THE RELEVANCE OF INFORMATION SECURITY

Shermetov Bunyod

1,2Technical School No. 4 of Koshkupir Region

Tangriberganova Dildora

1,2Technical School No. 4 of Koshkupir Region

##semicolon## Information security, cybersecurity relevance, digital SMEs, cyber resilience, maturity models, human factor, cyber threats.


सार

In the era of modern digital transformation, ensuring information security has evolved from a mere technical task into a strategic priority that determines the stability of both nations and the private sector. This article analyzes current challenges in the field of information security, specifically focusing on the vulnerability of digital small and medium-sized enterprises (SMEs) to cyber threats. Beyond traditional technical solutions, the study explores the interplay between information security, the human factor, organizational culture, and governance processes.

By synthesizing international best practices and recent scholarly research from the Scopus database (2012–2024), this study highlights the importance of implementing "maturity models" and "Responsible AI" (RAI) principles to enhance cyber resilience. Furthermore, practical and scientific recommendations are provided for enterprises with limited resources on adopting lightweight security frameworks. The research findings justify the necessity of building an information security system based on a holistic approach, harmonizing people, processes, and technologies.


##submission.citations##

[1] J. De Matteis, G. Elia, and P. Del Vecchio, "Business Continuity Management and Organizational Resilience: A Small and Medium Enterprises (SMEs) Perspective," J. Conting. Crisis Manag., vol. 31, pp. 670–682, 2023.

[2] R. Bhamra, S. Dani, and K. Burnard, "Resilience: The Concept, a Literature Review and Future Directions," Int. J. Prod. Res., vol. 49, pp. 5375–5393, 2011.

[3] J. Groenendaal and I. Helsloot, "Cyber Resilience during the COVID-19 Pandemic Crisis: A Case Study," J. Conting. Crisis Manag., vol. 29, pp. 439–444, 2021.

[4] M. A. Sánchez and M. De Batista, "Business Continuity for Times of Vulnerability: Empirical Evidence," J. Conting. Crisis Manag., vol. 31, pp. 431–440, 2023.

[5] M. N. Y. Marican, S. A. Razak, A. Selamat, and S. H. Othman, "Cyber Security Maturity Assessment Framework for Technology Startups: A Systematic Literature Review," IEEE Access, vol. 11, pp. 5442–5452, 2023.

[6] C. Schmitz, M. Schmid, D. Harborth, and S. Pape, "Maturity Level Assessments of Information Security Controls: An Empirical Analysis of Practitioners Assessment Capabilities," Comput. Secur., vol. 108, p. 102306, 2021.

[7] D. Moher, A. Liberati, J. Tetzlaff, and D. G. Altman, "Preferred Reporting Items for Systematic Reviews and Meta-Analyses: The PRISMA Statement," Int. J. Surg., vol. 8, pp. 336–341, 2010.

[8] M. J. Page et al., "The PRISMA 2020 Statement: An Updated Guideline for Reporting Systematic Reviews," BMJ, vol. 372, p. n71, 2021.

[9] T. Mettler, "Maturity Assessment Models: A Design Science Research Approach," Int. J. Soc. Syst. Sci., vol. 3, pp. 81–98, 2011.

[10] T. Mettler, P. Rohner, and R. Winter, "Towards a Classification of Maturity Models in Information Systems," in Management of the Interconnected World, A. D’Atri, M. De Marco, A. M. Braccini, and F. Cabiddu, Eds. Heidelberg, Germany: Physica-Verlag HD, 2010, pp. 333–340.

[11] P. Virkkala, M. Saarela, K. Hänninen, J. Kujala, and A.-M. Simunaniemi, "Business Maturity Models for Small and Medium-Sized Enterprises: A Systematic Literature Review," Management, vol. 15, pp. 137–155, 2020.

[12] J. Becker, R. Knackstedt, and J. Pöppelbuß, "Developing Maturity Models for IT Management," Bus. Inf. Syst. Eng., vol. 1, pp. 213–222, 2009.