Cybersecurity and Country of Origin: Towards a New Framework for Assessing Digital Product Domesticity

2023-01-01
Özdemir, Serkan
Wynn, Martin
Metin, Bilgin
Recent events concerning the Kaspersky anti-virus software in the UK and the Android operating system in the US have highlighted the significance of the domesticity of digital products for national cybersecurity, and the importance of establishing the origin of digital products has been further brought into focus by the war in Ukraine and China's military activities around Taiwan. Digital products can contain hardware components, software elements, embedded systems, and data, and determining the country of origin (COO) in these circumstances is problematic. The aim of this research, and its main contribution, is to provide an operational framework for the application of the COO concept to address this problem. Using an inductive research methodology based on semi-structured interviews and an online survey, a 19-parameter framework for assessing the COO of digital products is developed and then applied to the case example of a mobile phone import in Turkey. This article concludes that new processes and policies are urgently required to enhance the cyber and information security for digital products, aid domestic digital technology production, and support the transition to recyclable technologies. Such developments are of significance not only for western nations concerned with data and security issues, but also for developing world countries trying to develop their own domestic digital product manufacturing capabilities. This is also of relevance to the computer end-user, who would benefit from greater clarity on the origin of digital products ahead of a purchase decision.
SUSTAINABILITY

Suggestions

Automatic detection of cyber security events from Turkish twitter stream and Turkish newspaper data
Ural, Özgür; Acartürk, Cengiz; Department of Cyber Security (2019)
Cybersecurity experts scan the internet and face security events that influence users, institutions, and governments. An information security analyst regularly examines sources to stay up to date on security events in her/his domain of expertise. This may lead to a heavy workload for the information analysts if they do not have proper tools for security event investigation. For example, an information analyst may want to stay aware of cybersecurity events, such as a DDoS (Distributed Denial of Service) atta...
Anomaly-Based Intrusion Detection by Machine Learning: A Case Study on Probing Attacks to an Institutional Network
Tufan, Emrah; Tezcan, Cihangir; Acartürk, Cengiz (2021-01-01)
Cyber attacks constitute a significant threat to organizations with implications ranging from economic, reputational, and legal consequences. As cybercriminals' techniques get sophisticated, information security professionals face a more significant challenge to protecting information systems. In today's interconnected realm of computer systems, each attack vector has a network dimension. The present study investigates network intrusion attempts with anomaly-based machine learning models to provide better p...
A Digital Twins Approach to Smart Grid Security Testing and Standardization
Atalay, Manolya; Angın, Pelin (2020-06-01)
The exponential growth of the Internet of Things in recent years has created an ever larger cyber attack surface, introducing new security vulnerabilities for all computerized systems. Among the most significant of those systems are industrial control systems (ICS) consisting of many cyber physical components, and smart grids are a prominent example of ICS, whose failures have potential to cause major disruptions in all aspects of our daily lives. In this paper, we provide an overview of smart grid cybersec...
Comparative analysis of domestic security issues of Kazakhstan and Uzbekistan in the Post-Soviet Era
Turgut, Arzu; Akçalı, Pınar; Department of European Studies (2013)
This thesis examines the main domestic security issues of Kazakhstan and Uzbekistan and the impact of their securitization processes on the domestic and regional security policies of these countries in the post-Soviet era. Two outstanding issues that have been securitized in these countries, separatism and ethnic conflict for Kazakhstan and radical Islam for Uzbekistan, are scrutinized in detail with a comparative analysis. This thesis argues that Kazakh and Uzbek leaders, Nursultan Nazarbayev and Islam Kar...
ICT adoption, software investment and firm efficiency in Turkey
Fındık, Derya; Tansel, Aysıt; Department of Science and Technology Policy Studies (2013)
This thesis examines the impact of firm resources on Information and Communication Technologies (ICT) adoption by the Turkish business enterprises and the impact of software investment on firm efficiency by using firm level data. ICT adoption is measured at three levels: The first level is technology ownership. The second level is the presence of enterprise resource planning (ERP) and customer resource management (CRM). The third level is the use of narrowband and broadband technologies. The impact of firm ...
Citation Formats
S. Özdemir, M. Wynn, and B. Metin, “Cybersecurity and Country of Origin: Towards a New Framework for Assessing Digital Product Domesticity,” SUSTAINABILITY, vol. 15, no. 1, pp. 0–0, 2023, Accessed: 00, 2023. [Online]. Available: https://hdl.handle.net/11511/102621.