The cyber security in the age of telework: A descriptive research framework trough science mapping

MEdina-Rodríguez, Cesar Esau and Casas-Valadez, Mariano Alberto and Faz-Mendoza, Alberto and Castañeda-Miranda, Rodrigo and Gamboa-Rosales, Nadia Karina and López-Robles, José Ricardo The cyber security in the age of telework: A descriptive research framework trough science mapping., 2020 . In 2020 International Conference on Data Analytics for Business and Industry: Way Towards a Sustainable Economy (ICDABI), Bahrain (online), 26th – 27th October 2020. (Unpublished) [Conference paper]

[img] Slideshow (Medina-Rodriguez_et_al_2020_Telework.pdf)
Medina-Rodriguez_et_al_2020_Telework.pdf - Presentation
Restricted to Repository staff only

Download (533kB)

English abstract

Teleworking is a work model that has been widely accepted by organizations, mostly since it has many advantages over traditional work. Most organizations have implemented it to attract new human talent and keep the existing one, preventing the flight of intellect or theft by competition. For the worker it also presents several advantages, such as savings in travel times, savings in fuel costs and more free time. However, one of the many disadvantages of teleworking is information security. We live in a digitized world, where cyber attacks represent a great threat for users and organizations, attacks that are increasing day by day. Cyber security, also known as information technology security or electronic information security, has become a necessity in the world we live in, where ICTs have had a great development as well as acceptance by users. Cyber security seeks to identify the strategies, to implement and to maintain a safe environment, but also to prevent threats and / or attacks. The main objective of cyber security is to generate trust between customers, suppliers and the general market, about the information that is handled on the network. Cyber security must be one step ahead of crime to offer support in all the digital movements that we do.

Item type: Conference paper
Keywords: cyber security, telework, homeworking, business intelligence, strategic intelligence
Subjects: F. Management.
G. Industry, profession and education.
L. Information technology and library technology
Depositing user: J.R. López-Robles
Date deposited: 19 Feb 2021 23:35
Last modified: 19 Feb 2021 23:35
URI: http://hdl.handle.net/10760/41782

References

López-Robles, J.R., et al., 30 years of intelligence models in management and business: A bibliometric review. International Journal of Information Management, 2019. 48: p. 22-38.

Furstenau, L.B., et al. 20 Years of Scientific Evolution of Cyber Security: a Science Mapping. in International Conference on Industrial Engineering and Operations Management. 2020. Dubai, UAE: IEOM Society International.

Srinivas, J., A.K. Das, and N. Kumar, Government regulations in cyber security: Framework, standards and recommendations. Future Generation Computer Systems, 2019. 92: p. 178-188.

Aguilar, L.J., Ciberseguridad: la colaboración público-privada en la era de la cuarta revolución industrial (Industria 4.0 versus ciberseguridad 4.0). Cuadernos de estrategia, 2017(185): p. 19-64.

Nakhodchi, S. and A. Dehghantanha, A bibliometric analysis on the application of deep learning in cybersecurity, in Security of Cyber-Physical Systems. 2020, Springer. p. 203-221.

Bada, M., A.M. Sasse, and J.R. Nurse, Cyber security awareness campaigns: Why do they fail to change behaviour? arXiv preprint arXiv:1901.02672, 2019.

López-Robles, J.R., et al. 60 Years of Business Intelligence: A Bibliometric Review from 1958 to 2017. in New Trends in Intelligent Software Methodologies, Tools and Techniques: Proceedings of the 17th International Conference SoMeT_18. 2018. IOS Press.

López-Robles, J.R., et al., The last five years of Big Data Research in Economics, Econometrics and Finance: Identification and conceptual analysis. Procedia Computer Science, 2019. 162: p. 729-736.

Gil, R.H., D.F. Amorós, and J.R.C. Fernández, La ciberseguridad. Historia y evolución de la criptología. 1ª Parte. 2011.

de Bogotá, C.d.C., Ciberseguridad en la era de la revolución fintech. 2019.

Gupta, B.B. and Q.Z. Sheng, Machine learning for computer and cyber security: principle, algorithms, and practices. 2019: CRC Press.

Touriño, A., Romanticismo e historia de ciberseguridad: tomando conciencia. Harvard Deusto Márketing y Ventas, 2017(146): p. 20-26.

Fojón, J.E. and Á.F. Sanz Villalba, Ciberseguridad en España: una propuesta para su gestión. Boletín Elcano, 2010(126): p. 8.

Vilcarromero Zubiate, L.L. and E. Vilchez Linares, Propuesta de implementación de un modelo de gestión de ciberseguridad para el centro de operaciones de seguridad (SOC) de una empresa de telecomunicaciones.

Cifuentes Quin, C.A., Narrativas cibernéticas y arquitectura computacional. 2014.

Gollmann, D., Computer security. Wiley Interdisciplinary Reviews: Computational Statistics, 2010. 2(5): p. 544-554.

Abomhara, M., Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks. Journal of Cyber Security and Mobility, 2015. 4(1): p. 65-88.

Tsai, F.S. and K.L. Chan. Detecting cyber security threats in weblogs using probabilistic models. in Pacific-Asia Workshop on Intelligence and Security Informatics. 2007. Springer.

López-Robles, J.R., et al., Understanding the intellectual structure and evolution of Competitive Intelligence: A bibliometric analysis from 1984 to 2017. Technology Analysis & Strategic Management, 2020. 32(5): p. 604-619.

López-Robles, J.R., et al., Visualizing and mapping the project management research areas within the International Journal of Project Management: A bibliometric analysis from 1983 to 2018, in Research and Education in Project Management - REPM 2019. 2019: Bilbao (Spain).


Downloads

Downloads per month over past year

Actions (login required)

View Item View Item