Preprint Article Version 1 This version is not peer-reviewed

A Hybrid Analytical Framework for Enhancing Cybersecurity in Underdeveloped Countries

Version 1 : Received: 17 October 2024 / Approved: 18 October 2024 / Online: 18 October 2024 (06:29:00 CEST)

How to cite: Ali, S. M.; Razzaq, A.; Abbass, H.; Yousaf, M.; Shan, R. U. A Hybrid Analytical Framework for Enhancing Cybersecurity in Underdeveloped Countries. Preprints 2024, 2024101442. https://doi.org/10.20944/preprints202410.1442.v1 Ali, S. M.; Razzaq, A.; Abbass, H.; Yousaf, M.; Shan, R. U. A Hybrid Analytical Framework for Enhancing Cybersecurity in Underdeveloped Countries. Preprints 2024, 2024101442. https://doi.org/10.20944/preprints202410.1442.v1

Abstract

This paper presents an approach to assess and improve the cybersecurity infras- tructure of developing countries. We have highlighted and addressed the critical gaps through a hybrid approach encompassing SWOT analysis, benchmarking using Data Envelopment Analysis (DEA) and, Root Cause Analysis (RCA). This approach has provided a strong basis for evaluating cybersecurity performance by combining qualitative insights with quantitative metrics. As a case study, we have compared an underdeveloped country’s (Pakistan) cybersecurity pos- ture to five highly developed countries (Lithuania, Estonia, Singapore, Spain,and Norway). Our analysis has identified cybersecurity shortcomings and pro- vided actionable recommendations within a flexible framework, applicable for all developing countries to identify and address vulnerabilities, and align their cybersecurity infrastructure with international standards.

Keywords

Cybersecurity; Global Cybersecurity Index; Data Envelopment Analysis; Benchmarking

Subject

Computer Science and Mathematics, Information Systems

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.