarding the establishment of the abounding guidelines that would protect the ICT  systems from fraudulent attacks by pernicious entities along with other concerns for the online theft of data and misuse could be observed extensively In the practical studies of the cases (Serrano, Dandurand & Brown, 2014, November).

Cyber security can be described more intensively by having references to the collection of the activities as well as the aspects that are meant for identifying the issues that are emerging from the attacks, disruption, and other potential threats (Shackelford, 2014).

Moreover, the elaboration of cyber security suggests that it can be explained as the state of conservancy from the upsetting threats in the cyber world that can be extended more towards the references of cyber security as a vast domain of the measures that are supposed to be for the execution and sustaining the performance of the activities along with the preservation state from the threats (Shackelford, 2016).

Cyber security has been misinterpreted by different other entities such as gathering, surveillance, intelligence, sharing of information, and privacy in the management literature. However, the most descriptive elaboration of cyber security can be observed in its outcomes for the observance of soft information security. Surveillance in cyber security is associated with the obtainment of the objectives for controlling the flow of information in the internal structure of the system (Shackelford, 2016).

According to (Shapsough, et al., 2015, October), the primary barriers that are observed in cyber security for business organizations can be recognized more prominently from the research and literature review that incorporates the references of the statistical representation of the analysis of the cyber threats, intelligence sharing in cyber security, concerns regarding privacy, security systems, digital information espionage, and various other prominent threats.

The involvement of spies, terrorists, criminals, activists, and hackers in the theft and misuse of information of the organization could be regarded as a prominent threat to cyber security (Shapsough, et al., 2015, October).

The barriers to cyber security can also be recognized more particularly through a description of the short-term and long-term pitfalls for the protection and observance of the corporate information of any company. The short challenges termed could be understood elaborately through the available references to the threats, impacts, and vulnerabilities in the context of cyber security (Xu, et al., 2015). One of the prominent effects of the vulnerabilities denotes the examples of the insiders, vulnerabilities associated with the unprecedented supply chain threats from the alteration in the external environment.

The effects that could be observed in the reference to the challenges of cyber security thereby addressing the enhancement of cyber espionage,  compromising the systems regarding the industrial controls, botnet malware including the denial of cyber securities in business. According to the statements Reddy, cyber espionage is related to the theft of data regarding the financial, proprietary, and personal details of an individual or organization by the attacker for which the attacker is accountable for the benefits (Xu, et al., 2015). Denying the outcomes of the service in the case of information systems of the companies could be related to the prevention of the users who are authorized from accessing the services of the system regarding information of an organization.

The effects of the botnet malware could also be identified as the unending barriers to the cyber securities of business organizations as the malware application could empower the attackers to have control over the system without the knowledge of the victim. According to Scully, malware facilitates the attacker to gain complete control over the information system about the explicit privileges for the introduction of unwanted changes (Xu, et al., 2015).

Compromise in the industrial control system has been a frequent challenge in the cyber security world that is faced by business organizations right from the demeaning outcomes of the attacks on the control systems that could cause havoc on the manufacturing aspects of an organization, more importantly by affecting the execution of the specific equipment’s including the generators and pumps.

As per Staheli, the barriers to cyber-attacks must be taken into consideration well ahead of time so that the damage to the critical infrastructure of the economy and organization along with the security regarding organizational data could be damaged. The long-term barriers that could also impose potential effects on the cyber security efficiency in an organization are majorly related to the consensus, design, incentives, environment, or unknown DICE framework (Shapsough, et al., 2015, October).

The implications of the executive and legislative actions on the resolution of the major issues that are associated with cyber security like prevention of disasters that are based on cyber, development of collaboration between and within the industries, facing cybercrime, and providing apt justification on the participation of the federal agencies along with the responsibilities in meeting the requirements of the cyber security.

Design concerns of ICT systems are prioritized by the researchers that suggest the possible consequences regarding the stress on the developers about the feature of the specific performance instead of the security. Hence, the concerns regarding the security of the information systems in the upcoming time could be recognized as a possible major challenge for the designers of the security system. The incentives that the companies can provide in the direction of the realization of different objectives from the initiatives regarding cyber security should be developed and applied to revise the disrupted and disoriented incentive structure for the initiatives regarding cyber security (Shackelford, 2016).

The references that are to be considered regarding eh inexpensive nature of cyber security are also accompanied by the vagueness that directs to the logical returns on the investments that are made in cyber security. The unanimity in the dimension also provides notable challenges for cyber security in the long term as the applications of the cyber security structure could be accepted in various ways by the stakeholders leading to thorough conflicts based on execution, meaning, and risks along with culture (Donaldson, et al., 2015).

The reviews of the individual stakeholders regarding the conventional approaches to cyber security could also denote the major pitfalls in the reorganization of the consent on the execution and identified outcomes of the frameworks of cyber security.

The environmental factor could also be accepted as the major barrier to cyber security in business from the evolution of the technology is being analyzed in different contexts of scale and properties that lead to the generation of additional information systems of a company related to the social media,  mobile computing, and cloud computing. The emerging applications are related to the generation of complexities in the threat environment.

Literature has facilitated apt consequences towards the probable measures that could provide breakthroughs for the opportunities of innovative and evolving technological entities to acquire the outcomes that are favorable in the business. The examples of exploitation of the barriers presented in the environmental aspect could be notable in the apt utilization of data analytics and cloud computing services to achieve advantages of the economies of scale (Buczak & Guven, 2016). Analysis of the short-term or long-term barriers in cyber security is a representation of the suggestions to control the administration of the legislative and executive actions, impact of development and research on the design of ICT systems, implementation of the structures, and development in the incentive structures to recognize the required accord.

These suggestions can be used appropriately for the facilitation of the appreciable approaches to present the evolution of cyber security and meet the possible constraints that can be interpreted by cyber security for the business organization.

1.1 Literature scope:

The scope of the review of the literature was in the direction of the assessment of different barriers related to cyber security that can have inimical implications for business organizations.  Various aspects that are challenging for cyber security along with the underlying components leading to the understanding of cyber security in business have been described in the literature review to obtain better insights into the resolution of faults related to cyber security both in the short and long term (Buczak & Guven, 2016).

1.2 Review objectives:

According to Tisdale, the implementation of the review is intended to describe various elements that relate to cyber security for a perception that is better understood of barriers associated with cyber security which can be attended to effectively to obtain higher performance for the organizations. The references to the short and long-term barriers of cyber security could also be identified as another formal intention of the review.

2.0 Literature review comparative analysis:

The consequences of the comparative analysis which can be obtained from the paper are a representation of various information sources such as research publications, official organizations, journals, and industry reports to recognize the opportunities to improve the frameworks of cyber security (Buczak & Guven, 2016).

2.1 Development of novel theme:

The generation of the theme related to the challenges of cyber security in an organization could be recognized in the identification of the importance of probable challenges from different dimensions of threat, impacts, and vulnerabilities. The novel theme could be considered in contrast to the discussed themes in the review related to the short and long-term challenges of cyber security (Buczak & Guven, 2016). It is indispensable to consider the understanding of the interpretation of the challenges in cyber security that could be achieved through information regarding threats indicating the sources of challenges could be compromised.

3.0 Quality and currency of review:

The sources of literature are designated with the prominent contributions that are associated with the relevance and quality of the concerned topic. Critical reflection on the literature sources assists in deriving reasonable approaches regarding cyber security.

3.1 Quality of the paper:

The literature review obtained credibility from different research publications and journals that could be conveniently accessed through the Internet mostly by notable academicians and researchers.

3.2 Currency of paper:

The currency of the paper assumed was as inputs to the review were valued by the publication within recent years that indicated emerging threats to cyber security.

3.3 Validity and reliability:

The reliability could be observed in the review and a citation that is provided in the sources was noticed in certain journals. The extensive elaboration of the hypothesis was also considered as an indicator of the validity of the sources (Xu, et al., 2015).

4.0 Research gap:

The limitations are mostly in the lack of discussion on the consequences of cyber security in various industrial contexts. Moreover, the implications of the federal policies can also be identified as limitations of the report.

5.0 Conclusion:

The literature review provided an interpretation of the significant challenges associated with cyber security in organizations. The references that are made to the short and long-term challenges provide recommendations regarding the elimination of the concerns regarding cyber security in organizations.

6.0 References

Buczak, A.L. and Guven, E., 2016. A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18(2), pp.1153-1176.

Dacier, M.C., Dietrich, S., Kargl, F. and König, H., 2017. Network Attack Detection and Defense–Security Challenges and Opportunities of Software-Defined Networking.

Donaldson, S., Siegel, S., Williams, C.K. and Aslam, A., 2015. Enterprise cybersecurity: how to build a successful cyberdefense program against advanced threats. Apress.

Ko, R. and Choo, R., 2015. The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues. Syngress.

Serrano, O., Dandurand, L. and Brown, S., 2014, November. On the design of a cyber security data sharing system. In Proceedings of the 2014 ACM Workshop on Information Sharing & Collaborative Security (pp. 61-69). ACM.

Shackelford, S.J., 2014. Managing cyber attacks in international law, business, and relations: In search of cyber peace. Cambridge University Press.

Shackelford, S.J., 2016. Business and cyber peace: We need you! Business Horizons, 59(5), pp.539-548.

Shapsough, S., Qatan, F., Aburukba, R., Aloul, F. and Al Ali, A.R., 2015, October. Smart grid cyber security: Challenges and solutions. In Smart Grid and Clean Energy Technologies (ICSGCE), 2015 International Conference on (pp. 170-175). IEEE.

Staheli, D., Yu, T., Crouser, R.J., Damodaran, S., Nam, K., O’Gwynn, D., McKenna, S. and Harrison, L., 2014, November. Visualization evaluation for cyber security: Trends and future directions. In Proceedings of the Eleventh Workshop on Visualization for Cyber Security (pp. 49-56). ACM.

Xu, G., Yu, W., Chen, Z., Zhang, H., Moulema, P., Fu, X. and Lu, C., 2015. A cloud computing-based system for cyber security management. International Journal of Parallel, Emergent and Distributed Systems30(1), pp.29-45.