Explanation of the Stratification Strategy of Various Threats in security and Cyber Defense of Knowledge-Based Organizations in the Country

Document Type : Original Article

Authors

1 PhD student, Information Technology Management, Islamic Azad University, South Tehran Branch, Tehran, Iran

2 Assistant Professor, Information Technology Management Department, Faculty of Management, Islamic Azad University, South Tehran Branch, Tehran, Iran

3 Assistant Professor, Institute of Communication and Information Technology, Tehran, Iran

Abstract

In recent years, the rapid development of knowledge-based companies and the need to pay attention to all kinds of threats in these organizations are considered as the most important challenges in their development. The continued life of these organizations depends on the principle of leveling various types of threats in organizations. The main goal of the research is the leveling of various threats in cyber security and defense of knowledge-based organizations. The research method was descriptive-survey based on the applied purpose, descriptive-survey based on the data collection method, and quantitative based on the type of data. The statistical population of this research is the experts and professors of information technology and…, Islamic Azad University, Tehran South branch (200 people), the samples were selected using random sampling, data analysis and research hypotheses were done with SPSS(23) software. In the inferential statistics section, Kolmogorov-Smirnov tests were used to check the normality of the data, and Spearman's correlation coefficient was used to evaluate the impact and significance of the relationships between variables. All the data are normal, and there is a significant relationship between the research factors and components. The results of data analysis showed that of the four existing hypotheses, the first, second, and third hypotheses were confirmed and the fourth hypothesis was not confirmed. Then the research components were ranked, other results showed that the research variables do not have the same priority, there is a significant difference between them. In terms of leveling, there is a significant difference between the variables. It was found that the research variables have different levels in different research levels.

Keywords

Main Subjects


Smiley face

 

 [1]. Ismailpour M., Bahrainizad, M., Qaidi, H.A. "Investigation of the impact of organizational approach dimensions on the success of new products with the variables of customer knowledge management and market knowledge" (a study on knowledge-based companies in the Persian Gulf Science and Technology Park). Bushehr. New Marketing Research, 2015 , 6(3), 87-108. (In Persian). doi: 10.22108/nmrj.2016.21074
[2]. Researcher . R & D, United Nations performance research and research group”, United Nations affiliated offices, annual performance report of various United Nations working groups. United Nations International Publications, 2023
[3]. Khalafkhani M, “ information and communication opportunities for democratization in cyber (virtual) space”. Guided by Abdul Ali Qavam; Consulting Ahmed Sae, Mohammad Amjad. Ph.D. (Islamic Azad University, Department of Sciences and Research, Faculty of Law and Political Sciences, Department of Political Sciences). 2015, (In Persian).
[4]. Reports of the China Cyber Security Institute, “ China National Cyber Security Coordination Office Center in 2024” (Reports of the China Cyber Security and Defense Organization, 2023).
[5]. Reports of cyber attacks on security and intelligence centers in India”. India Government Reports, Office of the National Cyber Security Coordinator, India, 2024.
[6]. International Telecommunication Union "ITU, belonging to the United Nations”. 2024. https://www.itu.int/en/Pages/default.aspx
[7]. Cyber Security Systems Reports, “United Nations Office of Technology Research in 2023 Various reports on cyber attacks on security and intelligence centers in the world”. United Nations International Publications, 2024
[8]. Price Water. HouseCoopers, “PricewaterhouseCoopers PWC Cybercrime Report”, 2024
https://www.pwc.com/gx/en/research-insights.html
[9]. Edyta Karolina Szczepaniuk, Hubert Szczepaniuk, Tomasz Rokicki, Bogdan Klepacki. “Information security assessment in public administration”, Computers & SecurityMarch. 2020
  [10]. Amazon Cyber Security, ” Amazon Cyber Security Center Report”, 2024, https://aws.amazon.com/security
[11]. Javaheri, H. R. Shaghaghi, A. Abbasi. M, “investigation of new threats of cyberspace based on fileless malware. Information Sciences and Technologies, 2022, 1(1), 81-108. (In Persian).
[12]. Agronomist V.R, “Security pathology of mobile phone use among middle school male students of Sepidan city”. Guided by Ahmed Yazdi Yazdanabadi; Consulting Saeed Zarghami. Master's degree (Islamic Azad University, Science and Research Unit, Educational Management). 2017, (In Persian).
[13]. Nasirirad. G. “Comparison of the amount and manner in which users use Facebook social networks with Viber and WhatsApp mobile phone programs (case study: university students of Research Sciences Unit and students of Stockholm KTH University) ”. Guided by Shahnaz Hashemi; Advising Afshana Mozafari.- Master's degree (Islamic Azad University, Department of Sciences and Research, Department of Social Communication Sciences). 2016, (In Persian).
[14]. Ali Kavak, Hüseyin Odabaş, “The impact of information security management guide utilization on technological and institutional information security measures in university libraries in Türkiye”, The Journal of Academic Librarianship 16 October 2023, (In Persian).
[15]. Pooribrahimi, A. “Information Security Architecture”, Islamic Azad University, Electronic Department, Islamic Azad University Publications, 2013, (In Persian).
[16]. Stephan Kuehnel, Sebastian Hengstler, Simon Trang, “Should I really do that? Using quantile regression to examine the impact of sanctions on information security policy”, compliance behavior, Computers & Security29 June 2023, (In Persian).
[17]. Pourabrahimi, A. Safar Nejad. D., Kashif, H.R, “Islamic Republic of Iran's cyber defense strategies against psychological warfare threats”, National Security, 6(22), 119-146. 2016. , (In Persian).
[18]. The first square. P, “Estimating information security risks using intelligent methods”, Supervisor: Mohammad Ali Dostari. Ali Yazdian Master's Thesis of Information Technology, Shahid University. Faculty of Technology and Engineering, 2016, , (In Persian).
[19]. “Transformation document of the cyber defense base, Defense Organization of the Islamic Republic of Iran”, 2022, (In Persian).
[20]. Behbodi, M. R. “Evaluation of Information Security Management (ISMS) in Hormozgan University and presenting strategies for its improvement”, Master's Thesis, Hormozgan University, Faculty of Literature and Humanities, 2019, (In Persian).
[21]. Lutfi H.A. “Recognizing the threats and social harms of Tehran and the future perspective with emphasis on Shahran neighborhood” (district one of Panj region municipality). Student; cold Alireza, MA (Islamic Azad University, Science and Research Unit, Faculty of Humanities and Social Sciences, Social Sciences Research Department). 2015, (In Persian).
[22]. Al-Barzi, M. “Investigating security threats in cloud computing and providing a secure method for data storage”, Islamic Azad university. Science and Research Unit, Faculty of Management and Economics, Department of Information Technology Management. 2020, (In Persian).
[23]. Esmaili, A; Taghipour, R.; “Designing a conceptual model of the cyber defense model of the Islamic Republic of Iran”, Magazine: National Security Winter, Year 8 - Scientific-Research Number 30/ISC ‎22 pages - from 181 to 202, 2018, (In Persian).
[24]. Mousavi. A. R. Sepehri. M., “Strategies to improve the capabilities of electronic and cyber warfare (cyberelectronics) of the armed forces against asymmetric threats”, Strategic Defense Studies Quarterly, Fall 2020, No. 81, (In Persian).
[25]. Mirzaei, A., “Strategies for improving information security management using interpretive structural modeling method (Case of Study: Organizational Cultural and Artistic Organization of Tehran) ”, Guided by Ahmad Reza Ghasemi; Simple kindness advice. Master's degree (Islamic Azad University, Science and Research Unit, Faculty of Management and Economics, Department of Information Resource Management). 2022. , (In Persian).
[26]. Alizadeh Soodmand, A.R., Fathi Hafeshjani, K., Shah Mansouri, A., Arab Sorkhi, A. “Structured analysis of safety indicators in cyber security and defense of knowledge-based organizations in IRAN”. Passive Defense, scientific-research journal Passive Defense, 15th year, number 1, spring 2024, (57 series): pp. 1-11, print shop: 2008-6949 | Electronic mail: 2980-8030, (In Persian).
[27]. Mickey Krause, K., Harold F. tipton T, “Management of information protection and security”, translated by Mohammad Hossein Abedi. - Tehran: Eizairan Institute, 2018.
[28]. Song, X, Shi, W, Tan, G, Maa. Y , “Multi-Level Tolerance Opinion Dynamics in Military Command and Control Networks”, Physica A: Statistical Mechanics and its applications, 2015, Vol.43, No . 3.
[29] Elena Vlahu, Khin Than Win, Gjorgievska. “ Information Security Governance Challenges and Critical Success Factors: Systematic Review”. Computers & Security In press, journal pre-proofAvailable online 2021 September.
[30]. Mari Karjalainen, Mikko Siponen, Suprateek Sarker, “Toward a stage theory of the development of employees' information security behavior”, Computers & Security. 2020 June.
[31]. Damjan Fujs, Simon Vrhovec, Damjan Vavpotič, “Balancing software and training requirements for information security”, Computers & Security2 September 2023
[32]. Sajadi, and; Azar, D; “Improving the ability of the Islamic Republic of Iran's army to deal with the US army's cyber operations”, Magazine: Military Sciences and Techniques Spring. ISC scientific-research number 51. 22 pages - from 5 to 26, 2020, (In Persian).
[33]. Lloyd's Register Research Foundation, “Lloyd's Register Foundation Research Center Report”, 2023. https://www.lrfoundation.org.uk/en/about-us/
[34]. Ranjbar, M. H, Mardani Shahrbabak. M, Piraysh. A. “presenting a model for evaluating the physical protection of critical facilities for passive defense against physical and sabotage threats”, Modern Defense Sciences and Technologies, 8(4), 387-398. 2017, (In Persian).
[35]. Hafez Nia M. R. “An introduction to the research method in humanities”, organization for the study and compilation of humanities books of universities (Samt), 2016, (In Persian).
[36]. Khaki. R, “Research method in management”, Tehran: Fuzhan, 2019, (In Persian).
Volume 13, Issue 1 - Serial Number 49
Spring
April 2025
Pages 95-116
  • Receive Date: 30 October 2024
  • Revise Date: 24 December 2024
  • Accept Date: 03 March 2025
  • Publish Date: 21 April 2025