{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T08:04:24Z","timestamp":1767341064228,"version":"3.48.0"},"reference-count":83,"publisher":"PeerJ","license":[{"start":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T00:00:00Z","timestamp":1767312000000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"The Deanship of Graduate Studies and Scientific Research at Qassim University","award":["QU-APC-2025"],"award-info":[{"award-number":["QU-APC-2025"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"abstract":"<jats:p>Cyber security has become a critical part of computer systems and recent technological developments have focused on making production and distribution processes more fluid and efficient. The introduction of Industry 4.0 and its significant impact on life and the economy highlights the importance of technological progress. However, modern technology faces several challenges. Cyber security is a major obstacle to software companies\u2019 full adoption of automation and connectivity to transform production, logistics, and distribution. The proposed article is a systematic literature review to identify and document these difficulties systematically. The SLR identified 13\u00a0major cyber security threats, which are less than or equal to 25 percent. Through a questionnaire exercise, industry experts were consulted on the substance of the report. The identified cyber security challenges span a broad spectrum, encompassing issues like security issues\/access of cyberattacks, lack of right knowledge, framework, lack of technical support, disaster issues, cost security issues, lack of confidentiality and trust, lack of management, unauthorized access issues, lack of resources, lack of metrics, administrative mistakes during development, and lack of quality, liability, and reliability. We prioritized and evaluated the severity of each cyber security problem using the Fuzzy-Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) technique to highlight the importance of our work further. Based on our recommended methodology, the most common issues were security issues and access to cyber-attacks, with a score of 0.768. Our work incorporates the cutting-edge Fuzzy-TOPSIS method, a powerful computational technique that has proven effective in handling fuzziness and ambiguity in many areas when applied to decision-making problems. The study should provide valuable information for software development companies facing cybersecurity threats. In addition, it provides vendors with tools to prioritize and assess risks associated with different security priorities. Considering all aspects, this work contributes significantly to the topic of cybersecurity and is a useful tool for companies trying to understand and address cybersecurity issues in developing software for fuzzy logic systems.<\/jats:p>","DOI":"10.7717\/peerj-cs.3337","type":"journal-article","created":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T08:00:21Z","timestamp":1767340821000},"page":"e3337","source":"Crossref","is-referenced-by-count":0,"title":["Cyber security challenges for software vendors through a fuzzy-TOPSIS approach"],"prefix":"10.7717","volume":"12","author":[{"given":"Abdullah M.","family":"Alnajim","sequence":"first","affiliation":[{"name":"Department of Information Technology, College of Computer, Qassim University, Buraydah, Buraydah, Saudi Arabia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Abdul Wahid","family":"Khan","sequence":"additional","affiliation":[{"name":"Department of Computer Science, College of Engineering and Information Technology, Qassim University, Buraydah, Saudi Arabia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0443-2428","authenticated-orcid":true,"given":"Shah","family":"Zaib","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Science & Technology Bannu, KP, Pakistan"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3435-6681","authenticated-orcid":true,"given":"Shabbab","family":"Algamdi","sequence":"additional","affiliation":[{"name":"Department of Software Engineering, College of Computer Science and Engineering, Prince Sattam bin Abdulaziz University, Al Kharj, Saudi Arabia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6220-0225","authenticated-orcid":true,"given":"Faheem","family":"Khan","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Gachon University, Seongnam-si, Seoul, South Korea"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"4443","published-online":{"date-parts":[[2026,1,2]]},"reference":[{"issue":"1","key":"10.7717\/peerj-cs.3337\/ref-1","doi-asserted-by":"publisher","first-page":"0973","DOI":"10.26634\/jfet.1.1.968","article-title":"Cyber security and the evolution in intrusion detection systems","volume":"1","author":"Abraham","year":"2005","journal-title":"Journal of Engineering and Technology"},{"key":"10.7717\/peerj-cs.3337\/ref-2","first-page":"313","article-title":"Cybersecurity and honeypots: experience in a scientific network infrastructure","volume":"1","author":"Acal","year":"2015"},{"key":"10.7717\/peerj-cs.3337\/ref-3","doi-asserted-by":"publisher","first-page":"3607","DOI":"10.32604\/cmc.2022.023480","article-title":"Intelligent model for predicting the quality of services violation","volume":"71","author":"Adnan Khan","year":"2022","journal-title":"Computers, Materials & Continua"},{"key":"10.7717\/peerj-cs.3337\/ref-4","doi-asserted-by":"publisher","DOI":"10.13140\/RG.2.2.32849.24167","author":"Agaba","year":"2024","journal-title":"CISCO SYSPAL AI-driven management tool"},{"issue":"2","key":"10.7717\/peerj-cs.3337\/ref-5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10479-022-04844-8","article-title":"Reconceptualizing cybersecurity awareness capability in the data-driven digital economy","volume":"350","author":"Akter","year":"2022","journal-title":"Annals of Operations Research"},{"issue":"12","key":"10.7717\/peerj-cs.3337\/ref-6","doi-asserted-by":"publisher","first-page":"5911","DOI":"10.3390\/app12125911","article-title":"Analysis and ranking of IT risk factors using fuzzy TOPSIS-based approach","volume":"12","author":"Alshahrani","year":"2022","journal-title":"Applied Sciences"},{"key":"10.7717\/peerj-cs.3337\/ref-7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4067\/s0718-33052024000100211","article-title":"Examining cybersecurity culture in Leon city organizations: insights from 2022","volume":"32","author":"Arellano","year":"2024","journal-title":"Ingeniare: Revista Chilena de Ingenier\u00eda"},{"key":"10.7717\/peerj-cs.3337\/ref-8","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2501.17748","article-title":"Investigating vulnerability disclosures in open-source software using bug bounty reports and security advisories","author":"Ayala","year":"2025"},{"volume-title":"An introduction to medical statistics","year":"2015","author":"Bland","key":"10.7717\/peerj-cs.3337\/ref-9"},{"key":"10.7717\/peerj-cs.3337\/ref-10","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/978-3-319-95669-5","article-title":"Protecting information with cybersecurity","volume-title":"Effective Model-Based Systems Engineering","author":"Borky","year":"2018"},{"key":"10.7717\/peerj-cs.3337\/ref-11","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.cose.2018.01.015","article-title":"Cybersecurity education: evolution of the discipline and analysis of master programs","volume":"75","author":"Cabaj","year":"2018","journal-title":"Computers & Security"},{"issue":"3","key":"10.7717\/peerj-cs.3337\/ref-12","doi-asserted-by":"crossref","first-page":"431","DOI":"10.3233\/JCS-2003-11308","article-title":"The economic cost of publicly announced information security breaches: empirical evidence from the stock market","volume":"11","author":"Campbell","year":"2003","journal-title":"Journal of Computer Security"},{"key":"10.7717\/peerj-cs.3337\/ref-13","doi-asserted-by":"publisher","first-page":"1940","DOI":"10.1016\/j.procs.2016.05.510","article-title":"Enhancing computational science curriculum at liberal arts institutions: a case study in the context of cybersecurity","volume":"80","author":"Cao","year":"2016","journal-title":"Procedia Computer Science"},{"issue":"1","key":"10.7717\/peerj-cs.3337\/ref-14","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1080\/10864415.2004.11044320","article-title":"The effect of internet security breach announcements on market value: capital market reactions for breached firms and internet security developers","volume":"9","author":"Cavusoglu","year":"2004","journal-title":"International Journal of Electronic Commerce"},{"issue":"2015","key":"10.7717\/peerj-cs.3337\/ref-15","first-page":"137","article-title":"An emerging US (and world) threat: cities wide open to cyber attacks","volume":"17","author":"Cerrudo","year":"2015","journal-title":"Securing Smart Cities"},{"issue":"5","key":"10.7717\/peerj-cs.3337\/ref-16","doi-asserted-by":"publisher","first-page":"113908","DOI":"10.1016\/j.eswa.2020.113908","article-title":"Pythagorean fuzzy linear programming technique for multidimensional analysis of preference using a squared-distance-based approach for multiple criteria decision analysis","volume":"164","author":"Chen","year":"2021","journal-title":"Expert Systems with Applications"},{"key":"10.7717\/peerj-cs.3337\/ref-17","doi-asserted-by":"crossref","DOI":"10.14236\/ewic\/EASE2010.17","article-title":"Towards an evidence-based understanding of electronic data sources","author":"Chen","year":"2010"},{"key":"10.7717\/peerj-cs.3337\/ref-18","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-57524-6_4","article-title":"Development of the world cyber security","volume-title":"World Internet Development Report 2017","author":"Chinese Academy of Cyberspace Studies","year":"2019"},{"key":"10.7717\/peerj-cs.3337\/ref-19","first-page":"1","article-title":"ACM SIG IR annual business meeting 2022: secretary\u2019s notes","volume":"56","author":"Dietz","year":"2023"},{"key":"10.7717\/peerj-cs.3337\/ref-20","doi-asserted-by":"publisher","first-page":"37","DOI":"10.7546\/PECR.79.23.02","article-title":"Redundancy management in dependable distributed real-time systems","volume":"79","author":"Djambazova","year":"2023","journal-title":"International Journal Problems of Engineering Cybernetics and Robotics"},{"issue":"1","key":"10.7717\/peerj-cs.3337\/ref-21","doi-asserted-by":"publisher","first-page":"9094380","DOI":"10.1155\/2018\/9094380","article-title":"Fuzzy analytical hierarchy process method to determine the quality of gemstones","volume":"2018","author":"Dwi","year":"2018","journal-title":"Advances in Fuzzy Systems"},{"issue":"1","key":"10.7717\/peerj-cs.3337\/ref-22","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/s12351-020-00552-y","article-title":"Multi-criteria decision making for green supplier selection using interval type-2 fuzzy AHP: a case study of a home appliance manufacturer","volume":"22","author":"Ecer","year":"2022","journal-title":"Operational Research"},{"issue":"3","key":"10.7717\/peerj-cs.3337\/ref-23","doi-asserted-by":"crossref","first-page":"21","DOI":"10.20409\/berj.2016321806","article-title":"Financial performance evaluation of Turkish energy companies with fuzzy AHP and fuzzy TOPSIS methods","volume":"7","author":"Ey\u00fcboglu","year":"2016","journal-title":"Business and Economics Research Journal"},{"issue":"4","key":"10.7717\/peerj-cs.3337\/ref-24","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/978-3-319-96139-2_14","article-title":"Big data in healthcare: a survey","volume":"10","author":"Farooqi","year":"2019","journal-title":"Applications of Intelligent Technologies in Healthcare"},{"issue":"3","key":"10.7717\/peerj-cs.3337\/ref-25","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1145\/636772.636774","article-title":"A framework for using insurance for cyber-risk management","volume":"46","author":"Gordon","year":"2003","journal-title":"Communications of the ACM"},{"issue":"16","key":"10.7717\/peerj-cs.3337\/ref-26","doi-asserted-by":"publisher","first-page":"7091","DOI":"10.3390\/s23167091","article-title":"Traffic management in IoT backbone networks using GNN and MAB with SDN orchestration","volume":"23","author":"Guo","year":"2023","journal-title":"Sensors"},{"issue":"6","key":"10.7717\/peerj-cs.3337\/ref-27","doi-asserted-by":"publisher","first-page":"382","DOI":"10.28991\/cej-2017-00000099","article-title":"Fuzzy and classical MCDM techniques to rank the slope stabilization methods in a rock-fill reservoir dam","volume":"3","author":"Haghshenas","year":"2017","journal-title":"Civil Engineering Journal"},{"issue":"1","key":"10.7717\/peerj-cs.3337\/ref-28","doi-asserted-by":"publisher","first-page":"23","DOI":"10.20982\/tqmp.08.1.p023","article-title":"Computing inter-rater reliability for observational data: an overview and tutorial","volume":"8","author":"Hallgren","year":"2012","journal-title":"Tutorials in Quantitative Methods for Psychology"},{"issue":"1","key":"10.7717\/peerj-cs.3337\/ref-29","doi-asserted-by":"publisher","first-page":"80","DOI":"10.3390\/math11010080","article-title":"A cluster-tree-based secure routing protocol using dragonfly algorithm (DA) in the internet of things (IoT) for smart agriculture","volume":"11","author":"Hosseinzadeh","year":"2022","journal-title":"Mathematics"},{"key":"10.7717\/peerj-cs.3337\/ref-30","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1007\/978-3-642-48318-9_3","article-title":"Methods for multiple attribute decision making","volume-title":"Multiple Attribute Decision Making: Methods and Applications a State-of-the-Art Survey","author":"Hwang","year":"1981"},{"issue":"2","key":"10.7717\/peerj-cs.3337\/ref-31","doi-asserted-by":"publisher","first-page":"5","DOI":"10.7546\/EngSci.LVI.19.02.01","article-title":"Decision analysis for big data platform selection","volume":"56","author":"Ilieva","year":"2019","journal-title":"Engineering Sciences"},{"key":"10.7717\/peerj-cs.3337\/ref-32","doi-asserted-by":"publisher","first-page":"915","DOI":"10.1016\/j.chb.2014.10.046","article-title":"A systematic literature review on agile requirements engineering practices and challenges","volume":"51","author":"Inayat","year":"2015","journal-title":"Computers in Human Behavior"},{"issue":"23","key":"10.7717\/peerj-cs.3337\/ref-33","doi-asserted-by":"publisher","first-page":"4688","DOI":"10.3390\/electronics13234688","article-title":"Deep learning approaches for chest radiograph interpretation: a systematic review","volume":"13","author":"Iqbal","year":"2024","journal-title":"Electronics"},{"key":"10.7717\/peerj-cs.3337\/ref-34","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1016\/B978-0-12-800743-3.00012-8","article-title":"Cybercrime classification and characteristics","volume-title":"Cybercrime and Cyber Terrorism Investigator\u2019s Handbook","author":"Jahankhani","year":"2014"},{"issue":"5","key":"10.7717\/peerj-cs.3337\/ref-35","doi-asserted-by":"publisher","first-page":"973","DOI":"10.1016\/j.jcss.2014.02.005","article-title":"A survey of emerging threats in cybersecurity","volume":"80","author":"Jang-Jaccard","year":"2014","journal-title":"Journal of Computer and System Sciences"},{"issue":"2","key":"10.7717\/peerj-cs.3337\/ref-36","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1016\/j.ejor.2013.07.023","article-title":"Selecting green suppliers based on GSCM practices: using fuzzy TOPSIS applied to a Brazilian electronics company","volume":"233","author":"Kannan","year":"2014","journal-title":"European Journal of Operational Research"},{"issue":"2","key":"10.7717\/peerj-cs.3337\/ref-37","doi-asserted-by":"publisher","first-page":"83","DOI":"10.5121\/ijcsit.2012.4207","article-title":"Review on common criteria as a secure software development model","volume":"4","author":"Kara","year":"2012","journal-title":"International Journal of Computer Science & Information Technology"},{"issue":"127","key":"10.7717\/peerj-cs.3337\/ref-38","first-page":"95","article-title":"Career decision making in the maritime industry: research of merchant marine officers using Fuzzy AHP and Fuzzy TOPSIS methods","volume":"55","author":"Kaya","year":"2018","journal-title":"Zeszyty Naukowe Akademii Morskiej w Szczecinie"},{"key":"10.7717\/peerj-cs.3337\/ref-39","doi-asserted-by":"publisher","DOI":"10.21203\/rs.3.rs-2250026\/v1","article-title":"Identification and prioritization of critical cyber security challenges and practices for software vendor organizations in software development: an AHP-based systematic approach","author":"Khan","year":"2022c"},{"issue":"5","key":"10.7717\/peerj-cs.3337\/ref-40","doi-asserted-by":"publisher","first-page":"231","DOI":"10.14569\/IJACSA.2016.070533","article-title":"An efficient and reliable core-assisted multicast routing protocol in mobile Ad-Hoc network","volume":"7","author":"Khan","year":"2016","journal-title":"International Journal of Advanced Computer Science and Applications"},{"issue":"2","key":"10.7717\/peerj-cs.3337\/ref-41","doi-asserted-by":"publisher","first-page":"108230","DOI":"10.1016\/j.chb.2024.108230","article-title":"Multi-criteria decision-making methods for the evaluation of the social internet of things for the potential of defining human behaviors","volume":"157","author":"Khan","year":"2024","journal-title":"Computers in Human Behavior"},{"issue":"24","key":"10.7717\/peerj-cs.3337\/ref-42","doi-asserted-by":"publisher","first-page":"8355","DOI":"10.3390\/s21248355","article-title":"An efficient and reliable algorithm for wireless sensor network","volume":"21","author":"Khan","year":"2021a","journal-title":"Sensors"},{"issue":"19","key":"10.7717\/peerj-cs.3337\/ref-43","doi-asserted-by":"publisher","first-page":"3686","DOI":"10.3390\/math10193686","article-title":"Development of a model for spoofing attacks in internet of things","volume":"10","author":"Khan","year":"2022a","journal-title":"Mathematics"},{"issue":"5","key":"10.7717\/peerj-cs.3337\/ref-44","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1049\/iet-sen.2015.0038","article-title":"Systematic review of success factors and barriers for software process improvement in global software development","volume":"10","author":"Khan","year":"2016","journal-title":"IET Software"},{"issue":"21","key":"10.7717\/peerj-cs.3337\/ref-45","doi-asserted-by":"publisher","first-page":"3982","DOI":"10.3390\/math10213982","article-title":"AHP-based systematic approach to analyzing and evaluating critical success factors and practices for component-based outsourcing software development","volume":"10","author":"Khan","year":"2022b","journal-title":"Mathematics"},{"issue":"2","key":"10.7717\/peerj-cs.3337\/ref-46","doi-asserted-by":"publisher","first-page":"1650","DOI":"10.1109\/access.2021.3138775","article-title":"Critical success factors of component-based software outsourcing development from vendors\u2019 perspective: a systematic literature review","volume":"10","author":"Khan","year":"2021b","journal-title":"IEEE Access"},{"issue":"2","key":"10.7717\/peerj-cs.3337\/ref-47","doi-asserted-by":"publisher","first-page":"375","DOI":"10.3966\/160792642020032102006","article-title":"A secure core-assisted multicast routing protocol in mobile ad-hoc network","volume":"21","author":"Khan","year":"2020","journal-title":"Journal of Internet Technology"},{"issue":"4","key":"10.7717\/peerj-cs.3337\/ref-48","first-page":"1099","article-title":"An algorithmic approach for core election in mobile ad-hoc network","volume":"20","author":"Khan","year":"2019","journal-title":"Journal of Internet Technology"},{"year":"2007","author":"Kitchenham","article-title":"Guidelines for performing systematic literature reviews in software engineering","key":"10.7717\/peerj-cs.3337\/ref-49"},{"key":"10.7717\/peerj-cs.3337\/ref-50","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1057\/9781137021946_5","article-title":"Cybercrime and cybersecurity in India","volume-title":"Cybercrime and Cybersecurity in the Global South","author":"Kshetri","year":"2013"},{"issue":"1","key":"10.7717\/peerj-cs.3337\/ref-51","doi-asserted-by":"publisher","first-page":"20184","DOI":"10.1038\/s41598-022-20353-x","article-title":"A Q-learning-based routing scheme for smart air quality monitoring system using flying ad hoc networks","volume":"12","author":"Lansky","year":"2022","journal-title":"Scientific Reports"},{"key":"10.7717\/peerj-cs.3337\/ref-52","doi-asserted-by":"crossref","DOI":"10.1145\/2912160.2912170","article-title":"An economic alternative to improve cybersecurity of e-government and smart cities","author":"Li","year":"2016"},{"year":"2018","author":"Lusher","article-title":"Present and future solutions for the lack of cybersecurity professionals","key":"10.7717\/peerj-cs.3337\/ref-53"},{"key":"10.7717\/peerj-cs.3337\/ref-54","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/j.jmsy.2018.11.002","article-title":"Sustainable supplier selection: a multi-criteria intuitionistic fuzzy TOPSIS method","volume":"50","author":"Memari","year":"2019","journal-title":"Journal of Manufacturing Systems"},{"issue":"1","key":"10.7717\/peerj-cs.3337\/ref-55","doi-asserted-by":"publisher","first-page":"102979","DOI":"10.1016\/j.jngse.2019.102979","article-title":"A decision-support system based on Pythagorean fuzzy VIKOR for occupational risk assessment of a natural gas pipeline construction","volume":"71","author":"Mete","year":"2019","journal-title":"Journal of Natural Gas Science and Engineering"},{"key":"10.7717\/peerj-cs.3337\/ref-56","doi-asserted-by":"crossref","DOI":"10.4018\/979-8-3693-3575-8","volume-title":"Strategic innovations for dynamic supply chains","author":"M\u0131zrak","year":"2024"},{"issue":"7","key":"10.7717\/peerj-cs.3337\/ref-57","doi-asserted-by":"publisher","first-page":"256","DOI":"10.3390\/fi16070256","article-title":"Behind the code: identifying zero-day exploits in word press","volume":"16","author":"Mohideen","year":"2024","journal-title":"Future Internet"},{"issue":"6","key":"10.7717\/peerj-cs.3337\/ref-58","doi-asserted-by":"publisher","first-page":"3277","DOI":"10.3390\/s23063277","article-title":"The potential of blockchain technology in dental healthcare: a literature review","volume":"23","author":"Mokhamed","year":"2023","journal-title":"Sensors"},{"key":"10.7717\/peerj-cs.3337\/ref-59","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-73512-2","volume-title":"Guide to automotive connectivity and cybersecurity: trends, technologies, innovations and applications","author":"Moller","year":"2019"},{"issue":"3\u20134","key":"10.7717\/peerj-cs.3337\/ref-60","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1016\/j.ijcip.2010.10.002","article-title":"The economics of cybersecurity: principles and policy options","volume":"3","author":"Moore","year":"2010","journal-title":"International Journal of Critical Infrastructure Protection"},{"issue":"3","key":"10.7717\/peerj-cs.3337\/ref-61","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/978-3-662-59351-6_9","article-title":"Cybersecurity curriculum design: a survey","volume":"11345","author":"Mouheb","year":"2019","journal-title":"Transactions on Edutainment XV"},{"issue":"4","key":"10.7717\/peerj-cs.3337\/ref-62","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1080\/13645570701401305","article-title":"Sampling knowledge: the hermeneutics of snowball sampling in qualitative research","volume":"11","author":"Noy","year":"2008","journal-title":"International Journal of Social Research Methodology"},{"key":"10.7717\/peerj-cs.3337\/ref-63","doi-asserted-by":"crossref","DOI":"10.1109\/ECAI.2015.7301182","article-title":"The cyber security in SMEs in Poland and Tanzania","author":"Nycz","year":"2015"},{"issue":"3","key":"10.7717\/peerj-cs.3337\/ref-64","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.cose.2015.10.002","article-title":"Analysis of personal information security behavior and awareness","volume":"56","author":"\u00d6\u011f\u00fct\u00e7\u00fc","year":"2016","journal-title":"Computers & Security"},{"issue":"4","key":"10.7717\/peerj-cs.3337\/ref-65","doi-asserted-by":"publisher","first-page":"1109","DOI":"10.17559\/TV-20140801181553","article-title":"E-service quality of Internet based banking using combined fuzzy AHP and fuzzy TOPSIS","volume":"23","author":"\u00d6zda\u011fo\u011flu","year":"2016","journal-title":"Tehni\u010dki Vjesnik"},{"issue":"1","key":"10.7717\/peerj-cs.3337\/ref-66","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/ms.2008.4","article-title":"Cybersecurity economic issues: clearing the path to good practice","volume":"25","author":"Pfleeger","year":"2008","journal-title":"IEEE Software"},{"key":"10.7717\/peerj-cs.3337\/ref-67","doi-asserted-by":"publisher","first-page":"1402745","DOI":"10.3389\/fdata.2024.1402745","article-title":"AI security and cyber risk in IoT systems","volume":"7","author":"Radanliev","year":"2024","journal-title":"Frontiers in Big Data"},{"key":"10.7717\/peerj-cs.3337\/ref-68","doi-asserted-by":"publisher","DOI":"10.1177\/15485129241267919","article-title":"Capability hardware enhanced instructions and artificial intelligence bill of materials in trustworthy artificial intelligence systems: analyzing cybersecurity threats, exploits, and vulnerabilities in new software bills of materials with artificial intelligence","author":"Radanliev","year":"2024","journal-title":"The Journal of Defense Modeling and Simulation Methodology, Technology"},{"year":"2017","author":"Rastogi","article-title":"Cybersecurity practices from a software engineering perspective","key":"10.7717\/peerj-cs.3337\/ref-69"},{"issue":"5","key":"10.7717\/peerj-cs.3337\/ref-70","doi-asserted-by":"publisher","first-page":"5166","DOI":"10.1016\/j.eswa.2010.10.045","article-title":"Prioritizing effective 7Ms to improve production systems performance using fuzzy AHP and fuzzy TOPSIS (case study)","volume":"38","author":"Rostamzadeh","year":"2011","journal-title":"Expert Systems with Applications"},{"year":"2007","author":"Rue","article-title":"A framework for classifying and comparing models of cyber security investment to support policy and decision-making","key":"10.7717\/peerj-cs.3337\/ref-71"},{"key":"10.7717\/peerj-cs.3337\/ref-72","doi-asserted-by":"crossref","DOI":"10.1109\/ICGS3.2019.8688137","article-title":"A study of the UK undergraduate computer science curriculum: a vision of cybersecurity","author":"Ruiz","year":"2019"},{"issue":"1","key":"10.7717\/peerj-cs.3337\/ref-73","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1109\/mic.2010.14","article-title":"Metrics for mitigating cybersecurity threats to networks","volume":"14","author":"Schneidewind","year":"2009","journal-title":"IEEE Internet Computing"},{"year":"2005","author":"Shostack","article-title":"Avoiding liability: an alternative route to more secure products","key":"10.7717\/peerj-cs.3337\/ref-74"},{"year":"2004","author":"Stytz","journal-title":"Issues and requirements for cybersecurity in network centric warfare","key":"10.7717\/peerj-cs.3337\/ref-75"},{"issue":"1","key":"10.7717\/peerj-cs.3337\/ref-76","doi-asserted-by":"publisher","first-page":"187","DOI":"10.15388\/Informatica.2019.203","article-title":"Information security risk assessment in critical infrastructure: a hybrid MCDM approach","volume":"30","author":"Turskis","year":"2019","journal-title":"Informatica"},{"issue":"2","key":"10.7717\/peerj-cs.3337\/ref-77","doi-asserted-by":"publisher","first-page":"102387","DOI":"10.1016\/j.cose.2021.102387","article-title":"Developing a cyber security culture: current practices and future needs","volume":"109","author":"Uchendu","year":"2021","journal-title":"Computers & Security"},{"key":"10.7717\/peerj-cs.3337\/ref-78","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3017221","article-title":"ISA evaluation framework for security of Internet of Health things system using AHP-TOPSIS methods","volume":"8","author":"Wang","year":"2020","journal-title":"IEEE Access"},{"key":"10.7717\/peerj-cs.3337\/ref-79","doi-asserted-by":"publisher","first-page":"012006","DOI":"10.1088\/1742-6596\/1823\/1\/012006","article-title":"The best selection of PIP scholarship: AHP-TOPSIS Vs Fuzzy AHP-TOPSIS","volume":"1823","author":"Wardana","year":"2021","journal-title":"Journal of Physics: Conference Series"},{"year":"2020","author":"Wicky","article-title":"Enhancing API security in IoT with blockchain-based access control mechanisms","key":"10.7717\/peerj-cs.3337\/ref-80"},{"issue":"8","key":"10.7717\/peerj-cs.3337\/ref-81","doi-asserted-by":"publisher","first-page":"829","DOI":"10.1016\/j.engappai.2005.12.011","article-title":"Genetic learning and performance evaluation of interval type-2 fuzzy logic controllers","volume":"19","author":"Wu","year":"2006","journal-title":"Engineering Applications of Artificial Intelligence"},{"issue":"1","key":"10.7717\/peerj-cs.3337\/ref-82","doi-asserted-by":"publisher","first-page":"8886877","DOI":"10.1155\/2020\/8886877","article-title":"Multicriteria decision and machine learning algorithms for component security evaluation: library-based overview","volume":"2020","author":"Zhang","year":"2020","journal-title":"Security and Communication Networks"},{"key":"10.7717\/peerj-cs.3337\/ref-83","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1016\/j.eswa.2016.05.016","article-title":"A framework for water loss management in developing countries under fuzzy environment: integration of Fuzzy AHP with Fuzzy TOPSIS","volume":"61","author":"Zyoud","year":"2016","journal-title":"Expert Systems with Applications"}],"container-title":["PeerJ Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/peerj.com\/articles\/cs-3337.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/peerj.com\/articles\/cs-3337.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/peerj.com\/articles\/cs-3337.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/peerj.com\/articles\/cs-3337.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T08:00:30Z","timestamp":1767340830000},"score":1,"resource":{"primary":{"URL":"https:\/\/peerj.com\/articles\/cs-3337"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,2]]},"references-count":83,"alternative-id":["10.7717\/peerj-cs.3337"],"URL":"https:\/\/doi.org\/10.7717\/peerj-cs.3337","archive":["CLOCKSS","LOCKSS","Portico"],"relation":{},"ISSN":["2376-5992"],"issn-type":[{"type":"electronic","value":"2376-5992"}],"subject":[],"published":{"date-parts":[[2026,1,2]]},"article-number":"e3337"}}