Using Fuzzy Cognitive Maps (FCMs) to Evaluate the Vulnerabilities with ICT Assets Disposal Policies

Ezer Osei Yeboah-Boateng

Publikation: Bidrag til tidsskriftTidsskriftartikelForskningpeer review

410 Downloads (Pure)

Resumé

This paper evaluates the possible vulnerabilities of ICT assets disposal policies and the associated impact that can affect the SMEs. A poorly implemented policy or unenforced policy is “potentially the weakest link” in the cyber-security chain. Do SMEs have an idea of vulnerabilities or threats due to assets disposal?
In the event of breaches, the SMEs pay for the cost of notifying the concerned stakeholders, compensate affected parties, invest in improved mitigation technologies and also may be subjected to unwarranted public scrutiny. ICT assets at the end-of-useful life span usually have data left on the hard disk drives or storage media, which is a source of data confidentiality vulnerability. SMEs were surveyed in developing economies on their assets disposal policies. The perceived correlations were analyzed using fuzzy cognitive maps (FCMs) to ascertain if any cyber-security vulnerabilities inherent in a particular policy have implications on others.
The study endeavored to show that, SMEs ought to have appropriate assets disposal policies in place. Then, these policies ought to be signed off by all stakeholders as a matter of responsibility. By employing the FCM approach with fuzzy matrix operations, the results indicate positive correlations exist amongst the policy constructs. Thus, vulnerabilities with one policy have implications on others.
OriginalsprogEngelsk
TidsskriftInternational Journal of Electrical & Computer Sciences
Vol/bind12
Udgave nummer5
Sider (fra-til)20-31
ISSN2077-1231
StatusUdgivet - okt. 2012

Fingerprint

Fuzzy cognitive maps
Disposal
Vulnerability
Assets
Small and medium-sized enterprises
Stakeholders
Weak links
Confidentiality
Mitigation
Costs
Developing economies
Breach
Threat
Responsibility
Life span
End of life

Citer dette

@article{f6afb1d5d206498faebcc5a2195586e4,
title = "Using Fuzzy Cognitive Maps (FCMs) to Evaluate the Vulnerabilities with ICT Assets Disposal Policies",
abstract = "This paper evaluates the possible vulnerabilities of ICT assets disposal policies and the associated impact that can affect the SMEs. A poorly implemented policy or unenforced policy is “potentially the weakest link” in the cyber-security chain. Do SMEs have an idea of vulnerabilities or threats due to assets disposal?In the event of breaches, the SMEs pay for the cost of notifying the concerned stakeholders, compensate affected parties, invest in improved mitigation technologies and also may be subjected to unwarranted public scrutiny. ICT assets at the end-of-useful life span usually have data left on the hard disk drives or storage media, which is a source of data confidentiality vulnerability. SMEs were surveyed in developing economies on their assets disposal policies. The perceived correlations were analyzed using fuzzy cognitive maps (FCMs) to ascertain if any cyber-security vulnerabilities inherent in a particular policy have implications on others.The study endeavored to show that, SMEs ought to have appropriate assets disposal policies in place. Then, these policies ought to be signed off by all stakeholders as a matter of responsibility. By employing the FCM approach with fuzzy matrix operations, the results indicate positive correlations exist amongst the policy constructs. Thus, vulnerabilities with one policy have implications on others.",
keywords = "Fuzzy Cognitive Maps, Vulnerabilities, ICT Assets Policies, Data Confidentiality, Risks, Threats.",
author = "Yeboah-Boateng, {Ezer Osei}",
year = "2012",
month = "10",
language = "English",
volume = "12",
pages = "20--31",
journal = "International Journal of Electrical & Computer Sciences",
issn = "2077-1231",
publisher = "I J E N S Publishers",
number = "5",

}

Using Fuzzy Cognitive Maps (FCMs) to Evaluate the Vulnerabilities with ICT Assets Disposal Policies. / Yeboah-Boateng, Ezer Osei.

I: International Journal of Electrical & Computer Sciences, Bind 12, Nr. 5, 10.2012, s. 20-31.

Publikation: Bidrag til tidsskriftTidsskriftartikelForskningpeer review

TY - JOUR

T1 - Using Fuzzy Cognitive Maps (FCMs) to Evaluate the Vulnerabilities with ICT Assets Disposal Policies

AU - Yeboah-Boateng, Ezer Osei

PY - 2012/10

Y1 - 2012/10

N2 - This paper evaluates the possible vulnerabilities of ICT assets disposal policies and the associated impact that can affect the SMEs. A poorly implemented policy or unenforced policy is “potentially the weakest link” in the cyber-security chain. Do SMEs have an idea of vulnerabilities or threats due to assets disposal?In the event of breaches, the SMEs pay for the cost of notifying the concerned stakeholders, compensate affected parties, invest in improved mitigation technologies and also may be subjected to unwarranted public scrutiny. ICT assets at the end-of-useful life span usually have data left on the hard disk drives or storage media, which is a source of data confidentiality vulnerability. SMEs were surveyed in developing economies on their assets disposal policies. The perceived correlations were analyzed using fuzzy cognitive maps (FCMs) to ascertain if any cyber-security vulnerabilities inherent in a particular policy have implications on others.The study endeavored to show that, SMEs ought to have appropriate assets disposal policies in place. Then, these policies ought to be signed off by all stakeholders as a matter of responsibility. By employing the FCM approach with fuzzy matrix operations, the results indicate positive correlations exist amongst the policy constructs. Thus, vulnerabilities with one policy have implications on others.

AB - This paper evaluates the possible vulnerabilities of ICT assets disposal policies and the associated impact that can affect the SMEs. A poorly implemented policy or unenforced policy is “potentially the weakest link” in the cyber-security chain. Do SMEs have an idea of vulnerabilities or threats due to assets disposal?In the event of breaches, the SMEs pay for the cost of notifying the concerned stakeholders, compensate affected parties, invest in improved mitigation technologies and also may be subjected to unwarranted public scrutiny. ICT assets at the end-of-useful life span usually have data left on the hard disk drives or storage media, which is a source of data confidentiality vulnerability. SMEs were surveyed in developing economies on their assets disposal policies. The perceived correlations were analyzed using fuzzy cognitive maps (FCMs) to ascertain if any cyber-security vulnerabilities inherent in a particular policy have implications on others.The study endeavored to show that, SMEs ought to have appropriate assets disposal policies in place. Then, these policies ought to be signed off by all stakeholders as a matter of responsibility. By employing the FCM approach with fuzzy matrix operations, the results indicate positive correlations exist amongst the policy constructs. Thus, vulnerabilities with one policy have implications on others.

KW - Fuzzy Cognitive Maps, Vulnerabilities, ICT Assets Policies, Data Confidentiality, Risks, Threats.

M3 - Journal article

VL - 12

SP - 20

EP - 31

JO - International Journal of Electrical & Computer Sciences

JF - International Journal of Electrical & Computer Sciences

SN - 2077-1231

IS - 5

ER -