{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:11:28Z","timestamp":1767337888224,"version":"build-2065373602"},"reference-count":24,"publisher":"MDPI AG","issue":"12","license":[{"start":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T00:00:00Z","timestamp":1733875200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"European Union\u2019s\u2014HORIZON-CL3-2021-INFRA-01","award":["101073909"],"award-info":[{"award-number":["101073909"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information"],"abstract":"<jats:p>This paper investigates the contribution of the various cybersecurity domains to the United Nations\u2019 Sustainable Development Goals (SDGs), emphasizing the critical role of cybersecurity in advancing sustainable economic growth and resilient IoT infrastructure. The paper also examines specific use cases on how cybersecurity measures and practices can contribute to achieving SDG 8 and SDG 9 focused on decent work and economic growth and industry, innovations, and infrastructure. In the context of SDG 8 the use case of a smart agriculture network was examined, whereas for SDG 9, the use case focuses on a smart factory processing raw materials. An analysis of the prioritization of the several cybersecurity domains following the MoSCoW method is also presented. This paper offers valuable insights and guidance for enhancing corporate resilience and economic benefits in the Internet of Things (IoT) aligning with the SDGs and contributing to a more sustainable and resilient future for the IoT.<\/jats:p>","DOI":"10.3390\/info15120798","type":"journal-article","created":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T03:14:58Z","timestamp":1733886898000},"page":"798","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Cybersecurity as a Contributor Toward Resilient Internet of Things (IoT) Infrastructure and Sustainable Economic Growth"],"prefix":"10.3390","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2947-7470","authenticated-orcid":false,"given":"Georgia","family":"Dede","sequence":"first","affiliation":[{"name":"Department of Informatics and Telematics, Harokopio University of Athens, 17671 Athens, Greece"},{"name":"Netcompany Intrasoft S.A., L-1253 Luxembourg, Luxembourg"}]},{"given":"Anastasia Maria","family":"Petsa","sequence":"additional","affiliation":[{"name":"Netcompany Intrasoft S.A., L-1253 Luxembourg, Luxembourg"}]},{"given":"Stelios","family":"Kavalaris","sequence":"additional","affiliation":[{"name":"Netcompany Intrasoft S.A., L-1253 Luxembourg, Luxembourg"}]},{"given":"Emmanouil","family":"Serrelis","sequence":"additional","affiliation":[{"name":"Alphabet Education (AKMI-Metropolitan) Group, 15125 Athens, Greece"}]},{"given":"Spyridon","family":"Evangelatos","sequence":"additional","affiliation":[{"name":"Netcompany Intrasoft S.A., L-1253 Luxembourg, Luxembourg"}]},{"given":"Ioannis","family":"Oikonomidis","sequence":"additional","affiliation":[{"name":"Netcompany Intrasoft S.A., L-1253 Luxembourg, Luxembourg"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4288-1438","authenticated-orcid":false,"given":"Thomas","family":"Kamalakis","sequence":"additional","affiliation":[{"name":"Department of Informatics and Telematics, Harokopio University of Athens, 17671 Athens, Greece"}]}],"member":"1968","published-online":{"date-parts":[[2024,12,11]]},"reference":[{"key":"ref_1","unstructured":"(2024, November 12). United Nations. Available online: https:\/\/sdgs.un.org\/goals."},{"key":"ref_2","unstructured":"(2024, November 12). R. 5. NIST Special Publication 800-53, Security and Privacy Controls for Informations Systems and Organizations, Available online: https:\/\/csrc.nist.gov\/pubs\/sp\/800\/53\/r5\/upd1\/final."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1007\/s10663-022-09538-9","article-title":"Sustainability, Work and Growth in the Context of SDG 8","volume":"49","author":"Kettner","year":"2022","journal-title":"Empirica"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"114755","DOI":"10.1016\/j.apenergy.2020.114755","article-title":"Composite index as a measure on achieving Sustainable Development Goal 9 (SDG-9) industry-related targets: The SDG-9 index","volume":"265","author":"Upadhyaya","year":"2020","journal-title":"Appl. Energy"},{"key":"ref_5","unstructured":"Odumesi, J.O., and Sanusi, B.S. (2023, January 11\u201312). Achieving Sustainable Development Goals from a Cybersecurity Perspective. Proceedings of the Cybersecure Nigeria Conference, Abuja, Nigeria."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Vijarania, M., Gupta, S., Agrawal, A., and Misra, S. (2024). Achieving Sustainable Development Goals in Cyber Security Using AIoT for Healthcare Application. Artificial Intelligence of Things for Achieving Sustainable Development Goals, Springer Nature.","DOI":"10.1007\/978-3-031-53433-1_11"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Andrade, R.O., Yoo, S.G., Tello-Oquendo, L., and Ortiz-Garc\u00e9s, I. (2021). Cybersecurity, sustainability, and resilience capabilities of a smart city. Smart Cities and the UN SDGs, Elsevier.","DOI":"10.1016\/B978-0-323-85151-0.00012-9"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"484","DOI":"10.3390\/vehicles6010022","article-title":"A fsQCA-Based Framework for Cybersecurity of Connected and Automated Vehicles: Implications for Sustainable Development Goals","volume":"6","author":"Karuppiah","year":"2024","journal-title":"Vehicles"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1016\/j.procs.2021.08.003","article-title":"Cybersecurity and sustainable development","volume":"192","author":"Sulich","year":"2021","journal-title":"Procedia Comput. Sci."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"344","DOI":"10.30574\/gscarr.2024.19.3.0236","article-title":"Aligning Sustainable Development Goals with cybersecurity strategies: Ensuring a secure and sustainable future","volume":"19","author":"Ige","year":"2024","journal-title":"GSC Adv. Res. Rev."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1048","DOI":"10.51594\/csitrj.v5i5.1115","article-title":"Innovation green technology in the age of cybersecurity: Balancing sustainability goals with security concerns","volume":"5","author":"Chukwurah","year":"2024","journal-title":"Comput. Sci. IT Res. J."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"171","DOI":"10.14207\/ejsd.2018.v7n4p171","article-title":"Cybersecurity as an essential sustainable economic development factor","volume":"7","author":"Vasiu","year":"2018","journal-title":"Eur. J. Sustain. Dev."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Djenna, A., Harous, S., and Saidouni, D.E. (2021). Internet of things meet Internet of threats: New concern cyber security issues of critical cyber infrastructure. Appl. Sci., 11.","DOI":"10.3390\/app11104580"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"27","DOI":"10.14445\/22492593\/IJCOT-V12I1P306","article-title":"Cybersecurity considerations for industrial IoT in critical infrastructure sector","volume":"12","author":"Priya","year":"2022","journal-title":"Int. J. Comput. Organ. Trends"},{"key":"ref_15","unstructured":"(2024, November 12). Information Security Forum. Available online: https:\/\/www.securityforum.org\/solutions-and-insights\/standard-of-good-practice-for-information-security\/."},{"key":"ref_16","unstructured":"(2024, November 12). NIST, Available online: https:\/\/nvlpubs.nist.gov\/nistpubs\/CSWP\/NIST.CSWP.29.ipd.pdf."},{"key":"ref_17","unstructured":"(2024, November 12). ISO. Available online: https:\/\/www.iso.org\/standard\/75652.html."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Kravchenko, T., Bogdanova, T., and Shevgunov, T. (2022). Ranking requirements using MoSCoW methodology in practice. Computer Science On-Line Conference, Springer International Publishing.","DOI":"10.1007\/978-3-031-09073-8_18"},{"key":"ref_19","unstructured":"(2024, November 12). ENISA Threat Landscape 2024. Available online: https:\/\/www.enisa.europa.eu\/publications\/enisa-threat-landscape-2024."},{"key":"ref_20","unstructured":"Case, D.U. (2016). Analysis of the Cyber Attack on the Ukrainian Power Grid, Electricity Information Sharing and Analysis Center (E-ISAC)."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Beerman, J., Berent, D., Falter, Z., and Bhunia, S. (2023, January 1\u20134). A review of colonial pipeline ransomware attack. Proceedings of the 2023 IEEE\/ACM 23rd International Symposium on Cluster, Cloud and Internet Computing Workshops (CCGridW), Bangalore, India.","DOI":"10.1109\/CCGridW59191.2023.00017"},{"key":"ref_22","unstructured":"Al Allaf, A., and Totonji, W. (2024, November 12). Exploring IoT Security Threats and Forensic Challenges: A LiteratureReview and Survey Study. Available online: https:\/\/www.diva-portal.org\/smash\/record.jsf?pid=diva2%3A1764110&dswid=5555."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1177\/20438869221149042","article-title":"Ransomware and Costa Rica\u2019s national emergency: A defense framework and teaching case","volume":"14","author":"Datta","year":"2024","journal-title":"J. Inf. Technol. Teach. Cases"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Usmani, M.A., Usmani, K.A., Kaleem, A., and Samiuddin, M. (2023). Cyber Threat Migration: Perpetuating in the Healthcare Sector and Agriculture and Food Industries. Advances in Cyberology and the Advent of the Next-Gen Information Revolution, IGI Global.","DOI":"10.4018\/978-1-6684-8133-2.ch004"}],"container-title":["Information"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2078-2489\/15\/12\/798\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T16:51:55Z","timestamp":1760115115000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2078-2489\/15\/12\/798"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,11]]},"references-count":24,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["info15120798"],"URL":"https:\/\/doi.org\/10.3390\/info15120798","relation":{},"ISSN":["2078-2489"],"issn-type":[{"type":"electronic","value":"2078-2489"}],"subject":[],"published":{"date-parts":[[2024,12,11]]}}}