[{“box”:0,”content”:”n[if 992 equals=”Open Access”]n
n
Open Access
nn
n
n[/if 992]n[if 2704 equals=”Yes”]n
nThis is an unedited manuscript accepted for publication and provided as an Article in Press for early access at the author’s request. The article will undergo copyediting, typesetting, and galley proof review before final publication. Please be aware that errors may be identified during production that could affect the content. All legal disclaimers of the journal apply.n
n[/if 2704]n
n
n
nn
n
Aatraiyee Dixit, Aparna Madaria, Manisha, Rishabh,
n t
n
n[/foreach]
n
n[if 2099 not_equal=”Yes”]n
- [foreach 286] [if 1175 not_equal=””]n t
- Student (M Tech), Student (M Tech), Student (M Tech), Student (M Tech), Department of Computer Science and Engineering, Lakshmi Narain College of Technology, Bhopal, Department of Computer Science and Engineering, Lakshmi Narain College of Technology, Bhopal, Department of Computer Science and Engineering, Lakshmi Narain College of Technology, Bhopal, Department of Computer Science and Engineering, Lakshmi Narain College of Technology, Bhopal, Madhya Pradesh, Madhya Pradesh, Madhya Pradesh, Madhya Pradesh, India, India, India, India
n[/if 1175][/foreach]
n[/if 2099][if 2099 equals=”Yes”][/if 2099]n
Abstract
n
n
nThe field of information security offers a wide range of guidance in academic and practitioner literature. While various strategies such as deterrence, deception, detection, and reaction are explored, most research focuses on technological countermeasures to prevent security threats. This study presents the findings of a qualitative study conducted in Korea, examining how businesses utilize security techniques to safeguard their information systems. The results highlight a strong emphasis on preventive measures, driven by the need to ensure the availability of technology and services. However, there is limited awareness of broader enterprise security concerns. While other tactics were observed, they primarily supported the objective of prevention. The study proposes a research agenda for implementing diverse strategies throughout an enterprise, with a focus on integrating, balancing, and optimizing systems. The study explores various aspects of information security and investigates contexts where security strategies are frequently discussed, such as military sources. It identifies nine distinct security strategies. Through a qualitative focus group approach, security managers from eight organizations discussed their organizations’ security practices. The findings indicate a predominant reliance on prevention to maintain technology services, with other methods employed as operational support for this overarching strategy.nn
n
Keywords: Cyber security, cyber threats, web 3.0, implications, technology
n[if 424 equals=”Regular Issue”][This article belongs to Journal Of Network security ]
n
n
n
n
nAatraiyee Dixit, Aparna Madaria, Manisha, Rishabh. [if 2584 equals=”][226 wpautop=0 striphtml=1][else]Cybersecurity in a Digital World: Risks and Future Perspectives[/if 2584]. Journal Of Network security. 17/09/2025; 13(03):44-49.
n
nAatraiyee Dixit, Aparna Madaria, Manisha, Rishabh. [if 2584 equals=”][226 striphtml=1][else]Cybersecurity in a Digital World: Risks and Future Perspectives[/if 2584]. Journal Of Network security. 17/09/2025; 13(03):44-49. Available from: https://journals.stmjournals.com/jons/article=17/09/2025/view=0
nn
n
n[if 992 not_equal=”Open Access”]n
n
n[/if 992]n
nn
Browse Figures
n
n
n[/if 379]
n
n
n
References n
n[if 1104 equals=””]n
- Mosteanu NR. Artificial intelligence and cyber security–face to face with cyber attack–a Maltese case of risk management approach. Ecoforum. 2020 May 9; 9(2): 1–8.
- Soni VD. Challenges and Solution for Artificial Intelligence in Cybersecurity of the USA. Available at SSRN 3624487. 2020 Jun 10.
- Patil P. Artificial intelligence in cybersecurity. International Journal of Research in Computer Applications and Robotics (IJRCAR). 2016 May; 4(5): 1–5.
- Sagar BS, Niranjan S, Sachin DN. Providing cyber security using artificial intelligence–a survey. In 2019 IEEE 3rd international conference on computing methodologies and communication (ICCMC). 2019 Mar 27; 717–720.
- Sedjelmaci H, Guenab F, Senouci SM, Moustafa H, Liu J, Han S. Cyber security based on artificial intelligence for cyber-physical systems. IEEE Netw. 2020 Jun 2; 34(3): 6–7.
- Beckman SL, Rosenfield DB. Operations strategy: competing in the 21st century. McGraw-Hill/Irwin; 2008.
- Wiafe I, Koranteng FN, Obeng EN, Assyne N, Wiafe A, Gulliver SR. Artificial intelligence for cybersecurity: a systematic mapping of literature. IEEE Access. 2020 Jul 31; 8: 146598–612.
- Yampolskiy RV, Spellchecker MS. Artificial intelligence safety and cybersecurity: A timeline of AI failures. arXiv preprint arXiv:1610.07997. 2016 Oct 25.
- Morel B. Artificial intelligence and the future of cybersecurity. In Proceedings of the 4th ACM workshop on Security and artificial intelligence. 2011 Oct 21; 93–98.
- Wirkuttis N, Klein H. Artificial intelligence in cybersecurity. Cyber, Intelligence, and Security. 2017 Jan; 1(1): 103–19.
- Zarina IK, Ildar RB, Elina LS. Artificial Intelligence and Problems of Ensuring Cyber Security. Int J Cyber Criminol. 2019 Jul 1; 13(2): 564–577.
- Li JH. Cyber security meets artificial intelligence: a survey. Front Inf Technol Electron Eng. 2018 Dec; 19(12): 1462–74.
- Taddeo M, McCutcheon T, Floridi L. Trusting artificial intelligence in cybersecurity is a double-edged sword. Nat Mach Intell. 2019 Dec; 1(12): 557–60.
nn[/if 1104][if 1104 not_equal=””]n
- [foreach 1102]n t
- [if 1106 equals=””], [/if 1106][if 1106 not_equal=””],[/if 1106]
n[/foreach]
n[/if 1104]
n
nn[if 1114 equals=”Yes”]n
n[/if 1114]
n
n
n
| Volume | 13 | |
| [if 424 equals=”Regular Issue”]Issue[/if 424][if 424 equals=”Special Issue”]Special Issue[/if 424] [if 424 equals=”Conference”][/if 424] | 03 | |
| Received | 04/02/2025 | |
| Accepted | 02/07/2025 | |
| Published | 17/09/2025 | |
| Retracted | ||
| Publication Time | 225 Days |
n
n
nn
n
Login
PlumX Metrics
n
n
n[if 1746 equals=”Retracted”]n
[/if 1746]nnn
nnn”}]
