Digital Transformation and Cybersecurity Challenges for Businesses Resilience: Issues and Recommendations
Abstract
:1. Introduction
2. Materials and Methods
- The paper should be relevant to digital business and cybersecurity.
- The paper is published between 2019–2023.
- The papers are not written in the English language.
- The paper is not related to cybersecurity and digital transformation.
- The paper is a review paper.
3. Results
3.1. Financial Sector
3.2. Health Sector
3.3. Governmental Sector
3.4. Business Sector
3.5. Industrial Sector
3.6. Diverse Organizational Contexts
Paper | Publication Year | Application Domain | Key Technologies/Theories | Key Findings |
---|---|---|---|---|
[22] | 2022 | Financial sector | Artificial intelligence, cognitive map**, DEMATEL techniques | Provision of a decision-support model by combining the decision-making trial and evaluation laboratory (DEMATEL) method and cognitive map**. |
[23] | 2023 | Financial sector | Cognitive technologies | Provided directions to use cognitive technologies in the digital transformation of the Russian economy. |
[24] | 2022 | Financial sector | Artificial intelligence, blockchain, voice-based technology, or natural language processing | Higher trust in Fintech by stakeholders in the financial sector. |
[25] | 2019 | Public institutions, financial institutions, banking institutions, industry, transportation, and agriculture | Different technologies related to digitalization | Highlighting the need for information security in different application domains. |
[34] | 2023 | Healthcare sector | No specific technology was mentioned | Sustainability of digital transformation in the healthcare sector requires cybersecurity skills, uncertainty management, and the healthcare sector’s interdependence. |
[35] | 2023 | Healthcare sector | Electronic health records, remote patient monitoring, artificial intelligence, telemedicine, and federated learning | Privacy and security recommendations for the healthcare sector. |
[36] | 2020 | Healthcare sector | Smartphone apps and wearable tech products enable data sharing | Need for data privacy of patients in healthcare applications. |
[37] | 2021 | Healthcare sector | No specific technology was mentioned | Need for enhanced cybersecurity in post-COVID-19 digital transformation. |
[41] | 2022 | Government sector | No specific technology was mentioned | Recommendation to use a secure network by the ministry in Palestine. |
[42] | 2022 | Government sector | No specific technology was mentioned | Establishment of clear data exchange policies and clear job descriptions for IT employees. |
[43] | 2023 | Government tax payments | Full-service mobile apps and e-payment channel | Need for actions to make the process transparent and legal in Danish tax payment. |
[44] | 2023 | Governmental and other public services | AI and other leading technologies | Emphasizes cybersecurity governance. |
[45] | 2021 | Government critical infrastructure | No specific technology was mentioned | Emphasizes cybersecurity of critical infrastructure. |
[47] | 2022 | Business sector | No specific technology was mentioned. | Emphasizes state regulations for the transformation of economic clusters at the international level. |
[48] | 2022 | Business sector | Advanced encryption and data analytics are essential for cybersecurity and AML efficiency | Analyzed digital transformation and cybersecurity situations across different countries. |
[49] | 2022 | Business sector | Business sector advanced encryption and data analytics are essential for cybersecurity and AML efficiency | Digital transformation in Indonesia and six-ware cyber security framework. |
[50] | 2023 | Business sector | IT security and data protection, cloud migration, cloud computing | Security concerns for cloud transformation of business. |
[51] | 2021 | Business sector | Blockchain, IoTs, AI, and other emerging technologies | SWOT analysis of blockchain and other technologies. |
[52] | 2022 | E-commerce | Trustworthiness, credit card usage concerns, consumer rating | User information security perception in Saudi Arabian E-commerce applications. |
[5] | 2023 | E-commerce | Protection Motivation Theory | User information security perception of E-commerce in Pakistan. |
[60] | 2023 | Industrial sector | No specific technology was mentioned | Security implication of small power plants. |
[61] | 2022 | Industrial sector | Quantum computing, cryptography, optical fiber, and related technologies are discussed | Information security implications in quantum technologies. |
[62] | 2019 | Industrial sector | Robotic Process Automation (RPA) | Information system security compliance and response implications. |
[63] | 2019 | Service industry | IoTs, machine learning, AI, and digital transformation | Cybersecurity implications of IoTs, machine learning, and digital transformation. |
[64] | 2022 | Networked organizational structure | Genetic algorithms | Factors affecting quality in manufacturing settings. |
[65] | 2021 | Work environment | Cloud computing | Emphasizes the importance of secure software development in digital transformation. |
[66] | 2020 | Enterprises | Mobile devices, cloud computing, social media platforms | Cybersecurity implications for the digital transformation of humanitarian organizations. |
[67] | 2022 | Work environment | Firewalls, encryption software, intrusion detection systems | Emphasizes data security of employee data in organizations. |
[68] | 2022 | Environment | No specific technology focused on | Digital transformation and environmental security in Russia. |
[69] | 2022 | Environment | IoTs | Green IoTs and adaptive cybersecurity implications. |
[70] | 2019 | Governance, economy, and social sectors | No specific technology was mentioned | Digital transformation and security in Russia. |
[71] | 2020 | Economy | No specific technology was mentioned | Economic security and digital transformation in Russia. |
[72] | 2022 | Digital agriculture | Smart sensors, Internet of Things, machine learning | Side-channel attacks in digital agriculture. |
[73] | 2020 | Digital agriculture | Internet of Things, 5G networks | Privacy-preserving data aggregation scheme. |
[74] | 2022 | Digital accounting | Robotics, enterprise resource planning, artificial intelligence, optical character recognition | Digital transformation and future of accounting. |
[75] | 2022 | Digital accounting | AI, blockchain, cloud computing | Emphasis on benefits for accounting firms in digital transformation. |
[76] | 2021 | Education | Artificial intelligence, Internet of Things, blockchain, 3D printing, cybersecurity, big data | Futuristic universities in the era of digital transformation. |
[77] | 2022 | Education | No specific technology focused on | Emphasis on cybersecurity culture in universities. |
[80] | 2019 | Power systems | IEEE RTS 96 | Emphasizes the impact of cybersecurity attacks on power systems. |
[81] | 2023 | Power systems | Artificial neural networks, convolutional neural networks, and support vector machines | Meta-heuristic and deep learning algorithms for cybersecurity in power systems. |
[82] | 2023 | Power systems | Graph Convolutional Long Short-Term Memory (GC-LSTM) and a deep convolutional network | Model for situational awareness in online cyber-attack. |
[83] | 2022 | Maritime | No specific technology focused on | Cybersecurity implications for maritime industry. |
4. Discussion
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Hai, T.N.; Van, Q.N.; Thi Tuyet, M.N. Digital transformation: Opportunities and challenges for leaders in the emerging countries in response to COVID-19 pandemic. Emerg. Sci. J. 2021, 5, 21–36. [Google Scholar] [CrossRef]
- Möller, D. Cybersecurity in Digital Transformation: Scope and Applications; Springer: Berlin/Heidelberg, Germany, 2020. [Google Scholar]
- Matt, C.; Hess, T.; Benlian, A. Digital transformation strategies. Bus. Inf. Syst. Eng. 2015, 57, 339–343. [Google Scholar] [CrossRef]
- Saeed, S. Digital Workplaces and Information Security Behavior of Business Employees: An Empirical Study of Saudi Arabia. Sustainability 2023, 15, 6019. [Google Scholar] [CrossRef]
- Saeed, S. A Customer-Centric View of E-Commerce Security and Privacy. Appl. Sci. 2023, 13, 1020. [Google Scholar] [CrossRef]
- Sharif, M.H.U.; Mohammed, M.A. A literature review of financial losses statistics for cyber security and future trend. World J. Adv. Res. Rev. 2022, 15, 138–156. [Google Scholar] [CrossRef]
- Haislip, J.; Kolev, K.; Pinsker, R.; Steffen, T. The economic cost of cybersecurity breaches: A broad-based analysis. In Proceedings of the Workshop on the Economics of Information Security (WEIS), Boston, MA, USA, 3–4 June 2019; Volume 1, p. 37. [Google Scholar]
- Garg, V. Covenants without the Sword: Market Incentives for Cybersecurity Investment. In Proceedings of the TPRC49: The 49th Research Conference on Communication, Information and Internet Policy, Virtual, 22–24 September 2021. [Google Scholar]
- Lee, I. Cybersecurity: Risk management framework and investment cost analysis. Bus. Horiz. 2021, 64, 659–671. [Google Scholar] [CrossRef]
- Gordon, L.A.; Loeb, M.P.; Zhou, L. Integrating cost–benefit analysis into the NIST Cybersecurity Framework via the Gordon–Loeb Model. J. Cybersecur. 2020, 6, tyaa005. [Google Scholar] [CrossRef]
- Krutilla, K.; Alexeev, A.; Jardine, E.; Good, D. The benefits and costs of cybersecurity risk reduction: A dynamic extension of the Gordon and Loeb model. Risk Anal. 2021, 41, 1795–1808. [Google Scholar] [CrossRef]
- Simon, J.; Omar, A. Cybersecurity investments in the supply chain: Coordination and a strategic attacker. Eur. J. Oper. Res. 2020, 282, 161–171. [Google Scholar] [CrossRef]
- Uddin, M.H.; Ali, M.H.; Hassan, M.K. Cybersecurity hazards and financial system vulnerability: A synthesis of literature. Risk Manag. 2020, 22, 239–309. [Google Scholar] [CrossRef]
- Curti, F.; Ivanov, I.; Macchiavelli, M.; Zimmermann, T. City Hall Has Been Hacked! The Financial Costs of Lax Cybersecurity. The Financial Costs of Lax Cybersecurity. Available online: https://ssrn.com/abstract=4465071 (accessed on 15 June 2023).
- Page, M.J.; McKenzie, J.E.; Bossuyt, P.M.; Boutron, I.; Hoffmann, T.C.; Mulrow, C.D.; Shamseer, L.; Tetzlaff, J.M.; Akl, E.A.; Brennan, S.E.; et al. The PRISMA 2020 statement: An updated guideline for reporting systematic reviews. BMJ 2021, 372, n71. [Google Scholar] [CrossRef] [PubMed]
- Al-Alawi, A.I.; Al-Bassam MS, A. The significance of cybersecurity system in hel** managing risk in banking and financial sector. J. **+managing+risk+in+banking+and+financial+sector&author=Al-Alawi,+A.I.&author=Al-Bassam+MS,+A.&publication_year=2020&journal=J.+** a cyber security strategy for international humanitarian organizations in digital transformation. Int. Rev. Red Cross 2020, 102, 367–387. [Google Scholar] [CrossRef]
- Dvojmoč, M.; Verboten, M.T. Cyber (In) security of Personal Data and Information in Times of Digitization. Med. Law Soc. 2022, 15, 287–304. [Google Scholar] [CrossRef]
- Zarapina, L.; Mukhlynina, M.; Adamenko, A.; Mukhlynin, D.; Belokopytova, N. Issues of Legal Support of Socio-economic Policy and Environmental Security of Russia in the Context of Digital Transformation. In Proceedings of the International Scientific-Practical Conference “Ensuring the Stability and Security of Socio-Economic Systems: Overcoming the Threats of the Crisis Space” (SES 2021), Kirov, Russia, 17–18 June 2021; Sciete Press: Kirov, Russia, 2021; pp. 336–340, ISBN 978-989-758-546-3. [Google Scholar] [CrossRef]
- Halabi, T.; Bellaiche, M.; Fung, B.C. Towards Adaptive Cybersecurity for Green IoT. In Proceedings of the 2022 IEEE International Conference on Internet of Things and Intelligence Systems (IoTaIS), Bali, Indonesia, 24–26 November 2022; pp. 64–69. [Google Scholar]
- Voskresenskaya, E.; Vorona-Slivinskaya, L.; Panov, S. Digital transformation of social sector as the factor of development and security of the country. In E3S Web of Conferences; EDP Sciences: Les Ulis, France, 2019; Volume 135, p. 03075. [Google Scholar]
- Kuchumov, A.; Pecherictsa, E.; Chaikovskaya, A.; Zhilyaeva, I. Digital transformation in the concept of economic security of Russia and its regions. In Proceedings of the 2nd International Scientific Conference on Innovations in Digital Economy, St. Petersburg, Russia, 22–23 October 2020; pp. 1–8. [Google Scholar]
- Alahmadi, A.N.; Rehman, S.U.; Alhazmi, H.S.; Glynn, D.G.; Shoaib, H.; Solé, P. Cyber-Security Threats and Side-Channel Attacks for Digital Agriculture. Sensors 2022, 22, 3520. [Google Scholar] [CrossRef]
- Song, J.; Zhong, Q.; Wang, W.; Su, C.; Tan, Z.; Liu, Y. FPDP: Flexible privacy-preserving data publishing scheme for smart agriculture. IEEE Sens. J. 2020, 21, 17430–17438. [Google Scholar] [CrossRef]
- Gonçalves, M.J.A.; da Silva, A.C.F.; Ferreira, C.G. The Future of Accounting: How Will Digital Transformation Impact the Sector? Informatics 2022, 9, 19. [Google Scholar] [CrossRef]
- Tiron-Tudor, A.; Donțu, A.N.; Bresfelean, V.P. Emerging Technologies’ Contribution to the Digital Transformation in Accountancy Firms. Electronics 2022, 11, 3818. [Google Scholar] [CrossRef]
- Rodríguez-Abitia, G.; Bribiesca-Correa, G. Assessing digital transformation in universities. Future Internet 2021, 13, 52. [Google Scholar] [CrossRef]
- Pavlova, E. Enhancing the organisational culture related to cyber security during the university digital transformation. Inf. Secur. 2020, 46, 239–249. [Google Scholar] [CrossRef]
- Ribas Monteiro, L.F.; Rodrigues, Y.R.; Zambroni de Souza, A.C. Cybersecurity in Cyber–Physical Power Systems. Energies 2023, 16, 4556. [Google Scholar] [CrossRef]
- Liang, J.; Zhu, H.; Zhang, B.; Liu, L.; Liu, X.; Lin, H.; Tian, J.; Chen, Q. Research and Prospect of Cyber-Attacks Prediction Technology for New Power Systems. In Proceedings of the 2023 IEEE 6th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), Chongqing, China, 24–26 February 2023; Volume 6, pp. 638–647. [Google Scholar]
- Dagoumas, A. Assessing the impact of cybersecurity attacks on power systems. Energies 2019, 12, 725. [Google Scholar] [CrossRef] [Green Version]
- Diaba, S.Y.; Shafie-Khah, M.; Elmusrati, M. Cyber Security in Power Systems Using Meta-Heuristic and Deep Learning Algorithms. IEEE Access 2023, 11, 18660–18672. [Google Scholar] [CrossRef]
- Presekal, A.; Ştefanov, A.; Rajkumar, V.S.; Palensky, P. Attack graph model for cyber-physical power systems using hybrid deep learning. IEEE Trans. Smart Grid 2023. Early Access. [Google Scholar] [CrossRef]
- Kechagias, E.P.; Chatzistelios, G.; Papadopoulos, G.A.; Apostolou, P. Digital transformation of the maritime industry: A cybersecurity systemic approach. Int. J. Crit. Infrastruct. Prot. 2022, 37, 100526. [Google Scholar] [CrossRef]
- Khashan, O.A.; Alamri, S.; Alomoush, W.; Alsmadi, M.K.; Atawneh, S.; Mir, U. Blockchain-Based Decentralized Authentication Model for IoT-Based E-Learning and Educational Environments. Comput. Mater. Contin. 2023, 75, 3133–3158. [Google Scholar] [CrossRef]
- Sufyan, A.; Khan, K.B.; Khashan, O.A.; Mir, T.; Mir, U. From 5G to beyond 5G: A Comprehensive Survey of Wireless Network Evolution, Challenges, and Promising Technologies. Electronics 2023, 12, 2200. [Google Scholar] [CrossRef]
- Al-Taleb, N.; Saqib, N.A. Towards a hybrid machine learning model for intelligent cyber threat identification in smart city environments. Appl. Sci. 2022, 12, 1863. [Google Scholar] [CrossRef]
- Sandhu, K. Advancing Cybersecurity for Digital Transformation: Opportunities and Challenges. In Handbook of Research on Advancing Cybersecurity for Digital Transformation; IGI Global: Hershey, PA, USA, 2021; pp. 1–17. [Google Scholar]
- Azizi, N.; Haass, O. Cybersecurity Issues and Challenges. In Handbook of Research on Cybersecurity Issues and Challenges for Business and FinTech Applications; IGI Global: Hershey, PA, USA, 2023; pp. 21–48. [Google Scholar] [CrossRef]
- Lesmana, D.; Afifuddin, M.; Adriyanto, A. Challenges and Cybersecurity Threats in Digital Economic Transformation. Int. J. Humanit. Educ. Soc. Sci. 2023, 2. [Google Scholar] [CrossRef]
- Maglaras, L.; Drivas, G.; Chouliaras, N.; Boiten, E.; Lambrinoudakis, C.; Ioannidis, S. Cybersecurity in the era of digital transformation: The case of Greece. In Proceedings of the 2020 International Conference on Internet of Things and Intelligent Applications (ITIA), Zhenjiang, China, 27–29 November 2020; pp. 1–5. [Google Scholar]
- Nobles, C. Stress, burnout, and security fatigue in cybersecurity: A human factors problem. HOLISTICA–J. Bus. Public Adm. 2022, 13, 49–72. [Google Scholar] [CrossRef]
- Metawa, N.; Elhoseny, M.; Mutawea, M. The role of information systems for digital transformation in the private sector: A review of Egyptian SMEs. Afr. J. Econ. Manag. Stud. 2022, 13, 468–479. [Google Scholar] [CrossRef]
- Özsungur, F. Business Management and Strategy in Cybersecurity for Digital Transformation. In Handbook of Research on Advancing Cybersecurity for Digital Transformation; IGI Global: Hershey, PA, USA, 2021; pp. 144–162. [Google Scholar]
- Nguyen Duc, A.; Chirumamilla, A. Identifying security risks of digital transformation-an engineering perspective. In Digital Transformation for a Sustainable Society in the 21st Century: 18th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society, I3E 2019, Trondheim, Norway, 18–20 September 2019; Springer International Publishing: Berlin/Heidelberg, Germany, 2019; pp. 677–688. [Google Scholar]
- Kour, R.; Patwardhan, A.; Thaduri, A.; Karim, R. A review on cybersecurity in railways. Proc. Inst. Mech. Eng. Part F J. Rail Rapid Transit 2023, 237, 3–20. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Saeed, S.; Altamimi, S.A.; Alkayyal, N.A.; Alshehri, E.; Alabbad, D.A. Digital Transformation and Cybersecurity Challenges for Businesses Resilience: Issues and Recommendations. Sensors 2023, 23, 6666. https://doi.org/10.3390/s23156666
Saeed S, Altamimi SA, Alkayyal NA, Alshehri E, Alabbad DA. Digital Transformation and Cybersecurity Challenges for Businesses Resilience: Issues and Recommendations. Sensors. 2023; 23(15):6666. https://doi.org/10.3390/s23156666
Chicago/Turabian StyleSaeed, Saqib, Salha A. Altamimi, Norah A. Alkayyal, Ebtisam Alshehri, and Dina A. Alabbad. 2023. "Digital Transformation and Cybersecurity Challenges for Businesses Resilience: Issues and Recommendations" Sensors 23, no. 15: 6666. https://doi.org/10.3390/s23156666