Joshua Guymon Jr.
Research Methods in Informatics
3 October 2021
Citation
Dedeke, Adenekan, and Katherine Masterson. “Contrasting Cybersecurity Implementation Frameworks (CIF) from Three Countries.” Information & Computer Security, vol. 27, no. 3, 2019, pp. 373–392., https://doi.org/10.1108/ics-10-2018-0122.
Abstract of the article
The article discussing multiple countries and their key structures that have vulnerabilities in cybersecurity. How different countries plans to fix key structures that are outdated or at risk. The level of damage that those key structures impose. Usually, companies that provide power or food. Anything that would be noticed on a global or a least local scale. Forcing a company to meet a hacker demands. Usually through monetary compensation. What 18 countries have done in order to combat these hackers and their framework to prevent hacking. Some countries had a plan but lacked a CIF or other framework that is badly needed. This occupied 9 countries. The results from Adenekan and Masterson were “the inter-rater agreement was 83 per cent for USA, 77 per cent for UK and 83 percent for Australia. The overall average of the inter-rater agreements was 80 per cent” (Adenekan, Masterson). Basically, a method to rate the outcome of a study. 80 percent Is one of the highest percentages on can get. Although some did mention to some glaring flaws. Still a consensus was made through the code books and the frameworks were corrected. Then an assessment arrangement was made to clarifying cybersecurity needs and giving a final score to the countries (0 is bad, 100 is the best).
Experimental or non-Experimental
My article was non-experimental as it merely recorded data on two raters that took documents, and a code book then created a formula for calculating the quality of a country’s security. It did not attempt to insert a variable that could change the outcome.
Population
The codes and other public functions that were used in the code books to help assist the raters create a final score for each country.
Sample
The codes are not given in the paper rather the outcome. It measured categorizes, patterns, among other basic hacking methods in order to create a rater that could properly give a score in order to let the user know how a countries overall score was. That was then made into a formula calculating the risks and threats that were or were not covered giving a proper score.
Method of Measurement
They had to create a codebook of all the well-known hacks and other creations in order to create a formula that could properly guess the security and risk factor of a country’s framework. These codes are not given in the article. However, the article does source other researchers that have proven this method to be accurate in predicting a countries competence with hackers and prevention.
Method of analysis
The problem is that hackers are accessing key structures in many countries. They will use their ability to damage those key structures to gain power. Usually through monetary gain. The governments need to create and update key structures in their military and key industries to combat the hackers. For that reason, they have taken a codebook and created a common list of hacks, patters, Categorizes, that are commonly used by hackers and testing them in a formula that calculates the risk of each country. The higher the score the more the codebook is subverted by their government’s framework.
Conclusion
Their will never be a government who can ever create an internet platform that cannot be hacked. For that reason, the governments of the world must forever be in a locked battle to upgrade and test their security measures. Those governments who cannot keep up with the progression of cybercrime risk not being able to use the internet for local and military needs.
Why is this useful?
I never really appreciated the complexity of planning something to this scale. Not only that but keeping it in easy-to-understand format. That even a novice like myself can understand. Is quite an achievement. Using this paper, I have reviewed some key concepts as well as learned on how to rate a large-scale cybersecurity plan.
What is the next step?
To update the module, add to the codebook and modify it where it is needed. It should be capable of adapting as quickly as possible to decrease the likely hood of major cyber-attacks. The Russian and Chinse Governments are very capable of accessing and creating methods of attack. That could destroy and commercial industry or military advantages. Not to mention a single individual could hack and control major military equipment. A person could hack into major networks that control Social Security Cards and birth certificates among other important data and tank an entire economy. Killing millions in the process without firing a shot. Dangers like these will forever be present and its up to the Western powers to keep peace in the west. The plan really should be updated every single time there is a major change in hacking. Usually how a hack is created and implemented. When such a find is made the Codebook should be immediately changed to reflect the new information and the Networks changed as well.
As the coverage of the Internet continues to expand, some criminals will take advantage of loopholes in the security barriers of the Internet to do whatever they want. In fact, hackers are also talented people, if hackers work for the government, then the repair of network security is just around the corner.
Cybersecurity has always been a very important discussion and has increasingly become more so. The article you chose helps better understand the situation going on around the world regarding cybersecurity and how countries can be protected. It’s helpful to clarify these issues as not everyone understands the extent that America and other countries are under threat from cyber-attacks. The way they ‘measured’ their experiment in this article is unique in how they had to create a system to do so on their own. In addition, I believe the way they measure these types of hacking, and vulnerabilities to be interesting as that is important to know what needs better protection as opposed to other areas. The world needs better security over our networks. For too long cybersecurity hasn’t been taken seriously enough and must be improved. Overall, I think you chose a very helpful article that provides great insite into the world of cybersecurity.
I agree with you about how much power hackers have in being able to take down some countries. Some hackers intentions may be monetarily value but some do it just to be devious which could be really bad for smaller countries. It is important for everyone to keep up within their infrastructures, and you are right it is an ongoing battle as the internet evolves so will attacks.
Interesting research topic! Cybersecurity is a very important concept and to see how various countries are and can prevent from hacking happening, etc. is something we should all take into account of. Since the internet is not going away anytime soon it’s great to dive into this topic and see possibilities and solutions that are available. I would agree with your next step and when a hack is created or implemented having that documented and immediately making changes would be beneficial. Nice work!