Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Open Access Guideline
Open Access Guideline
Postgraduate Thesis Guideline
Postgraduate Thesis Guideline
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
Cybersecurity and Country of Origin: Towards a New Framework for Assessing Digital Product Domesticity
Download
sustainability-15-00087 (1).pdf
Date
2023-01-01
Author
Özdemir, Serkan
Wynn, Martin
Metin, Bilgin
Metadata
Show full item record
This work is licensed under a
Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License
.
Item Usage Stats
123
views
33
downloads
Cite This
Recent events concerning the Kaspersky anti-virus software in the UK and the Android operating system in the US have highlighted the significance of the domesticity of digital products for national cybersecurity, and the importance of establishing the origin of digital products has been further brought into focus by the war in Ukraine and China's military activities around Taiwan. Digital products can contain hardware components, software elements, embedded systems, and data, and determining the country of origin (COO) in these circumstances is problematic. The aim of this research, and its main contribution, is to provide an operational framework for the application of the COO concept to address this problem. Using an inductive research methodology based on semi-structured interviews and an online survey, a 19-parameter framework for assessing the COO of digital products is developed and then applied to the case example of a mobile phone import in Turkey. This article concludes that new processes and policies are urgently required to enhance the cyber and information security for digital products, aid domestic digital technology production, and support the transition to recyclable technologies. Such developments are of significance not only for western nations concerned with data and security issues, but also for developing world countries trying to develop their own domestic digital product manufacturing capabilities. This is also of relevance to the computer end-user, who would benefit from greater clarity on the origin of digital products ahead of a purchase decision.
Subject Keywords
digital products
,
cybersecurity
,
country of origin
,
COO
,
COO parameters
,
domesticity
,
data security
,
circular economy
,
BRAND
,
IMPACT
URI
https://hdl.handle.net/11511/102621
Journal
SUSTAINABILITY
DOI
https://doi.org/10.3390/su15010087
Collections
Graduate School of Informatics, Article
Suggestions
OpenMETU
Core
Automatic detection of cyber security events from Turkish twitter stream and Turkish newspaper data
Ural, Özgür; Acartürk, Cengiz; Department of Cyber Security (2019)
Cybersecurity experts scan the internet and face security events that influence users, institutions, and governments. An information security analyst regularly examines sources to stay up to date on security events in her/his domain of expertise. This may lead to a heavy workload for the information analysts if they do not have proper tools for security event investigation. For example, an information analyst may want to stay aware of cybersecurity events, such as a DDoS (Distributed Denial of Service) atta...
Anomaly-Based Intrusion Detection by Machine Learning: A Case Study on Probing Attacks to an Institutional Network
Tufan, Emrah; Tezcan, Cihangir; Acartürk, Cengiz (2021-01-01)
Cyber attacks constitute a significant threat to organizations with implications ranging from economic, reputational, and legal consequences. As cybercriminals' techniques get sophisticated, information security professionals face a more significant challenge to protecting information systems. In today's interconnected realm of computer systems, each attack vector has a network dimension. The present study investigates network intrusion attempts with anomaly-based machine learning models to provide better p...
A Digital Twins Approach to Smart Grid Security Testing and Standardization
Atalay, Manolya; Angın, Pelin (2020-06-01)
The exponential growth of the Internet of Things in recent years has created an ever larger cyber attack surface, introducing new security vulnerabilities for all computerized systems. Among the most significant of those systems are industrial control systems (ICS) consisting of many cyber physical components, and smart grids are a prominent example of ICS, whose failures have potential to cause major disruptions in all aspects of our daily lives. In this paper, we provide an overview of smart grid cybersec...
Comparative analysis of domestic security issues of Kazakhstan and Uzbekistan in the Post-Soviet Era
Turgut, Arzu; Akçalı, Pınar; Department of European Studies (2013)
This thesis examines the main domestic security issues of Kazakhstan and Uzbekistan and the impact of their securitization processes on the domestic and regional security policies of these countries in the post-Soviet era. Two outstanding issues that have been securitized in these countries, separatism and ethnic conflict for Kazakhstan and radical Islam for Uzbekistan, are scrutinized in detail with a comparative analysis. This thesis argues that Kazakh and Uzbek leaders, Nursultan Nazarbayev and Islam Kar...
ICT adoption, software investment and firm efficiency in Turkey
Fındık, Derya; Tansel, Aysıt; Department of Science and Technology Policy Studies (2013)
This thesis examines the impact of firm resources on Information and Communication Technologies (ICT) adoption by the Turkish business enterprises and the impact of software investment on firm efficiency by using firm level data. ICT adoption is measured at three levels: The first level is technology ownership. The second level is the presence of enterprise resource planning (ERP) and customer resource management (CRM). The third level is the use of narrowband and broadband technologies. The impact of firm ...
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
S. Özdemir, M. Wynn, and B. Metin, “Cybersecurity and Country of Origin: Towards a New Framework for Assessing Digital Product Domesticity,”
SUSTAINABILITY
, vol. 15, no. 1, pp. 0–0, 2023, Accessed: 00, 2023. [Online]. Available: https://hdl.handle.net/11511/102621.