Lecture notes in business information processing, Год журнала: 2025, Номер unknown, С. 162 - 171
Опубликована: Янв. 1, 2025
Язык: Английский
Lecture notes in business information processing, Год журнала: 2025, Номер unknown, С. 162 - 171
Опубликована: Янв. 1, 2025
Язык: Английский
Journal of Systems and Information Technology, Год журнала: 2025, Номер unknown
Опубликована: Апрель 26, 2025
Purpose This study investigates the challenges of adopting Zero Trust (ZT) as a security strategy in contemporary organizations, where traditional measures are insufficient. paper aims to provide robust and objective framework for managing ZT implementation through an integrated approach. Design/methodology/approach An expert panel 29 professionals contributed identifying weighting key management criteria adoption. used fuzzy Delphi achieve consensus CRITIC (Criteria Importance Intercriteria Correlation) method ensure objectivity determining importance. Findings The results reveal four critical dimensions – culture, operations processes, compliance, investments along with 33 specific essential successful implementation. highlights potential reversal rank under dynamic decision-making conditions, emphasizing necessity continuous refinement adaptation. Practical implications insights derived from this research offer valuable guidance leaders, consultants navigating complexities By addressing managerial providing structured approach, contributes smoother transition cybersecurity models frameworks. Originality/value offers novel contribution by applying innovative, management-centered methodology systematically identify prioritize involved. It provides that enables managers areas cultural, financial, operational compliance ZT.
Язык: Английский
Процитировано
0Lecture notes in business information processing, Год журнала: 2025, Номер unknown, С. 162 - 171
Опубликована: Янв. 1, 2025
Язык: Английский
Процитировано
0