IAD Index of Academic Documents
  • Home Page
  • About
    • About Izmir Academy Association
    • About IAD Index
    • IAD Team
    • IAD Logos and Links
    • Policies
    • Contact
  • Submit A Journal
  • Submit A Conference
  • Submit Paper/Book
    • Submit a Preprint
    • Submit a Book
  • Contact
  • The Eurasia Proceedings of Science Technology Engineering and Mathematics
  • Volume:17
  • Efficiency Evaluation of Cyber Security Based on EBM-DEA Model

Efficiency Evaluation of Cyber Security Based on EBM-DEA Model

Authors : Van Thanh Tien NGUYEN, Chianan WANG, Fuchiang YANG, Thi Minh Nhut VO
Pages : 38-44
Doi:10.55549/epstem.1175908
View : 19 | Download : 8
Publication Date : 2022-09-16
Article Type : Research Paper
Abstract :Cyber security aims to protect against the unlawful use of systems, networks, and technologies by lowering the likelihood of cyberattacks and thwarting their execution. The comparatively low degree of security, which plays an essential part in the activities of any nation, has been a primary contributor to the low overall operational efficiency. In addition, implementing machine learning and artificial intelligence would make the network vulnerable to several severe vulnerabilities in terms of cybersecurity, which could lead to disastrous results. Therefore, research into the efficacy of cyber security is essential to ensure the future safety of the whole world. An EBM evaluation approach was utilized in this research project so that the production efficiency of firms on a micro level could be assessed. After that, it analyzed the effectiveness of cybersecurity organizations` input and output variables by using financial data for 2020 from sources in the US market. It was found that DMU 1, DMU 7, DMU 9, and DMU 10 had the highest performance levels. After doing an efficiency analysis of the ten most prominent organizations now functioning in the cybersecurity sector, we realized that three of those companies required significant modifications. However, four of the other businesses were typically more efficient.
Keywords : EBM Epsilon based measure, Model, Cybersecurity, 5G security, AI security, Cyber security industry

ORIGINAL ARTICLE URL
VIEW PAPER (PDF)

* There may have been changes in the journal, article,conference, book, preprint etc. informations. Therefore, it would be appropriate to follow the information on the official page of the source. The information here is shared for informational purposes. IAD is not responsible for incorrect or missing information.


Index of Academic Documents
İzmir Academy Association
CopyRight © 2023-2025