<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Organizational and Economic Provision of Corporate Information Effective Protection</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Valery Lakhno</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Bissenbay Satzhanov</string-name>
          <email>satzhanov1959@mail.ru</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Abzal Tabylov</string-name>
          <email>tabylov62@mail.ru</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vitaliy Chubaievsyi</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Serhii Kaminskyi</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>National University of Life and Environmental Sciences of Ukraine</institution>
          ,
          <addr-line>15 Heroyiv Oborony str., Kyiv, 03041</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>State University of Trade and Economics</institution>
          ,
          <addr-line>19 Kyoto str., Kyiv, 02156</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Yessenov University</institution>
          ,
          <addr-line>microdistrict 32, Aktau, 130000</addr-line>
          ,
          <country country="KZ">Kazakhstan</country>
        </aff>
      </contrib-group>
      <fpage>138</fpage>
      <lpage>147</lpage>
      <abstract>
        <p>The model that describes the procedure for formalizing the task of optimizing the Information Security System (ISS) of a business entity (company) has been further developed. At the same time, unlike existing approaches, the emphasis in the proposed solution is on mathematical, algorithmic, and computer support for the decision-making procedure in the task of organizational and economic support for the effective protection of corporate information in the context of the company's Information Security (IS) management tasks. It enables the defense side to effectively determine the parameters of organizational management of the company's information security infrastructure. The contour of the Decision Support System (DSS) in the process of the company's information security infrastructure development was considered. In the context of a qualified experts' shortage in the field of information security of companies, additions to the model were proposed that allow taking into account the impact of human resources of experts in information security issues on the management of the company's information security infrastructure. Recommendations were offered and the corresponding application software-DSS was described. The use of such DSS will help one to minimize the risks associated with the lack of qualified IS experts in many companies.</p>
      </abstract>
      <kwd-group>
        <kwd>1 Information protection</kwd>
        <kwd>information security</kwd>
        <kwd>organizational and economic support</kwd>
        <kwd>infrastructure management</kwd>
        <kwd>decision support system</kwd>
        <kwd>risk minimization</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>In the conditions of globalization, cooperation,
and competition, not a single company (regardless
of the field of activity) can function without a
developed structure of information technologies
and systems (hereinafter, respectively, IT and IS),
which ensure the success and efficiency of both
making individual management decisions and
efficiency of company business processes as a
whole. The dynamic growth of the IT
infrastructure of companies has long overcome
the first stage of the traditional expansion of the
scale of hardware and software complexes used to
automate the collection, storage, processing,
transmission, and receipt of information. In
modern conditions, the priority has become not so
much the quantity and quality of IT and IS used in
the business processes of business entities, but the
reliability and completeness of the information
that contributes to the adoption of optimal
management decisions.</p>
      <p>
        Traditional IS for large companies has been
replaced by corporate IS (hereinafter referred to
as CIS). However, the rapid development of IT
and IS companies has given rise to such an acute
problem as ensuring the information security
(hereinafter referred to as IS) of companies and
the safety of their Information Resources
(hereinafter referred to as InR). The use by the
attacking side of increasingly complex methods
for implementing cyber-attack scenarios has led
to the fact that any CIS already at the time of its
operation requires the adoption of appropriate
measures aimed at protecting corporate
information. Consequently, each enterprise must
ensure a high degree of protection of commercial
information, and the integrity of its InR [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>
        Continuous organizational and economic
support of the company’s information security
procedures can minimize business risks,
maximize return on investment, facilitate business
opportunities, and enhance the company’s
commercial image and competitive advantages
[
        <xref ref-type="bibr" rid="ref1 ref2 ref33 ref34 ref35 ref36">1, 2, 33–36</xref>
        ].
      </p>
      <p>To ensure effective protection of InR and
stable management of information security,
companies must not only periodically assess
information security, but also constantly analyze
the processes for their CIS.</p>
      <p>While the process of information security
effectiveness measurement is recognized as an
important element of an information security
management system, many gaps and challenges
remain. Since information security is a complex
and multifaceted system with a large amount of
data, specialists in the information security
departments of companies are often overloaded
with current work. And, therefore, they cannot
develop effective processes for assessing the
current state of the company’s information
security.</p>
      <p>
        As practice shows, information security
specialists mainly focus on technical goals. At the
same time, only a small part of them can perform
a comprehensive assessment of the effectiveness
of the company’s information security, including
work on organizational and economic support for
the effective protection of corporate information.
World experience undeniably proves that a simple
increase in the number of means and measures to
protect information (hereinafter referred to as IS)
does not always give a tangible effect [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>
        Moreover, in several situations [
        <xref ref-type="bibr" rid="ref3 ref37">3, 37</xref>
        ], the
implementation of such a scenario only increases
the workload of the personnel involved in the
information security of the company. Moreover,
errors in the planning of resources allocated for
ensuring the information security of companies
lead to the fact that expensive protection of InR
with little value or significance for business
processes results in damage. Such damage may
not always be financially obvious. In some cases,
the extent of reputational damage is many times
greater than the financial losses from the loss of
information [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. The same can be said about the
insufficiently effective protection of valuable InR
companies. For example, according to [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], the
presence in a company of leaks of important
internal information used in business processes in
volumes &gt;20% can lead to the fact that the
company will become bankrupt with a probability
of 60%. Moreover, according to [
        <xref ref-type="bibr" rid="ref38 ref5 ref6">5, 6, 38–39</xref>
        ],
more than 90% of companies that were deprived
of access to their own InR for periods of &gt;10 days
stopped their economic activities with a high
degree of probability.
      </p>
      <p>Summarizing the above, there is a certain
contradiction. So, on the one hand, significant
costs for the Information Security System (ISS)
are an obligatory component of the costs of almost
all business entities. On the other hand, it is just as
necessary to solve the problem related to
optimizing the costs of building an effective
information security system and organizing
efficient processes in CIS. The conclusions drawn
predetermine the relevance of this study, aimed at
improving the methods and models of
organizational support for IT infrastructure
management processes in the information security
system of companies.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Literature Review and Analysis</title>
      <p>
        It is shown in [
        <xref ref-type="bibr" rid="ref7 ref8">7, 8</xref>
        ] that the increasing intensity
and more complex scenarios of cyber-attacks
make relevant not only the permanent
improvement of the hardware and software
systems of the information security system but
also dictate the need to take other measures. Such
measures, in particular, include measures aimed at
improving the organizational and economic
support for the effective protection of corporate
information of business entities. According to [
        <xref ref-type="bibr" rid="ref10 ref9">9,
10</xref>
        ], it is necessary to provide the protection side
with effective intelligent systems that can
facilitate the rather routine work of managing the
information security of companies.
      </p>
      <p>
        The need for prompt decision-making related
to organizational and economic support and
management of corporate information protection
has made promising research on the development
of Decision Support Systems (DSS) [
        <xref ref-type="bibr" rid="ref11 ref12">11, 12</xref>
        ] in
this area. In these works, as well as in [
        <xref ref-type="bibr" rid="ref13 ref14">13, 14</xref>
        ], it
is shown that in the framework of the creation of
such DSS, new methods, models, algorithms, and
Application Software (AS) used to solve such
problems are being developed accordingly. The
authors of the considered works, however, do not
give weighty arguments proving the effectiveness
of the widespread use of such DSS for most
business entities. The experience of using DSS in
IS management tasks for individual companies is
considered in [
        <xref ref-type="bibr" rid="ref15 ref16">15, 16</xref>
        ]. However, as noted in [
        <xref ref-type="bibr" rid="ref16 ref17">16,
17</xref>
        ], the existing commercial DSS in the tasks of
providing information security to companies are
of a closed nature. The authors state that the
acquisition by individual small companies of this
class of DSS is associated with significant
financial costs. Non-commercial DSS existing on
the application software market in IS tasks do not
have sufficient functionality [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ].
      </p>
      <p>
        As shown in [
        <xref ref-type="bibr" rid="ref18 ref19 ref20">18–20</xref>
        ], the issues of complex
implementation of DSS in the tasks of
organizational and economic support for the
effective protection of corporate information in
the context of information security management
tasks have not been systematically considered.
      </p>
      <p>
        More than half of all cyber-attacks are aimed
at small companies and enterprises [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]. Despite
such depressing statistics, as shown in [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ], a
significant part of the management of small and
medium-sized companies continues to believe
that information security is an extra cost item.
This opinion should be partly based on the
shortage of qualified human resources involved in
information security. Thus, small companies
experience more problems in monitoring the
effectiveness of information security. As shown in
[
        <xref ref-type="bibr" rid="ref23 ref24">23, 24</xref>
        ], the use of formal and complex
procedures focused on anticipating and predicting
information security incidents has become a
common practice for such small companies.
      </p>
      <p>
        Taking into account the conclusions made by
the authors in [
        <xref ref-type="bibr" rid="ref13 ref15 ref17 ref18 ref19 ref20 ref24">13, 15, 17–20, 24</xref>
        ], the problem of
systemic implementation of intelligent DSS in the
tasks of organizational and economic support and
information security management of companies
remains unresolved. Mathematical-algorithmic
and computer support of the decision-making
procedure and qualitative expert assessment allow
solving the problems of organizational and
economic support of effective protection of
corporate information in the context of
information security management tasks in the
most efficient way. Thus, conceptually innovative
approaches can be based on the paradigm of the
integrated implementation of DSS in the tasks of
organizational and economic support for the
effective protection of corporate information in
the context of the tasks of IS management of
companies.
      </p>
      <p>The above reasons make the subject of our
study relevant. In our opinion, it is advisable to
focus on the implementation of such DSS in small
companies, where the situation with information
security seems to be the most critical.</p>
    </sec>
    <sec id="sec-3">
      <title>3. The Purpose of the Work and the</title>
    </sec>
    <sec id="sec-4">
      <title>Objectives of the Study</title>
      <p>The purpose of the work is to develop a model
of organizational and economic support and
management of information security companies.</p>
      <p>To achieve the goal of the work, it is necessary
to solve the following tasks:
• to develop a model of organizational and
economic support and IS management of
companies, taking into account the
minimization of risks associated with the
lack of qualified IS experts.
• to develop and test a DSS for the
organizational, economic support, and
management of information security of
companies, which will allow the protection
side to rationally use methods and
information security.</p>
    </sec>
    <sec id="sec-5">
      <title>4. Methods and Models</title>
      <p>
        It is noted in [
        <xref ref-type="bibr" rid="ref25 ref26">25, 26</xref>
        ] that in the context of the
global digitalization of the economy, many
companies are faced with a shortage of qualified
cybersecurity specialists. And if most of the InR
threats can be blocked by hardware and technical
information protection systems, then the issues of
organizational and economic support for the
effective protection of corporate information still
have to be solved by information security
analysts. And here much depends on the
qualifications and experience of the work of a
particular specialist. In our opinion, the direction
associated with the widespread introduction into
practice of solving problems of organizational and
economic support of corporate information
protection systems of intelligent DSS may turn
out to be quite effective, see Fig. 1.
      </p>
      <p>
        Such systems are capable of performing rather
routine and time-consuming computational and
analytical tasks, for example, related to
optimizing the resolution of individual
information security facilities along the contours
of the company’s information security. Also, this
kind of DSS will allow you to quickly make
decisions when redistributing information
security in the face of dynamic confrontation with
the attacking side [
        <xref ref-type="bibr" rid="ref27 ref28">27, 28</xref>
        ].
      </p>
      <p>Threats to the information security of the company
The information security service of the company</p>
      <p>is developing</p>
      <p>Company information security policy
Requirements for the information security
system in the company</p>
      <p>Control object
Informational
resources</p>
      <p>Hardware and
software resources
Corporate
information
protection systems</p>
      <p>Organizational and
human resources
Performance
monitoring</p>
      <p>Information security management of a company
based on DSS</p>
      <p>DSS</p>
      <p>Control actions</p>
      <p>An approximate list of tasks that can be solved by the DSS:
• optimal costs for the construction of the information security system of the company;
• the optimal composition of hardware and software protection tools for the company's IS circuits;
• dynamic redistribution of ISS in the context of targeted cyber attacks on the company's InR;
• and etc.</p>
      <p>A common practice in the Information
Security Management System (hereinafter
referred to as the ISMS) of companies is the
delegation of some of the tasks that require
sufficiently high qualifications to external experts.</p>
      <p>However, external experts are usually auditors
who evaluate information security metrics
through document reviews, observations, and
interviews with staff. This approach has a positive
effect when it is required to assess the technical
vulnerabilities of the CIS and risks (which
auditors usually identify using penetration tests
and analysis of information security events
(incidents). At this stage, complex calculations
and complex technical tests are not needed. At this
stage, it may be sufficient to present the results of
such tests and analyses to the management of the
company. Based on such analysis and audit
findings, management can assess the importance
of specific measures to be taken to ensure the
protection of corporate information. However,
this approach becomes less effective when it
comes to the need for technical and economic
calculations in the tasks of providing enterprise
information security.</p>
      <p>For example, such tasks include multicriteria
optimization tasks related to the search:
• optimal costs for the construction of the
information security system of the company.
• the optimal composition of hardware and
software protection tools for the company’s IS
circuits.
dynamic redistribution of information security
in the context of targeted cyber-attacks on the
company’s InR, etc.</p>
      <p>In such situations, in our opinion, it is
advisable to shift routine calculations and the
search for mathematical solutions to these
optimization problems to the DSS. With this
approach, the processes of analyzing information
security audit data and the results of mathematical
and economic modeling using DSS, and in some
cases risk forecasting, are presented to the
company’s management. Based on this data,
management decides on the necessary corrective
actions aimed at achieving the desired target level
of information security. Moreover, we note that
the results of mathematical and economic
modeling and risk forecasting when using DSS are
devoid of a subjective component, and are not tied
to the qualifications of both internal and external
auditors. In this case, we fully follow the
wellestablished plan-do-check-act approach. The use
of DSS makes this approach more flexible,
operational, and continuous.</p>
      <p>As the number and complexity of attack
scenarios grow, information security becomes one
of the main management tasks of company
management. This is because we have to consider
the management of a complex system. Moreover,
wrong decisions regarding the information
security of a company can lead to a decrease in the
performance of all business processes. When the
company’s information security specialists are
competent and able to provide a high level of
information security and protection, in most cases
they act effectively in solving the problems of
planning and investment activities in information
security. Thus, the overall efficiency of a
company’s business processes most often depends
on the consistency between information security
planning and business planning.</p>
      <p>
        Solving problems related to the optimization of
the information security system of a company
includes the following steps [
        <xref ref-type="bibr" rid="ref14 ref28">14, 28</xref>
        ]:
1. determine the parameters of
organizational management of IT
infrastructure and information security.
2. to minimize the cost of building ISS.
3. choose the optimal amount of investment
in the company’s information security.
4. eliminate (or minimize) the possibility of
information leaks in the company.
      </p>
      <p>The computational core of the DSS can take on
all the calculations for the search for local or
global extrema of the objective functions.</p>
      <p>For example, when searching for a solution to
the problem of minimizing financial costs for
information security, you can use a function of the
form:</p>
      <p>n m n
С = Cij  ij +Ci   i → min,</p>
      <p>i=1 j=1 i=1
where is i = 1, n; j = 1, m
(1)
(2)
n
i=1
n m
i=1 j=1
  s j  mij  ij  PLdc,  ij = 1, j  J ,
where Cij is the number of costs for protecting the
jth resource with the help of the ith ISS; Ci is the
number of costs for the set of InR with the help of
the ith ISS; I = i1,...,in; J = j1,..., jm−
accordingly, the set of information security in the
company and the set of InR, which are subject to
protection; mij assessment of the effectiveness of
protecting the jth resource with the help of the ith
ISS; sj is the factor of the importance of the jth
resource in the complex assessment of the
information security system of the company;
 ij − a binary value, if  ij = 1 else ith ISS is
selected to protect the jth resource,  ij = 0 then ith
ISS is used to protect only against potential
threats;  i − binary value, if  i = 1 then ith ISS can
be used, if i = 0 , then not; PLcd is the level of
protection at the cost of information security in the
amount of ( С ) and threats ( D ).</p>
      <p>If we are talking about the need to maximize
the degree of protection of the company’s InR,
then we can use the following objective function:</p>
      <p>n m
PLc =   s j  mij  ij → max, (3)</p>
      <p>i =1 j =1
subject to the following boundary conditions:</p>
      <p>n m n
C =   Cij  ij + Ci   i  Cd ,
i =1 j =1 i =1
(4)
n
 ij = 1, j  J ,
i =1
where  ij  0;1,  ij  0;1.</p>
      <p>The high dynamics of changes in the landscape
of cyber threats and the external environment for
modern companies that build many of their
business processes on the use of IT and IS dictates
its characteristics in the formation of a personnel
policy for information security specialists. The
purpose of this study is not a detailed study of the
problem of the effectiveness of the use of human
resources for information security in companies.</p>
      <p>We just want to emphasize that this is still little
studied and requires the close attention of
company leaders.</p>
      <p>In general, the set that formalizes the shortage
of human resources in the field of information
security of the company can be represented as
follows:</p>
      <p>PE = J , Pr,M , D (5)
where J is the set of InR of the company that
requires attention from the staff in the context of
information security; Pr− a set of properties that
an employee dealing with information security
issues for a specific InR should possess; M is
motivation to constantly improve the level of their
professional qualifications; D is set of threats that
require the response of a highly qualified
employee.</p>
      <p>Of course, this formalization of the model does
not take into account all aspects of the problem of
the shortage of staff of IS specialists in companies,
but it illustrates the importance of the task of
including intelligent DSS in the business process
loop, ready to take on some of the rather routine
work that person has to perform in the daily
practice of providing IS in a company.</p>
      <p>The procedure for considering actual threats
and risks associated with the implementation of
these threats also requires separate modeling and
assessment.
5. DSS Software Product “DSS</p>
      <p>Investing in Cybersecurity”</p>
      <p>
        The models described above have been
implemented in several software products. For
example, in the DSS “DSS investing in
cybersecurity” [
        <xref ref-type="bibr" rid="ref29 ref30">29, 30</xref>
        ].
      </p>
      <p>DSS “DSS investing in cybersecurity” is
intended for the online selection of optimal
strategies for investing in the company’s
information security tools. This task is solved in
the context of improving the security of corporate
information systems with the help of innovative
technologies based on the use of intelligent
decision support systems in the protection circuits
of CIS.</p>
      <p>The interface for experts to work with DSS
“DSS investing in cybersecurity” was developed
on ASP.NET Core MVC, see Figs. 2–4.</p>
      <p>For example, Figs. 2 and 3 show the results of
solving the optimization problem described by the
objective (1) and boundary conditions (2). In
addition to graphical output, the DSS also
generates textual output, shown at the top of the
screen.</p>
      <p>In Fig. 2 Curve line 2 (shown in yellow) shows
the trajectory of the distribution of financial
resources with a clear optimum. The extreme
value on the curve corresponds to the size of the
company’s financial resources, which will be
sufficient to minimize IS threats.</p>
      <p>
        Since the calculations are iterative, in the
following figure (see Fig. 3) you can see the
number of steps that were required to find the
optimum, for example, when using the solution
method based on the genetic algorithm [
        <xref ref-type="bibr" rid="ref31 ref32">31, 32</xref>
        ].
DSS. This solution was obtained using a modified
hierarchy analysis method. Fig. 4 shows the
results of a comparative analysis using three types
of antivirus software as an example: Avast, ESET
NOD32, and Windows Defender. Software is
compared on three parameters—cost efficiency
complexity. The DSS investing in cybersecurity
DSS relieves the evaluation and selection
procedure of subjectivity, based only on a clear
algorithmic comparison of all advantages and
disadvantages. Similar procedures can be
performed concerning other types of hardware
and software systems of information security
systems—firewalls, intrusion detection systems,
access control systems, etc.
      </p>
      <p>Without prioritizing the development of a set
of models for solving multi-criteria optimization
problems related to ensuring the company’s
information security as a priority of this study, we
note that these tasks can be effective only based
on a synergistic combination of expert experience
and cybernetic modeling. Which together ensures
prompt decision-making regarding the provision
of information security for the company.</p>
    </sec>
    <sec id="sec-6">
      <title>6. Discussion</title>
      <p>If the DSS is entrusted with solving problems
related to the optimization of information security,
then information security specialists within the
company can focus on solving organizational
problems.</p>
      <p>Such tasks include, for example, data backup
activities; isolation of information systems most
sensitive to threats; safe and secure destruction of
devices and data; centralized system management
and configuration management, etc.</p>
      <p>We also note that it is much easier for
information security specialists in the company
itself than for external specialists to track
personnel who have malicious motives. The
assistance of the DSS is also not required in
solving problems related to the motivation and
readiness of employees to participate in IS
training processes.</p>
      <p>DSS can also be effective in risk analysis and
assessment, business continuity plans, and
incident response, as well as to increase the
efficiency of CIS recovery procedures.</p>
      <p>The data of mathematical and economic
modeling with the help of DSS are transferred to
the company’s management for decision-making
at the strategic level of information security
management. The main task of management in
such a situation is to ensure a reasonable approach
to the formation of an information security policy.
Successful implementation of the information
security policy requires continuous vertical and
horizontal communication and coordination of the
needs of all stakeholders—information security
specialists, network administrators, management,
etc.</p>
      <p>Thus, organizational and economic support for
the effective protection of corporate information
becomes an integral part of information security
management procedures. Such a synergistic
approach demonstrates an adequate level of the
company’s information security maturity. The use
of DSS can be identified and developed as a
separate IS business function. Moreover, this
business function, in conjunction with traditional
approaches, will allow you to more quickly
identify the weak links in the company’s
information security.</p>
    </sec>
    <sec id="sec-7">
      <title>7. Conclusions</title>
      <p>The model that describes the procedure for
formalizing the task of optimizing the ISS of a
business entity (company) has been further
developed.</p>
      <p>Unlike existing approaches, the focus of this
study is on the mathematical-algorithmic and
computer support of the decision-making
procedure in matters of organizational and
economic support for the effective protection of
corporate information in the context of the tasks
of IS management of companies.</p>
      <p>The proposed approach enables the defense
side to most effectively determine the parameters
of organizational management of the company’s
information security infrastructure.</p>
      <p>The contour of the DSS in the process of
developing the company’s information security
infrastructure is considered. In the context of a
shortage of qualified experts in the field of
information security of companies, additions to
existing mathematical models are proposed. The
proposed additions make it possible to take into
account the impact of the human resources of
experts in information security issues on the
management of the company’s information
security infrastructure. Recommendations are
offered and the corresponding application
software—DSS is described. The use of this DSS
will help minimize the risks associated with the
lack of qualified IS experts in many companies.</p>
    </sec>
    <sec id="sec-8">
      <title>8. References</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>J. H.</given-names>
            <surname>Beales</surname>
          </string-name>
          <string-name>
            <given-names>III</given-names>
            ,
            <surname>T.</surname>
          </string-name>
          J.
          <string-name>
            <surname>Muris</surname>
            , Choice or Consequences: Protecting Privacy in Commercial Information,
            <given-names>U.</given-names>
          </string-name>
          <string-name>
            <surname>Chi</surname>
          </string-name>
          . L. Rev.
          <volume>75</volume>
          (
          <issue>109</issue>
          ) (
          <year>2008</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>V.</given-names>
            <surname>Astapenya</surname>
          </string-name>
          , et al.,
          <article-title>Last Mile Technique for a Wireless Delivery System using an Accelerating Lens</article-title>
          , in: IEEE International Conference on Problems of Infocommunications.
          <source>Science and Technology</source>
          (
          <year>2020</year>
          ). doi:
          <volume>10</volume>
          .1109/ picst51311.
          <year>2020</year>
          .9467886
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>F.</given-names>
            <surname>Kipchuk</surname>
          </string-name>
          , et al.,
          <source>Assessing Approaches of IT Infrastructure Audit, in: IEEE 8th International Conference on Problems of Infocommunications, Science and Technology</source>
          , (
          <year>2021</year>
          ). doi:
          <volume>10</volume>
          .1109/picst54195.
          <year>2021</year>
          .9772181
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>E.</given-names>
            <surname>Amir</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Levi</surname>
          </string-name>
          , T. Livne,
          <source>Do Firms Underreport Information on Cyber-Attacks? Evidence from Capital Markets, Review of Accounting Studies</source>
          <volume>23</volume>
          (
          <issue>3</issue>
          ) (
          <year>2018</year>
          )
          <fpage>1177</fpage>
          -
          <lpage>1206</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>V.</given-names>
            <surname>Grechaninov</surname>
          </string-name>
          , et al.,
          <article-title>Decentralized Access Demarcation System Construction in Situational Center Network</article-title>
          ,
          <source>in Workshop on Cybersecurity Providing in Information and Telecommunication Systems II</source>
          , vol.
          <volume>3188</volume>
          , no.
          <issue>2</issue>
          (
          <year>2022</year>
          )
          <fpage>197</fpage>
          -
          <lpage>206</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>V.</given-names>
            <surname>Astapenya</surname>
          </string-name>
          , et al.,
          <article-title>Analysis of Ways and Methods of Increasing the Availability of Information in Distributed Information Systems</article-title>
          , in: 8th International Conference on Problems of Infocommunications, Science and Technology (
          <year>2021</year>
          )
          <fpage>174</fpage>
          -
          <lpage>178</lpage>
          . doi:
          <volume>10</volume>
          .1109/PICST54195.
          <year>2021</year>
          .9772161
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>D. I.</given-names>
            <surname>Dogaru</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Dumitrache</surname>
          </string-name>
          ,
          <article-title>Cyber Attacks of a Power Grid Analysis using a Deep Neural Network Approach</article-title>
          ,
          <source>Journal of Control Engineering and Applied Informatics</source>
          <volume>21</volume>
          (
          <issue>1</issue>
          ) (
          <year>2019</year>
          )
          <fpage>42</fpage>
          -
          <lpage>50</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>V.</given-names>
            <surname>Krundyshev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kalinin</surname>
          </string-name>
          ,
          <article-title>Hybrid Neural Network Framework for Detection of Cyber Attacks at Smart Infrastructures</article-title>
          ,
          <source>in: Proceedings of the 12th International Conference on Security of Information and Networks</source>
          (
          <year>2019</year>
          )
          <fpage>1</fpage>
          -
          <lpage>7</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Iskanderov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Pautov</surname>
          </string-name>
          ,
          <article-title>Comprehensive Intelligent Information Security Management System (CIISMS) for Supply Networks: The Actor-Network Perspective</article-title>
          ,
          <source>in: Proceedings of the Computational Methods in Systems and Software</source>
          (
          <year>2020</year>
          )
          <fpage>130</fpage>
          -
          <lpage>142</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>I. H.</given-names>
            <surname>Sarker</surname>
          </string-name>
          , et al.,
          <source>Cybersecurity Data Science: An Overview from Machine Learning Perspective. Journal of Big Data</source>
          <volume>7</volume>
          (
          <issue>1</issue>
          ) (
          <year>2020</year>
          )
          <fpage>1</fpage>
          -
          <lpage>29</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>B.</given-names>
            <surname>Akhmetov</surname>
          </string-name>
          , et al.,
          <article-title>Development of Sectoral Intellectualized Expert Systems and decision Making Support Systems in Cybersecurity</article-title>
          ,
          <source>in: Proceedings of the Computational Methods in Systems and Software</source>
          (
          <year>2018</year>
          )
          <fpage>162</fpage>
          -
          <lpage>171</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>H.</given-names>
            <surname>Naseer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. B.</given-names>
            <surname>Maynard</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K. C.</given-names>
            <surname>Desouza</surname>
          </string-name>
          ,
          <source>Demystifying Analytical Information Processing Capability: The Case of Cybersecurity Incident Response, Decision Support Systems</source>
          <volume>143</volume>
          (
          <year>2021</year>
          )
          <fpage>113476</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>A.</given-names>
            <surname>Couce-Vieira</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. R.</given-names>
            <surname>Insua</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kosgodagan</surname>
          </string-name>
          , Assessing and Forecasting Cybersecurity Impacts,
          <source>Decision Analysis</source>
          <volume>17</volume>
          (
          <issue>4</issue>
          ) (
          <year>2020</year>
          )
          <fpage>356</fpage>
          -
          <lpage>374</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>N. N.</given-names>
            <surname>Akimov</surname>
          </string-name>
          , et al.,
          <article-title>Mathematical Model of the Decision Support System for Ensuring Cybersecurity of the IED of the APCS of NPP</article-title>
          .
          <source>In Information Systems and Technologies IST-2020</source>
          (
          <year>2020</year>
          )
          <fpage>36</fpage>
          -
          <lpage>40</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>N.</given-names>
            <surname>Tissir</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. El</given-names>
            <surname>Kafhali</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Aboutabit</surname>
          </string-name>
          , Cybersecurity Management in Cloud Computing:
          <article-title>Semantic Literature Review and Conceptual Framework Proposal</article-title>
          ,
          <source>Journal of Reliable Intelligent Environments</source>
          <volume>7</volume>
          (
          <issue>2</issue>
          ) (
          <year>2021</year>
          )
          <fpage>69</fpage>
          -
          <lpage>84</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>S. E.</given-names>
            <surname>Donaldson</surname>
          </string-name>
          , et al.,
          <article-title>Measuring a Cybersecurity Program</article-title>
          . In Enterprise Cybersecurity (
          <year>2015</year>
          )
          <fpage>213</fpage>
          -
          <lpage>229</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-1-
          <fpage>4302</fpage>
          -6083-7_
          <fpage>12</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>M.</given-names>
            <surname>Ekstedt</surname>
          </string-name>
          , et al.,
          <string-name>
            <surname>Securi</surname>
            <given-names>CAD</given-names>
          </string-name>
          <article-title>by Foreseeti: A CAD Tool for Enterprise Cyber Security Management</article-title>
          ,
          <source>in: IEEE 19th International Enterprise Distributed Object Computing Workshop</source>
          (
          <year>2015</year>
          )
          <fpage>152</fpage>
          -
          <lpage>155</lpage>
          . doi:
          <volume>10</volume>
          .1109/edocw.
          <year>2015</year>
          .40
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>N. M.</given-names>
            <surname>Radziwill</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. C.</given-names>
            <surname>Benton</surname>
          </string-name>
          ,
          <article-title>Cybersecurity cost of quality: Managing the costs of cybersecurity risk management (</article-title>
          <year>2017</year>
          ). arXiv:
          <volume>1707</volume>
          .
          <fpage>02653</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>S.</given-names>
            <surname>Al-Dhahri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Al-Sarti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Abdul</surname>
          </string-name>
          ,
          <article-title>Information security management system</article-title>
          ,
          <source>International Journal of Computer Applications</source>
          <volume>158</volume>
          (
          <issue>7</issue>
          ) (
          <year>2017</year>
          )
          <fpage>29</fpage>
          -
          <lpage>33</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>V. A.</given-names>
            <surname>Lakhno</surname>
          </string-name>
          ,
          <article-title>Development of a Support System for Managing the Cyber Security</article-title>
          , Radioelectronics, Informatics,
          <source>Management</source>
          <volume>2</volume>
          (
          <year>2017</year>
          )
          <fpage>109</fpage>
          -
          <lpage>116</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>Business</given-names>
            <surname>Advantage</surname>
          </string-name>
          .
          <source>The State of Industrial Cybersecurity</source>
          <year>2017</year>
          (
          <year>2017</year>
          ). URL: https://go.kaspersky.com/rs/802-IJN240/images/ICSWHITE PAPER.pdf
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <surname>Senseon</surname>
          </string-name>
          .
          <source>The State of Cyber Security-SME Report</source>
          <year>2019</year>
          . URL: https://www.cbronline.com/wpcontent/uploads/dlm_uploads/
          <year>2019</year>
          /08/ White_paper_ 1.pdf%0A
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>G.</given-names>
            <surname>Cassar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Gibson</surname>
          </string-name>
          , Forecast Rationality in Small Firms,
          <source>Journal of Small Business Management</source>
          <volume>45</volume>
          (
          <issue>3</issue>
          ) (
          <year>2007</year>
          )
          <fpage>283</fpage>
          -
          <lpage>302</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>S. E.</given-names>
            <surname>Chang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C. B.</given-names>
            <surname>Ho</surname>
          </string-name>
          ,
          <article-title>Organizational Factors to the Effectiveness of Implementing Information Security Management</article-title>
          ,
          <string-name>
            <given-names>Industrial</given-names>
            <surname>Management</surname>
          </string-name>
          &amp; Data
          <string-name>
            <surname>Systems</surname>
          </string-name>
          (
          <year>2006</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>D. N.</given-names>
            <surname>Burrell</surname>
          </string-name>
          ,
          <article-title>An Exploration of the Cybersecurity Workforce Shortage</article-title>
          ,
          <source>in: Cyber Warfare and Terrorism: Concepts</source>
          , Methodologies, Tools, and
          <string-name>
            <surname>Applications</surname>
          </string-name>
          (
          <year>2020</year>
          )
          <fpage>1072</fpage>
          -
          <lpage>1081</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>T.</given-names>
            <surname>Ohta</surname>
          </string-name>
          , et al.,
          <source>Cybersecurity Solutions for Major International Events. Fujitsu Scientific &amp; Technical Journal</source>
          ,
          <volume>54</volume>
          (
          <issue>4</issue>
          ) (
          <year>2018</year>
          )
          <fpage>57</fpage>
          -
          <lpage>65</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>K.</given-names>
            <surname>Prislan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Mihelič</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Bernik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A RealWorld</given-names>
            <surname>Information</surname>
          </string-name>
          <article-title>Security Performance Assessment using a Multidimensional SocioTechnical Approach</article-title>
          ,
          <source>PloS one 15(9)</source>
          (
          <year>2020</year>
          )
          <article-title>e0238739</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>I.</given-names>
            <surname>Bernik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Prislan</surname>
          </string-name>
          ,
          <article-title>Measuring Information Security Performance with 10 by 10 Model for Holistic State Evaluation</article-title>
          ,
          <source>PloS one 11(9)</source>
          (
          <year>2016</year>
          )
          <article-title>e0163050</article-title>
          . doi:
          <volume>10</volume>
          .1371/journal. pone.0163050
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>B.</given-names>
            <surname>Akhmetov</surname>
          </string-name>
          , et al.,
          <article-title>Conceptual Diagram of an Intelligent Decision Support System in the Process of Investing in Cybersecurity Systems</article-title>
          ,
          <source>Journal of Theoretical and Applied Information Technology</source>
          <volume>99</volume>
          (
          <issue>18</issue>
          ) (
          <year>2021</year>
          )
          <fpage>4297</fpage>
          -
          <lpage>4310</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>V.</given-names>
            <surname>Lakhno</surname>
          </string-name>
          , et al.,
          <article-title>Model for Supporting Decisions of Investors, Taking into Consideration Multifactoriality and Turnover</article-title>
          ,
          <source>Communications in Computer and Information Science</source>
          <volume>1388</volume>
          (
          <year>2021</year>
          )
          <fpage>525</fpage>
          -
          <lpage>535</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -71503-8_
          <fpage>40</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>A.</given-names>
            <surname>Kalizhanova</surname>
          </string-name>
          , et al.,
          <article-title>Optimization Model of Adaptive Decision Taking Support System for Distributed Systems Cyber Security Facilities Placement</article-title>
          ,
          <source>International Journal of Electronics and Telecommunications</source>
          ,
          <volume>66</volume>
          (
          <issue>3</issue>
          ) (
          <year>2020</year>
          )
          <fpage>493</fpage>
          -
          <lpage>498</lpage>
          . doi:
          <volume>10</volume>
          .24425/ ijet.
          <year>2020</year>
          .134004
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>V.</given-names>
            <surname>Lakhno</surname>
          </string-name>
          , et al.,
          <source>Allocation of Organizational and Financial Resources of the Information Protection Side Using a Genetic Algorithm, Lecture Notes in Networks and Systems</source>
          <volume>228</volume>
          (
          <year>2021</year>
          )
          <fpage>41</fpage>
          -
          <lpage>53</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -77448-
          <issue>6</issue>
          _
          <fpage>5</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>V.</given-names>
            <surname>Lakhno</surname>
          </string-name>
          , et al.,
          <article-title>Models for Forming Knowledge Databases for Decision Support Systems for Recognizing Cyberattacks</article-title>
          .
          <article-title>Intelligent Computing and Optimization</article-title>
          .
          <source>ICO 2020. Advances in Intelligent Systems and Computing</source>
          <volume>1324</volume>
          (
          <year>2021</year>
          ). doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -68154-8_
          <fpage>42</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [34]
          <string-name>
            <given-names>V.</given-names>
            <surname>Lakhno</surname>
          </string-name>
          , et al.,
          <article-title>Selection of a Rational Composition of İnformation Protection Means Using a Genetic Algorithm, Intelligent Communication Technologies and Virtual Mobile Networks</article-title>
          .
          <source>Lecture Notes on Data Engineering and Communications Technologies</source>
          <volume>131</volume>
          (
          <year>2023</year>
          ). doi:
          <volume>10</volume>
          .1007/
          <fpage>978</fpage>
          - 981-
          <fpage>19</fpage>
          -1844-5_
          <fpage>2</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          [35]
          <string-name>
            <given-names>T. V.</given-names>
            <surname>Eaton</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. H.</given-names>
            <surname>Grenier</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Layman</surname>
          </string-name>
          , Accounting and Cybersecurity Risk Management,
          <source>Current Issues in Auditing</source>
          <volume>13</volume>
          (
          <issue>2</issue>
          ) (
          <year>2019</year>
          )
          <fpage>C1</fpage>
          -
          <lpage>C9</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          [36]
          <string-name>
            <given-names>A.</given-names>
            <surname>Al-Moshaigeh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Dickins</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. L.</given-names>
            <surname>Higgs</surname>
          </string-name>
          , Cybersecurity Risks and
          <article-title>Controls: Is the AICPA's SOC for Cybersecurity a Solution?</article-title>
          <source>The CPA Journal</source>
          <volume>89</volume>
          (
          <issue>6</issue>
          ) (
          <year>2019</year>
          )
          <fpage>36</fpage>
          -
          <lpage>41</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          [37]
          <string-name>
            <given-names>M. A.</given-names>
            <surname>Mamoshina</surname>
          </string-name>
          ,
          <string-name>
            <surname>A. I. Demidenko</surname>
          </string-name>
          ,
          <article-title>Organizational Support of the IT Infrastructure Management Process in the Information Security System at the Enterprise</article-title>
          .
          <source>In Actual Problems of Social and Humanitarian Research in Economics and Management</source>
          (
          <year>2018</year>
          )
          <fpage>367</fpage>
          -
          <lpage>373</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          [38]
          <string-name>
            <given-names>B.</given-names>
            <surname>Alhayani</surname>
          </string-name>
          , et al.,
          <source>Best Ways Computation Intelligent of Face Cyber Attacks. Materials Today</source>
          (
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>