1,443
Views
2
CrossRef citations to date
0
Altmetric
Research Article

Development of Large-Scale Farming Based on Explainable Machine Learning for a Sustainable Rural Economy: The Case of Cyber Risk Analysis to Prevent Costly Data Breaches

Article: 2223862 | Received 07 May 2023, Accepted 30 May 2023, Published online: 15 Jun 2023

References

  • Ahmadlou, M., and H. Adeli. 2010. Enhanced probabilistic neural network with local decision circles: A robust classifier. Integrated Computer-Aided Engineering 17 (3):197–2165. doi:10.3233/ICA-2010-0345.
  • Akinwumi, D. A., G. B. Iwasokun, B. K. Alese, and S. A. Oluwadare. 2017. A review of game theory approach to cyber security risk management. Nigerian Journal of Technology 36 (4):1271–85. doi:10.4314/njt.v36i4.38.
  • AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET, OnToContent, ORM, PerSys, OTM Academy Doctoral Consortium, RDDS, SWWS, and SeBGIS. 2006. Montpellier, France October 29-November 3, 2006. Proceedings, Part II.
  • Basallo, Y. A., V. Estrada Senti, and N. Martinez Sanchez. 2018. Artificial intelligence techniques for information security risk assessment. IEEE Latin America Transactions 16 (3):897–901. doi:10.1109/TLA.2018.8358671.
  • Bates, A., and W. Ul Hassan. 2019. Can data provenance put an end to the data breach? IEEE Security & Privacy 17 (4):88–93. doi:10.1109/MSEC.2019.2913693.
  • Bhoyar, D. G., and U. Yadav. 2017. Review of jamming attack using game theory. Paper read at 2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), Coimbatore, India.
  • Chen, T.-S., and W. Bo-Han 2018. Gateway selection based on game theory in internet of things. Paper read at 2018 International Conference on Electronics Technology (ICET), Chengdu, China.
  • Chua, H. N., J. Sheng Teh, and A. Herbland. 2021. Identifying the effect of data breach publicity on information security awareness using hierarchical regression. IEEE Access 9 (9):121759–70. doi:10.1109/ACCESS.2021.3107426.
  • Do, C. T., H. Nguyen, C. H. Tran, A. K. Charles, K. A. Kwiat, E. Blasch, S. Ren, N. Pissinou, and S. Sitharama Iyengar. 2017. Game theory for cyber security and privacy. ACM Computing Surveys 50 (2):1–37. doi:10.1145/3057268.
  • Feng, S., W. Wang, Z. Xiong, D. Niyato, P. Wang, and S. Shuxun Wang. 2018. On cyber risk management of blockchain networks: A game theoretic approach. IEEE Transactions on Services Computing 14 (5):1492–504. doi:10.1109/TSC.2018.2876846.
  • Hassanzadeh, Z., R. Biddle, and S. Marsen. 2021. User perception of data breaches. IEEE Transactions on Professional Communication 64 (4):374–89. doi:10.1109/TPC.2021.3110545.
  • Hou, D., T. Driessen, and H. Sun. 2015. The Shapley value and the nucleolus of service cost savings games as an application of 1-convexity. IMA Journal of Applied Mathematics 80 (6):1799–807. doi:10.1093/imamat/hxv017.
  • Joseph, R. C. 2017. Data breaches: Public sector perspectives. IT Professional 20 (4):57–64. doi:10.1109/MITP.2017.265105441.
  • Lagazio, M., N. Sherif, and M. Cushman. 2014. A multi-level approach to understanding the impact of cyber crime on the financial sector. Computers & Security 45 (45):58–74. doi:10.1016/j.cose.2014.05.006.
  • Laube, S., and R. Böhme. 2017. Strategic aspects of cyber risk information sharing. ACM Computing Surveys 50 (5):1–36. doi:10.1145/3124398.
  • Liang, X., Q. Taiyue, Z. Jin, S. Qin, P. Chen, and Y. Liu. 2020. Risk assessment system based on fuzzy composite evaluation and a backpropagation neural network for a shield tunnel crossing under a river. Advances in Civil Engineering 2020 (2020):1–14. doi:10.1155/2020/8840200.
  • McCord, M., P. Davis, J. McCord, M. Haran, and K. Davison. 2020. An exploratory investigation into the relationship between energy performance certificates and sales price: A polytomous universal model approach. Journal of Financial Management of Property and Construction 25 (2):247–71. doi:10.1108/JFMPC-08-2019-0068.
  • Mednikov, M. D., N. A. Sokolitsyna, A. S. Sokolitsyn, and V. P. Semenov. 2017. Game theory model of forming enterprise development strategy in market environment uncertainty. Paper read at 2017 XX IEEE International Conference on Soft Computing and Measurements (SCM), St. Petersburg, Russia.
  • Miao, Y., C. Chen, L. Pan, Q.-L. Han, J. Zhang, and Y. Xiang. 2021. Machine learning–based cyber attacks targeting on controlled information: A survey. ACM Computing Surveys 54 (7):1–36. doi:10.1145/3465171.
  • Musman, S., and A. Turner. 2018. A game theoretic approach to cyber security risk management. The Journal of Defense Modeling and Simulation 15 (2):127–46. doi:10.1177/1548512917699724.
  • Myklebust, J. O., and F. Ove Båtevik. 2022. Special needs provision and economic independence among young adults with disabilities: A longitudinal study. European Journal of Special Needs Education 37 (5):715–28. doi:10.1080/08856257.2021.1974552.
  • Panou, A., C. Ntantogian, and C. Xenakis. 2017. RiSKi: A framework for modeling cyber threats to estimate risk for data breach insurance. Paper read at Proceedings of the 21st Pan-Hellenic Conference on Informatics, Larissa Greece.
  • Piprani, B. 2006. Using orm-based models as a foundation for a data quality firewall in an advanced generation data warehouse. Paper read at On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops: OTM Confederated International Workshops and Posters
  • Refsdal, A., B. Solhaug and K. Stølen. 2015. Cybersecurity. Cyber-Risk Management 4: 29–32.
  • Schmitz, C., and S. Pape. 2020. LiSRA: Lightweight security risk assessment for decision support in information security. Computers & Security 90 (90):101656. doi:10.1016/j.cose.2019.101656.
  • Sullivan, C. 2019. EU GDPR or APEC CBPR? A comparative analysis of the approach of the EU and APEC to cross border data transfers and protection of personal data in the IoT era. Computer Law & Security Review 35 (4):380–97. doi:10.1016/j.clsr.2019.05.004.
  • Telang, R. 2015. Policy framework for data breaches. IEEE Security & Privacy 13 (1):77–79. doi:10.1109/MSP.2015.12.
  • Teymourlouei, H., and V. E. Harris. 2018. Organization risk management on network vulnerability and potential data breach. Paper read at 2018 International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, NV, USA.
  • Torra, V., and V. Torra. 2017. Privacy models and disclosure risk measures. Data Privacy: Foundations, New Developments and the Big Data Challenge 28: 111–89.
  • Varshney, S., D. Munjal, O. Bhattacharya, S. Saboo, and N. Aggarwal. 2020. Big data privacy breach prevention strategies. Paper read at 2020 IEEE International Symposium on Sustainable Energy, Signal Processing and Cyber Security (iSSSC), Gunupur Odisha, India.
  • Xenya, M. C., and K. Quist-Aphetsi. 2019. Decentralized distributed blockchain ledger for financial transaction backup data. Paper read at 2019 International Conference on Cyber Security and Internet of Things (ICSIoT), Accra, Ghana.
  • Xinhe, X., Y. Wang, J. Liu, and X. Zhang. 2008. Analysis on the achievement milestones and limitations of Game Theory. Paper read at 2008 Chinese Control and Decision Conference, Yantai, China.
  • Yun-Jie, J., C. Wen-Qi, and H. Ling. 2018. Risk identification and simulation based on the bayesian inference. Paper read at 2018 4th Annual International Conference on Network and Information Systems for Computers (ICNISC), Wuhan, China.
  • Zhiru, L., X. Wei, H. Shi, Y. Zhang, Y. Yan, and D. Gong. 2021. Security and privacy risk assessment of energy big data in cloud environment. Computational Intelligence and Neuroscience 2021 (2021):1–11. doi:10.1155/2021/2398460.
  • Zou, Y., S. Danino, K. Sun, and F. Schaub. 2019. YouMight’Be affected: An empirical analysis of readability and usability issues in data breach notifications. Paper read at Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, Glasgow Scotland Uk.