Cluster Analysis of IT Security Risks in Chosen Sectors

Authors

  • Ante Buljan European Central Bank, Germany
  • Mario Spremić Faculty of Economics and Business, University of Zagreb, Croatia

Keywords:

information technology security, digital markets, Europe, business transformation, clustering, k-means

Abstract

The problems of digitalisation and transition of companies into the digital markets has become one of the crucial issues in contemporary business. Digital transformation is changing markets and interactions. These trends impose a question on how secure is this environment and how companies are combating this issue. This new environment shows us how knowledge is dispersed across a global market and in individual, national, markets. The goal of the research is to investigate the differences between countries in Europe according to how their companies tackled the challenges of IT security. Clustering is conducted by the use of simple k-means method using the data on European countries available in Eurostat. The digital divide has been found among European countries according to their usage of investigated IT security practices.

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

References

Buttarelli, G. (2017), ”Privacy matters: updating human rights for the digital society”, Health and Technology, Vol. 7, No. 4, pp. 325-328.

Cain, A. (2010), “Impact of Regulation Is Top Concern”, Internal Auditor Journal, Vol. 67, No. 5, p. 14.

Christensen, J. F. (2011), “Industrial evolution through complementary convergence: the case of IT security”, Industrial and Corporate Change, Vol. 20, No. 1, pp. 57-89.

Ding, W., Yan, Z., Deng, R. H. (2016), “A Survey on Future Internet Security Architectures”, IEEE Access, Vol. 4, pp. 4374-4393.

Eurostat (2019a), “Security incidents and consequences (isoc_cisce_ic) dataset”, European Commission, available at: https://appsso.eurostat.ec.europa.eu/nui/show.do?dataset=isoc_cisce_ic&lang=en (5 July 2019)

EUROSTAT (2019b), “Security related problems experienced through using the internet for private purposes (isoc_cisci_pb) dataset”, European Commission, available at: https://appsso.eurostat.ec.europa.eu/nui/show.do?dataset=isoc_cisci_pb&lang=en (5th of July 2019)

Knotek, P. (2014), “Banking sectors in EMU – Cluster analysis banking sectors in EMU”, European Scientific Journal, Vol. 10, No. 34, pp. 60-71.

Kolfal, B., Patterson, R. A., Yeo, M. L. (2013), “Market Impact on IT Security Spending”, Decision Sciences, Vol. 44, No. 3, pp. 517-556.

Kowalik, J. S., Gorski, J., Sachenko, A. (2004), “Cyberspace Security and Defense: Research Issues”, Proceedings of the NATO Advanced Research Workshop, Gdansk, Poland, Springer.

Loske, A. (2015), IT Security Risk Management in the Context of Cloud Computing, Darmstat, Springer.

Mićić, L. (2017), “Digital Transformation and Its Influence on GDP”, Economics, Vol. 5, No. 2, pp. 135-147.

Semer, L. J. (2012), “Evaluating the Employee Security Awareness Program”, Internal Auditor Journal, Vol. 69, No. 6, pp. 53-56.

Shaughnessy, H. (2018), “Creating digital transformation: Strategies and steps”, Strategy & Leadership, Vol. 46, No. 2, pp. 19-25.

Simpson, W. R. (2016), ”Securing Information Systems in an Uncertain World Enterprise Level Security”, Journal of Systemics, Cybernetics and Informatics, Vol. 14. No. 2, pp. 83-90.

Sørensen, C. K., Puigvert Gutiérrez, J. M. (2006), “Euro area banking sector integration using hierarchical cluster analysis techniques”, Working paper No. 627, European Central Bank, Frankfurt am Main.

Spremić, M. (2017a), Sigurnost i revizija IS-a u okruženju digitalne ekonomije (Security and IS revision in digital economy environemnt), Faculty of Business and Economics, Zagreb.

Spremić, M. (2017b), Digitalna transformacija poslovanja (Digital transformation of business), Faculty of Business and Economics, Zagreb.

Steffee, S. (2010), “Employees Ignoring IT Security”, Internal Auditor Journal, Vol. 67, No. 5, pp. 14-16.

Warfield, D. (2012), “Critical Infrastructures: IT Security and Threats from Private Sector Ownership”, Information Security Journal: A Global Perspective, Vol. 21, No. 3, pp. 127-136.

Yim, K., Castiglione, A., You, I. (2014), “Prosperity of IT security technologies in homeland defense”, Journal of Ambient Intelligence and Humanized Computing, Vol. 5, No. 2, pp. 169-171.

Zerzan, A. (2009), “New Technologies, New Risks? Innovation and Countering the Financing of Terrorism”, World Bank Working Paper No. 174, World Bank, Washington, DC.

Downloads

Published

2019-10-31

How to Cite

Buljan, A., & Spremić, M. (2019). Cluster Analysis of IT Security Risks in Chosen Sectors. ENTRENOVA - ENTerprise REsearch InNOVAtion, 5(1), 489–496. Retrieved from https://hrcak.srce.hr/ojs/index.php/entrenova/article/view/13822

Issue

Section

Economic Development, Innovation, Technological Change, and Growth