IDENTIFICATION OF CRITICAL FACTORS FOR IMPROVINF THE SECURITY OF TELECOMMUNICATION SYSTEMS
DOI:
https://doi.org/10.56177/11icmie2023.54Keywords:
telecommunication system, security, critical factors, risks, vulnerabilitiesAbstract
The objective of this study is to identify the vulnerabilities that can affect the security of telecommunication systems and to determine the critical factors for improving the security of telecommunication systems. The authors conducted a focus group as qualitative method used for this research with twelve specialists who have a technical position and a vast experience in the telecommunication industry to highlight the critical factors for improving the security of the telecommunication systems. Based on the given answers by the specialists, there were identified thirty-one factors that can be spitted in three categories: technological factors, human factors, and legal factors. For the research limitation, the factors were strictly identified based on the given answers by the selected participants to the focus group. As the practical implication, the authors highlighted first the factors that were defined as vulnerabilities for the security of telecommunication system and determined the critical factors that must be monitored on a regular basis by every company to maintain a safe telecommunication system. As the value of this paper, the authors selected twelve important specialists who have a vast experience in this area and using their answers, it was designed a model of the critical factors that will help every company to improve their security capabilities.
References
. Turban, E.; McLean, E.; Wetherbe J.: Information Technology for Management: Transforming Organizations in the Digital Economy, Publisher Wiley, ISBN-13 978-0471229674, (2004)
. Elham, A. et al: Key Factors Influence on Decision Making to IoT Adoption in Telecommunication Companies: A Review, International Journal of Engineering & Technology, Website: www.sciencepubco.com/index.php/IJET, (2022)
. Chellappan, V.; Sivalingam K.M: Security and privacy in the Internet of Things. In Internet of Things (pp. 183-200). Morgan Kaufmann. https://doi.org/10.1016/B978-0-12-805395- 9.00010-1, (2016)
. Ziegeldorf, J. H; Morchon, O. G; Wehrle, K: Privacy in the Internet of Things: threats and challenges. Security and Communication Networks, 7(12), 2728-2742. https://doi.org/10.1002/sec.795, (2014)
. Syarulnaziah, A. et al: Security and Privacy Challenges of Big Data Adoption: A Qualitative Study in Telecommunication Industry, International Journal of Interactive Mobile Technologies (iJIM) – eISSN: 1865-7923., (2023)
. Benqdara, S; Alshiekhy, I.: Information Security Policy Implementation Assessment in Libyan Telecommunications Companies, International Journal of Computer Applications (0975 – 8887) Volume 185 – No. 2, April 2023
. Safa, N.; Ghani, N.; Ismail, M.: An artificial neural network classification approach for improving the accuracy of customer identification in e-commerce; Malays J Computer Sci, vol 27(3), 171–85, (2014)
. Al-Mayahi, I.; Mansoor S.P.: Information Security Culture Assessment: Case Study, Third International Conference on Information Science and Technology, Yangzhou, Jiangsu, China, 23-25, (2013)
. Klein, R. H.; Luciano, E. M.: What Influences Information Security Behavior? A Study with Brazilian Users. JISTEM-Journal of Information Systems and Technology Management, vol13 (3), 479-496, (2016)
. Anaam, E.; Abu Bakar, K.; Mohd Satar, N: A Model of Electronic Customer Relationship Management System Adoption In Telecommunication Companies, Amazonia Investiga, Vol. 9, No. 35, 61-73, https://doi.org/10.34069/AI/2020.35.11.5 , (2020)
Anaam, E.; Abu Bakar, K.; Mohd Satar, N : A theoretical review of conceptual model for E-CRM success in tele- communication companies. https://doi.org/10.14419/ijet.v7i4.17674, (2018)
. Anaam, E et al: Critical success factors for electronic customer relationship management success adoption: Telecommunication companies case study, International Journal of Advanced and Applied Sciences, http://science-gate.com/IJAAS/Articles/2021/2021-8- 10/1021833ijaas202110013, (2018)
. Question Pro Communities, Available from https://www.questionpro.com/blog/focus-group/ Accessed: 2023-05-10
. Microsoft Security, Available from https://www.microsoft.com/en-us/security/business/security-101/what-is-access-control#:~:text=Access%20control%20selectively%20regulates%20who,access%20control%3A%20physical%20and%20logical. Accessed: 2023-05-10
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 International Conference of Management and Industrial Engineering
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.