[Home ] [Archive]   [ فارسی ]  
:: Main :: Archive :: About :: Search :: Submit :: Contact ::
Main Menu
Home::
Journal Information::
Articles archive::
For Authors::
For Reviewers::
Registration::
Contact us::
Site Facilities::
::
Search in website

Advanced Search
..
Receive site information
Enter your Email in the following box to receive the site news and information.
..
:: Volume 6, Issue 4 (5-2023) ::
C4I Journal 2023, 6(4): 23-39 Back to browse issues page
Identifying vulnerabilities and simulating the security of information systems based on blockchain technology using system dynamics
Behnam Mirabi * , Gholamreza Shahmohamadi
Abstract:   (185 Views)
Abstract
The Objective: Objective: to identify vulnerabilities and simulate the behavior of information systems in the face of users who intend to commit cyber violations and subsequently to improve the security level of organizations' information systems in order to prevent cyber violations by emphasizing the reduction of threats related to system users through the use of block chain technology.
Research Methodology: In this research, a system dynamic model is presented to simulate the cyber security of organizations' systems in order to prevent profiteering by using block chain technology. In this research, using the fuzzy DEMATEL method, important vulnerabilities of information systems were identified and selected. After expert approval, cause and effect diagrams and state-flow diagrams were drawn using the system dynamics method.
Findings According to statistics, 34% of system vulnerabilities are due to the activities of organization users. In this research, a diagram of causal relationships and the behavior process of information systems and organizational users was modeled, provided that a user commits a violation intentionally or unintentionally. This model considers the initial conditions in such a way that each transaction is initiated by a specific person and recorded in its blockchain system. Therefore, it reflects the reaction of the system in case of illegal and irrational actions and provides the basis for preventive actions. This research proposes a system dynamic diagram based on the analysis of the cause and effect relationship diagram and describes the components of the model in the form of mathematical equations.
Conclusion: Modeling the dynamic behavior of information systems to compare the effectiveness of block chain technology and traditional information systems helps senior managers and decision makers of organizations in the field of information technology in making decisions. The inherent elements of the block chain are effective on the key elements of the security of the information systems of organizations and enable the detection of cyber violations to a large extent, which indicates the positive impact of the block chain technology on the process of predicting and detecting the offending users of the organization.



 
Keywords: Blockchain, cyber security, organizational information systems, cyber-crimes
Full-Text [PDF 831 kb]   (96 Downloads)    
Type of Study: Research | Subject: Information Technology
Received: 2022/11/19 | Accepted: 2023/03/16 | Published: 2024/07/8
Send email to the article author

Add your comments about this article
Your username or Email:

CAPTCHA


XML   Persian Abstract   Print


Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

mirabi B, shahmohamadi G. Identifying vulnerabilities and simulating the security of information systems based on blockchain technology using system dynamics. C4I Journal 2023; 6 (4) :23-39
URL: http://ic4i-journal.ir/article-1-343-en.html


Rights and permissions
Creative Commons License This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Volume 6, Issue 4 (5-2023) Back to browse issues page
فصلنامه علمی-پژوهشی فرماندهی و کنترل C4I Journal

 
Persian site map - English site map - Created in 0.04 seconds with 34 queries by YEKTAWEB 4660