Providing a strategic pattern for the secure use of industrial control systems in the critical infrastructure of the country
Today, cyber threats to industrial control systems, which are increasingly used in critical infrastructures, are more complex than can be easily dealt with. The security of these systems has become one of the most urgent concerns of all industrial players, including governments.Based on this, presenting a strategic model for the secure use of industrial control systems in critical infrastructures, which is the goal of this research, is essential.In this research, by referring to the directional elements of the cyber field, the country's upstream documents, documents and strategic measures of other countries, examining domestic and international models and plans and with expert analysis, designed a conceptual model and extracted researched the dimensions, components and indicators and then designed a researcher-made questionnaire based on interviews with experts and documents to answer the research questions.The results of this research show that the strategic pattern of secure use has 3 dimensions, 12 components and 67 sub-components, which are the most important components in the process dimension, in order of priority, structures and systems, policy , rules and regulations, use and administration. The technology dimension is security organization, preventive measures, incident analysis and management, diagnostic measures and recovery measures, and the human resources dimension is capacity building and human resource management
-
Providing a data governance model for social networks
Sasan Chamani *, Mohsen Aghayi, Sales, Mohammad Mardani
Journal of Exalted Governance, -
Redefining Data-Driven Business; as a requirement for Data-Driven Economy's Policy Making
Mostafa Amini, Nadjla Hariri *, Sales, Fahimeh Babalhavaeji, Mahdi Taheri
Journal of Studies in Library and Information Science,