Ammar, M., Russello, G., & Crispo, B. (2018). Internet of things: A survey on the security of IoT frameworks. Journal of Information Security and Applications, 38, 8-27.
Andrea, I., Chrysostomou, C., & Hadjichristofi, G. (2015). Internet of things: Security vulnerabilities and challenges. 2015 IEEE Symposium on Computers and Communication (ISCC), 180-187.
Axeland, Å., Hagfeldt, H., Carlsson, M., Sergel, L. L., & Butun, I. (2021). Implications of cybersecurity breaches in LPWANs. In Decision Support Systems and Industrial IoT in Smart Grid, Factories, and Cities (pp. 1-18). IGI Global.
Boiko, A., Shendryk, V., & Boiko, O. (2019). Information systems for supply chain management: Uncertainties, risks and cybersecurity. Procedia Computer Science, 149, 65-70.
Celebucki, D., Lin, M. A., & Graham, S. (2018). A security evaluation of popular internet of things protocols for manufacturers. 2018 IEEE International Conference on Consumer Electronics (ICCE), 1-6.
Cornelius, F. P., van Rensburg, S. K. J., & Kader, S. (2022). The value of criminological theories in explaining cybersecurity in South African smart cities. International Annals of Criminology, 60(2), 220-240.
Dubey, N. K., & Sangle, P. (2019). Customer perception of CRM implementation in banking context: Scale development and validation. Journal of Advances in Management Research, 16(1), 38-63.
Granjal, J., Monteiro, E., & Silva, J. S. (2015). Security for the internet of things: A survey of existing protocols and open research issues. IEEE Communications Surveys & Tutorials, 17(3), 1294-1312.
Grammatikis, P. I. R., Sarigiannidis, P. G., & Moscholios, I. D. (2019). Securing the Internet of Things: Challenges, threats and solutions. Internet of Things, 5, 41-70.
H. Suo, J. Wan, C. Zou, J. Liu. (2012). Security in the internet of things: A review. 2012 International Conference on Computer Science and Electronics Engineering, Vol. 3, 648–651.
Kamariotou, M., & Kitsios, F. (2019). Information systems planning and success in SMEs: Strategizing for IS. In Business Information Systems: 22nd International Conference, BIS 2019, Seville, Spain, June 26–28, 2019, Proceedings, Part I 22 (pp. 397-406). Springer International Publishing.
Kumar, A., & Krishnamoorthy, B. (2020). Business analytics adoption in firms: A qualitative study elaborating TOE framework in India. International Journal of Global Business and Competitiveness, 15(2), 80-93.
Kuri, J. L., & Rafi, M. (2020). Securing data in Internet of Things (IoT) using cryptography and steganography techniques. International Journal for Research in Applied Science & Engineering Technology (IJRASET), 8(7), 1933. Retrieved from www.ijraset.com.
Laudon, C. K., & Laudon, P. J. (2013). Essentials of management information systems. Pearson Education, Inc.
Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., & Zhao, W. (2017). A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications. IEEE Internet of Things Journal, 4(5), 1125-1142.
Leloglu, E. (2017). A review of security concerns in internet of things. Journal of Computer and Communications, 5(1), 121-136.
Mosenia, A., & Jha, N. K. (2017). A comprehensive study of security of internet-of-things. IEEE Transactions on Emerging Topics in Computing, 5(4), 586-602.
Muthiariny, D. E. (2023, May 26). BSI Admits Massive Money Withdrawals Post Service Disruptions. Tempo. https://en.tempo.co/read/1730272/bsi-admits-massive-money-withdrawals-post-service-disruptions
Nguyen, K. T., Laurent, M., & Oualha, N. (2015). Survey on secure communication protocols for the internet of things. Ad Hoc Networks, 32, 17-31.
Ouaddah, A., Mousannif, H., Elkalam, A. A., & Ouahman, A. A. (2017). Access control in the internet of things: Big challenges and new opportunities. Computer Networks, 112, 237-262.
Qu, Y., Ming, X., Ni, Y., Li, X., Liu, Z., Zhang, X., & Xie, L. (2019). An integrated framework of enterprise information systems in smart manufacturing system via business process reengineering. Proceedings of the Institution of Mechanical Engineers, Part B: Journal of Engineering Manufacture, 233(11), 2210-2224.
Rivero, O. (2014). The importance of public relations in corporate sustainability. Global Journal of Management and Business Research, 14(B4), 21-23.
Sain, M., Kang, Y. J., & Lee, H. J. (2017). Survey on security in internet of things: State of the art and challenges. 2017 19th International Conference on Advanced Communication Technology (ICACT), 699-704.
Schaumont, P. (2017). Security in the internet of things: A challenge of scale. Design, Automation Test in Europe Conference Exhibition (DATE), 674-679.
Sicari, S., Rizzardi, A., Grieco, L., & Coen-Porisini, A. (2015). Security, privacy and trust in internet of things: The road ahead. Computer Networks, 76, 146-164.
Teymourlouei, H., & Jackson, L. (2021). Dark Data: Managing Cybersecurity Challenges and Generating Benefits. In Advances in Parallel & Distributed Processing, and Applications: Proceedings from PDPTA'20, CSC'20, MSV'20, and GCC'20 (pp. 91-104). Springer International Publishing.
Trivedi, J. (2019). Examining the customer experience of using banking chatbots and its impact on brand love: The moderating role of perceived risk. Journal of Internet Commerce, 18(1), 91-111.
Zarpelo, B. B., Miani, R. S., Kawakani, C. T., & de Alvarenga, S. C. (2017). A survey of intrusion detection in internet of things. Journal of Network and Computer Applications, 84, 25-37.
- Abstract viewed - 405 times
- pdf downloaded - 241 times
Affiliations
Gagas Gayuh Aji
Universitas Airlangga
Suko Widodo
Affiliation not stated
Ganjar Ndaru Aji
Affiliation not stated
Gilang Gusti Aji
Affiliation not stated
Dian Prawitasari
Affiliation not stated
How to Cite
Building Trust in The Digital Age: How HRM and Cybersecurity Collaborate for Effective Stakeholder Relations
Vol 12 No 2 (2023): Management Analysis Journal
Submitted: May 22, 2023
Published: Jul 10, 2023
Abstract
This study emphasizes the crucial role of cybersecurity and public relations in the successful adoption of technology. To protect customer data and manage risks, organizations need robust cybersecurity measures. At the same time, building trust and differentiation through transparent communication and addressing customer concerns is vital. Recommendations include enhancing cybersecurity, training employees, prioritizing data privacy, maintaining ongoing public relations efforts, and collaborating with industry peers. By implementing these recommendations, organizations can navigate technology challenges, safeguard data, and cultivate a positive reputation.