Browse > Article
http://dx.doi.org/10.14400/JDC.2019.17.10.093

Analysis of Strategic Priorities for Strengthening Cybersecurity Capability of Cambodia  

Heng, Mara (Ministry of Information, Communications and Technology)
Hwang, Gee-Hyun (Office of International Affairs/Graduate School of Information Science, Soongsil University)
Publication Information
Journal of Digital Convergence / v.17, no.10, 2019 , pp. 93-102 More about this Journal
Abstract
This paper aims to set the priorities for the cybersecurity strategy of Cambodian government. To this end, we built a AHP research model by adopting 4 factors from the ITU national interests model and selecting 7 strategies from best practices of 8 countries leading the cyber security. Using a questionnaire, 19 experts evaluated Cambodia's cybersecurity strategy priorities. The key policy factors were evaluated in the order of homeland defense, economic welfare, value promotion and favorable world order. Their strategic alternatives were identified in the order of legislation, capacity building, and cyber attack prevention for critical infrastructure. This study will contribute to setting the strategic priorities and feasible action plans to strengthen Cambodia's cybersecurity capabilities.
Keywords
AHP; Cyber Security; Capability; Strategic Priority; Cambodia;
Citations & Related Records
Times Cited By KSCI : 11  (Citation Analysis)
연도 인용수 순위
1 L. Saaty. (1990). The Analytic Hierarchy Process. Publications, Pittsburgh, PA.
2 H. T. Choi. (2018). Analysis of policy priorities for strengthening the capacity of local public officials. Journal of the Korea Convergence Society, 9(11), 345-351.   DOI
3 B. C. Kim. (2015). A Internet of Things(IoT) based exploration robot design for remote control and monitoring. Journal of digital convergence, 13(1), 185-190.   DOI
4 K. B. Kim & J. Y. Yun (2015). Comparison and Analysis on Mobile Payment in terms of Security : Survey. Journal of IT Convergence Society for SMB, 5(3), 15-20.
5 S. T. K. Myo & G. H. Hwang. (2017). Effect of Mobile Devices on the Use Intention and Use of Mobile Banking Service in Myanmar. Journal of Digital Convergence, 15(6), 71-82.   DOI
6 M. Heng. (2018). A study on developing the Roadmap for Strengthening Cybersecurity Focused on Cambodia. Master Thesis, Soongsil University, Seoul.
7 M. Dara & D. de. Carteret. (2016). Slew of websites hacked. The Phnompenh Post, January 12.
8 I. Pena-Lopez. (2015). Global Cybersecurity Index & Cyberwellness Profiles Report. WSIS Forum 2015 Geneva, 1-37.
9 UMUC.(n.d.). Cyber Security Primer. DOI : http://www.umuc.edu/cybersecurity/about/cybersecurity-basics.cfm#
10 L. M. Aliyeva & G. H. Hwang. (2019). The Model to Implement the Cyber Security Policy and Strategy for Azerbaijan Information System. Journal of Digital Convergence, 17(5), 23-31.   DOI
11 S. H. Kim & J. S. Han. (2014). Smart Cold-Chain Monitoring Automation System Architecture based on Internet of Things. Journal of digital convergence, 12(12), 351-356.   DOI
12 J. H. Cho &, H. J. Lee (2018). A Study on the Real-time Cyber Attack Intrusion Detection Method. Journal of the Korea Convergence Society, 9(7), 55-62.   DOI
13 S. H. Hong & J. A. Yu (2018). Ransomware attack analysis and countermeasures of defensive aspects. Journal of Convergence for Information Technology, 8(1), 139-145.   DOI
14 F. Wamala. (2011). The ITU National Cybersecurity Strategy Guide. ITU.
15 S. H. Lee & D. W. Lee. (2014). A Study on Internet of Things in IT Convergence Period. Journal of digital convergence. 12(7), 267-272.   DOI
16 Canada & Public Safety Canada. (2010). Canada's cyber security strategy: for a stronger and moreprosperous Canada. Ottawa, Ont.: Government of Canada.
17 H. J. Mun, Y. C. Hwang, & H. Y Kim. (2015). Countermeasure for Prevention and Detection against Attacks to SMB Information System - A Survey. Journal of IT Convergence Society for SMB, 5(2), 1-6.
18 OECD (2012). Non-governmental Perspectives on a New Generation of National Cybersecurity Strategies. OECD Digital Econmy Papers, 212.
19 S. Berman (2018). How to Structure Your Organization's Cybersecurity Management: Insights from Nutter's Seth Berman. Nutter,October 3,
20 ISACA. (2015). State of Cybersecurity : Implications for 2015. CyberSecurity Nexus, 22.
21 L. S Kim. (2015). Convergence of Information Technology and Corporate Strategy. Journal of the Korea Convergence Society, 6(6), 17-26.   DOI
22 L. S. Kim. (2015). Convergence of Information Technology and Corporate Strategy. Journal of the Korea Convergence Society, 6(6), 17-26.   DOI
23 Z. Yunos, R. S. A. Hamid & M. Ahmad. (2016). Development of a cyber security awareness strategy using focus group discussion. SAI Computing Conference (SAI), 1063-1067.
24 R. Filipek. (2007). Information security becomes a business priority. Internal Auditor, 64(1), 18.
25 C. H. Yoon & G. D. Choi. (2014). The Effects of National Culture on Ethical Decision-Making in the Internet Context : An Exploratory Analysis. Journal of digital convergence, 12(12), 23-36.   DOI