Next Article in Journal
Lower Bound for Sculpture Garden Problem: Localization of IoT Devices
Next Article in Special Issue
GA-StackingMD: Android Malware Detection Method Based on Genetic Algorithm Optimized Stacking
Previous Article in Journal
A Survey on Consensus Protocols and Attacks on Blockchain Technology
Previous Article in Special Issue
MCGAN: Modified Conditional Generative Adversarial Network (MCGAN) for Class Imbalance Problems in Network Intrusion Detection System
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Relationship between Cyber Security and Civil Protection in the Greek Reality

by
Stavros Kalogiannidis
1,
Maria Paschalidou
2,
Dimitrios Kalfas
3,* and
Fotios Chatzitheodoridis
2,*
1
Department of Business Administration, University of Western Macedonia, 51100 Grevena, Greece
2
Department of Regional and Cross-Border Development, University of Western Macedonia, 50100 Kozani, Greece
3
Department of Agriculture, Faculty of Agricultural Sciences, University of Western Macedonia, 53100 Florina, Greece
*
Authors to whom correspondence should be addressed.
Appl. Sci. 2023, 13(4), 2607; https://doi.org/10.3390/app13042607
Submission received: 14 January 2023 / Revised: 1 February 2023 / Accepted: 15 February 2023 / Published: 17 February 2023
(This article belongs to the Special Issue Information Security and Privacy)

Abstract

:
The links between cybersecurity and civil protection in the last decades became strong due to the rapid increase in the use of Informatics Technologies (IT) worldwide and the need to increase citizens’ protection from various disasters and uncertainties. The objective of the present study is to explore the role of cyber security in enhancing civil protection in Greek reality. Methodologically, the study has been based on a survey with a sample of 345 executives of IT companies in Greece by using a structured questionnaire. The basic results of the research study showed that cyber security technologies positively affect civil protection, cybercrime reduction practices have a positive influence on civil protection, and there is a significant relationship between the government’s role in cyber security and civil protection. Cybersecurity also may have a significant influence on the principles of emergency operations: prevention, mitigation, preparation, response, or emergency evacuation and recovery. The main conclusion from the study is that it is very important for public and private agencies in Greece, as well as in the rest of Europe, to embrace new emerging cybersecurity technologies to help enhance cyber security and civil protection. Potential vulnerabilities in cybersecurity pose substantial risks to the effectiveness and efficiency of such critical infrastructure and directly impact the functioning of states, economies, and societies.

1. Introduction

1.1. Background to the Study

According to Boyens et al. [1], cybercrime damages the global economy by EUR 6.5 trillion by the end of 2022, up from EUR 2.7 trillion in 2015. This increase is attributed in part to cybercriminals taking advantage of the COVID-19 epidemic [2,3,4,5]. More profitable than the worldwide trade in all major illicit narcotics taken together, this statistic reflects the biggest transfer of economic wealth in history and affects incentives for investment and innovation [6,7,8]. Additionally, cyber risks have transcended cybercrime to affect national security [9,10]. The foundation of all the key infrastructures today is digital technology, which also has a significant impact on the degree of civil protection. As a result, protecting their vital infrastructure will become increasingly dependent on maintaining its cybersecurity [11]. The number of people, organizations, and enterprises that can be affected by a single cyberattack at the same time can be very large [12,13]. It is important to note that cybersecurity issues or threats can be associated with malware propagation that can affect Internet of Things devices and mobile devices (IoT) [14,15,16]. The same factor makes it far more challenging to stop an attack [17,18].
Fekete et al. [19] demonstrate that poor cybersecurity may have a potentially huge influence on society, including weakening users’ faith in digital services. Because these services are so entwined with our everyday lives, any effective cybersecurity plan must incorporate the human and, more broadly, social components. Given that information flows and the safeguarding of personal data are the heart of today’s digital society, cyber-security is essential for ensuring that digital services run safely and securely while also protecting the privacy of residents [20]. Thus, cybersecurity is evolving from a technological ‘option’ to a societal must and hence is an important prerequisite for civil protection. However, given the size and consequences of today’s cyberattacks, the digital society has to be ready for them before they happen. It is important to improve, create, and promote cybersecurity resilience, coupled with attack prevention strategies and novel approaches to avoid software vulnerabilities. Cybersecurity implementation will always be industry-specific due to particular sectoral restrictions, regardless of advances in big data, hyper connectivity, edge computing, the Internet of Things (IoT), quantum computing, and blockchain technologies [21,22]. This entails the hazards that come with living in a society where security is varied and unevenly applied [23].
Greece has extensive expertise in building and implementing cyber-resilience for vital infrastructure. Over the previous three decades, Greece has created comprehensive cybersecurity rules and regulations, as well as institutional resilience and essential skills to prevent and safeguard the country’s vital infrastructure from cyberattacks [24,25]. This research will concentrate on existing practices and problems in boosting cyber defense capabilities and endurance of vital cybersecurity infrastructure, as well as developing confidence in the digital society and thereby improving civil protection. The following study intends to offer a better understanding of the current state of European cybersecurity and its influence on civil protection from a business perspective, and of the degree and engagement of the government in tackling the issues at hand [26,27].

1.2. Objectives of the Study

This study majorly investigated the role played by cyber security in enhancing civil protection, with a major basis on Greek reality. The basic objective was analyzed on different special objectives and research questions as have been expressed in Table 1.

1.3. Research Hypotheses

Hypothesis 1 (H1).
Cybersecurity technologies have a positive effect on civil protection.
Hypothesis 2 (H2).
Cyber risk reduction practices have a positive influence on civil protection.
Hypothesis 3 (H3).
There is a significant relationship between government role in cyber security and civil protection.

1.4. Significance of the Study

The contribution of the present research is focused on and trying fundamentally to provide comprehensive insights into the expansion of cybersecurity, revealing flaws in the present digital evolution and their implications for civil protection. Additionally, the research is trying to outline the aspects that, if implemented, have the potential to build a better and more secure future for digital society as well as civil protection, while taking into consideration the emerging cybersecurity problems.
The novelty and the originality of this study are related mainly to the absolute absence of similar studies that try to link cybersecurity to civil protection and to point out the impact of one on another, in any European country. The research tries to cover this gap using data from Greece, a country in the EU in which the use of IT before a few years was at a low level but has shown rapid development over the last few years. Moreover, in Greece, the interest in civil protection is high due to the often-presenting uncertainties and dangers (natural disasters, earthquakes, forest fires, etc.).

2. Literature Review

2.1. Overview of Cybercrime and Cybersecurity

Numerous studies have shown that one essential step in tackling the rising number of intrusions and assaults on private or institutional information is obtaining the necessary expertise in cyber-security [28]. Inadequate information management and a lack of understanding of cyber security provide hackers a chance to access and misuse the information of other persons or organizations [29].
According to Abie [30], cybersecurity enables governmental institutions to respond to numerous technological breakthroughs and the dynamics of globalization. These often provide several difficulties for a nation’s cyberspace, which may be overcome through enhancing cybersecurity. It may be difficult to secure IT and IT systems, and it can be difficult to construct efficient economic, political, and capacity-building processes to handle cybercrime, to name a few of the prevalent technical and globalization-based difficulties [31].
Cybersecurity is a critical global concern, according to Moonen (2021) [32], because of the rise in internet users and resulting increase in internet traffic worldwide. The many facets of cyber security and cybercrime prevention have received significant attention in most nations owing to the fact that technological progress and capacity building are among the Millennium Development Goals that must be met in order to achieve Sustainable Development by 2030 [33]. Governments feel that one of the best ways to achieve sustainable economic development is to lower the high frequency of cybercrime [32,34]. It is crucial to remember that preventing cybercrime allows for strategic expansion in business and industry, which eventually supports stronger economic development [35,36,37].
The vast quantity of cyberattacks, perpetrated by various hackers, have a considerable effect on the majority of economies. In this case, these assaults result in a loss of about $400 billion globally, which has a significant effect on the global economy.
Such detrimental impacts of cyberattacks may only be addressed internationally by implementing efficient cybercrime prevention techniques [38,39].
The bulk of government institutions, according to Alabdulatif (2018) [40], are extremely vulnerable to various cyber-attacks and hence require the most attention in terms of increasing public knowledge about cyber security. Statistics show that every year, more than 70% of Greek businesses publish papers describing the harm done to them by various hackers or other cyberattacks. This significantly affects their ability to carry out different legal obligations [41].
Zaballos & Herranz [42] revealed that the majority of government organizations have also consistently said that there are only a few individuals equipped to deal with cybercrime concerns, which has significantly hampered attempts to improve cyber security. Data theft and other forms of cybercrime cause governments to lose a lot of money, which has a significant impact on the efficient delivery of key services and, as a result, slows down the nation’s economic progress. This proves that a top government issue that must be given significant attention by the accountable government organizations or agencies is cyber-security [43].
In his research, Maahs [44] discovered that it is urgently necessary to uncover the numerous technological gaps connected to the security of commercial network systems. Business owners and other institutional leaders can find the greatest solutions to the issues brought on by cybercrimes by recognizing gaps. Smaller networks, such those used in institutions or schools, are more vulnerable, and as a result, hackers constantly target them. However, it is crucial to remember that if a network or information system’s security is unstable, hackers may simply control them. The bulk of data or information systems, as well as other critical networks, must be built on a protection and prevention-oriented viewpoint [45].
According to Minović [46], the bulk of cybersecurity assaults are caused by a variety of human blunders performed by less skilled or trained IT employees, giving hackers access to network infrastructure. It is vital to remember that most hackers concentrate on taking advantage of human flaws, which is why cybercrime occurs often in businesses with inexperienced personnel. Additionally, understanding human processes is crucial for improving cyber security. Most human functions are used by incorporating history, behaviors, and design to enhance the efficacy of security tools and regulations. Companies must choose an inter policy framework that integrates threat assessment with the prioritization of remedies via the use of consumer technologies in the vast majority of challenging circumstances [47].

2.2. Forms of Cybersecurity Technology

De Bruijn & Janssen [48] suggest that contemporary cyber technologies use behavioral analytics to thwart criminals and prevent sensitive information and intellectual property from being attacked. It is important to note that end-to-end analytics help to detect and thwart threats to network traffic, files, and gadgets throughout data environments by using user behavior analytics that get smarter over time. Complete user behavior visibility is now possible thanks to artificial intelligence (AI) and machine learning (ML), enabling preemptive threat detection, real-time threat assessment, and risk management [49,50].
Fekete et al. [19] demonstrated solutions for detecting and blocking intrusions. These so-called IDS and IPS solutions might assist IT personnel in spotting and guarding their wireless and wired networks against a variety of security risks. These solutions, including other network security measures, have gained popularity as government networks have become more complicated. IPS solutions continually monitor traffic in real-time and may stop assaults from both known and unidentified sources, while IDS technologies look for suspicious behavior. Both tool types can classify and recognize different forms of assaults, which enhances computer security as a whole.
Abie [30] disclosed that admins may now identify, halt, and remove malware by using anti-malware solutions in their systems. A malware’s primary purpose is to locate and exploit vulnerabilities in computer networks, notably those that exist in security protocols, computer operating systems, web browsers, application software, and well-known targets such as Adobe Flash, Acrobat, and Reader [51]. Best practices include adding IP blacklisting, data loss prevention tools, anti-virus and anti-spyware software, internet surfing controls, egress filtering, and outbound traffic proxies to a full defense.
Boyens et al. [1] demonstrated that mobile device administration systems are currently used in cyber-security. These technologies, which are also referred to as MDM, give administrators the ability to remotely monitor and control mobile device security settings. Employees are permitted to work remotely on company-approved devices, but management can guarantee the security of these devices because they are constantly in control of them.
According to Minović [46], restricting network access and granting access to network resources only to devices that adhere to the security policy can assist security policy be enforced. They handle the authentication and authorization procedures and have the authority to control which users have access to which data, ensuring that users must first satisfy several security standards before being given access to any data.
Additionally, Fekete et al. [19] suggested that beyond the conventional barriers, technology has advanced, and companies now use future-proof firewalls. Next-generation firewalls provide enhanced network security services, such as application visibility and control, in addition to meeting the needs for online security. Moreover, authorization and identification have become very critical in most public and private companies [52]. User authentication and permissions rules are used by conventional directory-based systems to control access. Public key infrastructure and digital certificates are two examples of the techniques used by contemporary identity-based security technologies to put an extra layer of security on top.

2.3. Strategies to Manage Cyber Risks

Cybercrime tactics are essentially the many tools or initiatives designed to lessen the incidence of cybercrime in various nations throughout the globe [53]. One typical technique used to counteract the high degree of cybercrime is to strengthen national and international collaboration between governments, corporations, institutions, and the general public, in addition to adopting numerous laws and standards [29].
The majority of governments and academics agree that better understanding the various factors that contribute to cybercrime is one of the best strategies to improve cyber security. Since these are the most often impacted regions by the destructive actions of hackers, Zaballos & Herranz [42] contend that institutional leaders and the entire workforce in various business and governmental bodies need to increase their level of cybersecurity knowledge because these are the regions that are most frequently affected by the destructive actions of hackers. A thorough examination into the 2013 Target Organization data breach revealed that while the target’s current security procedures were successful in identifying the intrusion, the IT staff’s failure was brought on by their lack of knowledge and skill regarding the cyber-attack [54].
The majority of governments and organizations claim that the overall strength of cyber security is commonly based on cyber defense, or on various technological and non-technical methods that enable a country to effectively guard information systems that are critical to the establishment of cyberspace in most government institutions [55]. In such a scenario, a country’s cyberspace can survive any occurrences that would ordinarily put in danger the general reliability, security, or confidentiality of the data saved, processed, and afterwards communicated through the information systems.
According to OECD [17], an effective information system security approach is used in a robust cyberspace, which is built on the battle against cybercrime and cyber defense. Security measures and methods for combating cybercrime work together to help organizations respond to the numerous attacks launched on their information systems. However, the only way to begin constructing a strong cyberspace is to have a strategic vision that specifies how to achieve and maintain a high level of cybersecurity. Enhancing organizational and policy coordination, fostering public-private sector partnership, and highlighting the importance of core principles such as data security are the most frequent components of such strategic initiatives [56]. Along with promoting improved international collaboration, this also includes creating laws or regulations that encourage freedom of speech and the free movement of information.
Additional strategies to counter cyberattacks are presented in Table 2 below and these mostly relate to using different applications or software to prevent any occurrence of a cyberattack.
In this context, game-based learning can be an effective strategy. The potential of game-based learning to draw a diverse user base, including students, adults, professionals, etc., is what makes it effective. The core premise of gamified learning centers on the creation of awareness among users regarding a topic matter is through educating them via games. It tries to boost their interest in learning about the topics that affect them. The idea that the game-based method is successful in raising users’ awareness of social engineering dangers including phishing attempts has been backed by research. According to Abu et al. [21], gamified learning alters the user’s status in a way that places them in a situation where their learning improves.
Since phishing attacks are widely utilized by social engineers, using a game-based approach can help people better understand social engineering attacks in general. Its efficacy resides on its capacity to inspire computer users’ drive to gain a deeper understanding of the dangers of social engineering assaults. Additionally, it influences susceptible users and customers to alter their interactions and behaviors with their information security systems. Because it focuses users’ attention on the learning by giving them instant outcomes, gamified learning is very successful at generating a realistic environment for users to learn about potential social engineering assaults.
In order to secure information systems against social engineering assaults, a robust and qualified cybersecurity workforce at the national and federal level is essential. As it would increase public interest in learning about cybercrime, game-based learning may be a tremendous tool in developing a cybersecurity workforce. Table 3 present additional strategies to counter cyberattacks.
In addition to game-based learning, the high level of cyber threats or attacks can be addressed through utilizing critical infrastructure. It is important to note that critical infrastructures protection is one of the most important topics concerning the application of cybersecurity strategies to modern societies. Critical infrastructure may relate to physical and cyber systems and resources that are so vital to the nation that their failure or destruction would seriously jeopardize national security, including our physical and financial safety and well-being [59]. The classical Bloom filter data structure was proposed by Calderoni et al. [60] and is an essential part of hundreds of cryptographic protocols that have been successfully used in privacy preservation and secure computation settings, frequently in conjunction with the homomorphic characteristics of cyphers such as Paillier’s.
Calderoni et al. [61] claim that crucial infrastructure such as indoor localization may be employed as an enabling technology for location-based services. Service providers passively gather various form data that might expose strictly personal information about an individual in order to maintain the availability of these products. Téglásy & Katsikas [62] suggested a security service based on large symmetric keys that enables the automated verification of asset authorization status and as a strategy of enhance cybersecurity.

2.4. Civil Protection

According to Boyens et al. [1], the damage caused by COVID-19 demonstrates how the character and scope of catastrophic risk have evolved through time. The varied consequences have had substantial socioeconomic effects outside of certain industries. Despite the increase in the complexity and unpredictable nature of catastrophes, thereby making managing disaster risks a more difficult and ambitious challenge, the knowledge, cooperation, and a greater culture of anticipation would increase the EU’s resilience and enable intelligent, sustainable, and equitable development.
As indicated by Bernat [55], identifying the hazards, functioning as a successful team, and employing a multi-skilled strategy are crucial for disaster planning and response. The EU’s civil protection strategy enjoys widespread public support in both Europe and the rest of the world as one of the most visible displays of its compassion for those affected by disasters of any kind [63]. The EU is creating a new forum for professionals in civil protection and disaster management to exchange knowledge, best practices, and lessons learned through the Union Civil Protection Knowledge Network. Through the Knowledge Network, the EU hopes to improve its European Disaster Risk Management [19].
Abie [30] indicated that the COVID-19 outbreak demonstrated the benefits of close collaboration between national civil protection groups, academic institutions, and researchers. It also showed how vital training, research, and innovation are. The organizations required to react to catastrophes, especially those with a health component, such as COVID-19, must be reinforced and inclusive [64,65]. Along with the institutions that support the labor market and research centers, these institutions should be present in the health and civil protection sectors [66]. They must be capable of understanding hazards, averting them, and acting in unison when necessary [67].

2.5. Research Gap

Based on the reviewed literature, it is clear that cyber security attacks pose serious hazards to businesses and academia. In order to reduce the threat posed by cyber security attacks, businesses must now educate and train end users. Replicating the attacker’s behaviors in a safe setting allows one to explore and learn without worrying about losing anything, and it also enables the participant to see dangers early on, thereby reducing the likelihood of successful cyber-attacks. Researchers have examined the vulnerability of people and organizations to cybersecurity threats [55]. The literature shows that collection of comprehensive scenarios and the analysis of actual cybersecurity threats are particularly important. This research tackles a number of contemporary issues, including gathering examples of actual cybersecurity assaults, data analysis, and identification of the attack’s key characteristics. Researchers in another study presented cyber-attack frameworks that are based on instances from the actual world [19]. After examining real-world examples, the researchers in this study offered an attack framework that roughly corresponds to those examples but was not exhaustive of the many approaches to countering cybersecurity assaults in relation to civil protection. This study differs very significantly from some of the other previous studies in that it majorly focuses on the importance of cyber security in boosting civil protection.

3. Methods

3.1. Research Design

A cross-sectional survey design and quantitative research technique were utilized in this study. This design is essentially an investigation in which quantitative data are collected and analyzed to identify a certain phenomenon in terms of recent trends, present occurrences, and current links between different cyber security effects and civil protection. The descriptive research method allows the researcher to generalize the study’s various results to a broader population of IT enterprises that gave data on the subject of inquiry.

3.2. Target Population

The study targeted the different accessible companies in the IT companies in Greece, which was an estimated 120,000 persons [68]. The population was included to establish the most appropriate sample for the study. The study targeted both the public and private IT sectors of Greece, since this would help to obtain a more representative sample of people with good knowledge on cyber security and civil protection.

3.3. Sample Size

The study utilized a sample of 345 executives of IT companies in Greece. The sample acted as a representative sample for entire Greece.

3.4. Sampling Technique

Both stratified and basic random sample approaches, which are both part of probability sampling processes, were utilized in the research. In this instance, stratified sampling was used to create the target sample, and a straightforward random sampling method was used to extract the final sample from the strata. Samples obtained by simple random sampling are quite representative of the whole population. However, it could take a while, particularly when working with large samples.

3.5. Data Collection

The research used an online survey to obtain information from executives of IT companies in Greece (more than 120,000 persons) (Figure 1). One of the simplest and most popular methods for collecting data is via a survey questionnaire. This is because it is less expensive since a large number of respondents are surveyed quickly, and it allows respondents to freely answer delicate questions without worrying about the researcher’s approval or rejection.
Having determined the survey’s accuracy and then its reliability corresponding to P = 99.7%, the sample size was selected. The variance of managers, directors, or workers that commute was assessed using a pilot sample of 50 individuals. S2 = 466,699.14 and s = 683.15 were the outcomes. A value of z = 3 is often employed in sample size calculations, which corresponds to a degree of dependability of P = 99.7%. The required level of reliability determines z’s value (P). Equation (1) determines that the minimum sample size was 344.76, or 345 people, based on the values of N = 120,000 (available target population), s = 683.15 (standard deviation of the sample), z = 3, and d = 115.61 [69,70,71,72,73].
n = N ( zs ) 2 Nd 2 + ( zs ) 2
Determination of the required sample of respondents
n = 120.000 ( 3 × 683.15 ) 2 120.000 × 115.61 2 + ( 3 × 683.15 ) 2   n = 344.76
where by:
n is the minimum sample of respondents.
d is the needed precision.
N is the total population.
s is the population proportion.
z is the critical value.
A purposive sampling technique was used to select the representative sample for the study.

3.6. Validity and Reliability

The validity is the level extent to which the observed scale scores are a true reflection of the existing differences among the objects under measurement instead of the systematic or random error. The validity for this study was obtained using the Content Validity Coefficient (CVC). For this study, instruments with a content validity index of 0.6 or higher were therefore considered acceptable for use while those with a value less than 0.6 were rejected.
The test-retest reliability can be used to measure the extent to which instruments produced consistent scores when the same group of individuals is repeatedly measured under the same conditions. A Cronbach’s alpha correlation coefficient of greater than 0.5 was considered to have passed the reliability test and the instrument was considered suitable for use.

3.7. Data Analysis

Following the collection of the given questionnaires, the data will be analyzed in accordance with the study’s goals. To achieve a more statistical analysis of the research, all the data that were gathered from the respondents were then examined using the SPSS 16.0 version. The data used for the frequency distribution were obtained from the first portion of the user profile questionnaire; it is explained using a frequency table, with the mean and standard deviation calculated for some of the data. To determine the relationship between the study variables, the researcher also used the Pearson’s rank correlation test. The extent to which the various facets of cyber security impact civil protection in Europe was also investigated using regression analysis. A multiple regression model in Equation (2) helped to obtain coefficients of the different variables that also doubled as the predicted values.
Y =   β 0 +   β 1 X 1 +   β 2 X 2 +   β 3 X 3 +   ε             1
where:
Y = Civil protection
β0 = constant (coefficient of intercept)
X 1 = Cyber security technologies
X 2 = Cybercrime reduction
X 3 = Government role in cyber security
ε = Represents the error term in the multiple regression model
The three hypotheses of this study were tested based on the obtained regression results at 95% confidence interval or at 0.05 significance level.

3.8. Ethical Considerations

The researcher confirmed that employees or owners of the selected firms provided informed consent and indicated their desire to participate in the study, along with strictly upholding high level of confidentiality and privacy while dealing with respondents’ data. Respondents also had the freedom to reply to questions based on how well they understood the different opinion questions. This helped to increase the number of replies to certain inquiries.

4. Results

This section interprets the various conclusions acquired after analyzing data gathered from the chosen research participants.

4.1. Demographic Characteristics

Results about the different demographic characteristics of the selected respondents who participated in the study are presented in Table 4.
The majority of research participants (62.9%) were male, with just 37% being female. The bulk of research participants (54.8%) were between the ages of 30 and 40, with just 4.9% being beyond the age of 50. The bulk of research participants (57.1%) had spent 5–10 years in the IT industry, with just 18.3% having spent less than 5 years.

4.2. Descriptive Results

The results of the established effect of cyber security technologies on civil protection in Greece are presented in Table 5.
According to the findings in Table 5, the majority of survey participants (74.4%) agreed that behavioral analytics aid in the analysis of user behavior on websites, mobile applications, systems, and networks in businesses. Platforms for behavioral analytics may be used by cybersecurity experts to identify potential threats and weaknesses. Blockchain may be used by cybersecurity experts to protect devices or systems, develop industry-standard security procedures, and make it nearly impossible for hackers to access databases. A total of 86.5% of survey participants disagreed that cybersecurity experts can react to and identify targeted attacks using extended detection and response (XDR). However, 66.2% of respondents believed that organizations must adopt emerging cyber security technology to improve their resilience to cyber catastrophes and crises.
The study sought to establish the influence of cyber risk reduction practices on civil protection, and the results are presented in Table 6.
According to the results in Table 6, the majority of the study participants (64.6%) agreed that cybersecurity reduction influences the performance of critical infrastructure such as power plants, electricity grids, communication networks, and cloud systems. A total of 51.2% of the study participants agreed that cybersecurity risk mitigation is possible through the utilization of security policies and processes to reduce the overall risk or impact of cybercrimes. In total, 80.3% of the study participants agreed with the notion that the prevention, detection, and remediation attributes in cybersecurity help in disaster management; 53.5% of the study participants agreed that proactive cybersecurity risk mitigation enhances disaster preparedness in organizations and in the general public; and 64.3% agreed that implementing new cybersecurity technologies helps to mitigate the different threats to poor civil protection.
The study sought to determine the government’s influence in the relationship between cyber security and civil protection, and the results are presented in Table 7.
The results in Table 7 show that the majority of the study participants (84.3%) disagreed with the notion that the analysis of cybersecurity issues has continued to weaken due to limited involvement of the government in addressing causes of cybercrime. The study showed that large portions of the Critical National Infrastructure in the majority of OECD nations are privately owned rather than being under direct government authority as agreed by 53.5% of the study participants. A total of 51.7% of the study participants agreed that numerous civilian systems are susceptible to cybersecurity flaws and assaults; therefore, a solely military strategy to cybersecurity defense has minimal utility. However, 64.4% of the study participants disagreed with the fact that cybersecurity concerns that pose a significant long-term physical danger to the globe or to specific countries are likely to pale in comparison to other global hazards, in which information infrastructures play an essential but seemingly secondary role.
The study sought to establish the different strategies to enhance civil protection through cybersecurity.
From Figure 2, it was established that proper monitoring and alerts is one of the best strategies to enhance civil protection through cyber security as revealed by 32% of the study participants, followed by 21% who showed that acquiring knowledge on cybersecurity is important in enhancing cybersecurity. This therefore indicates that educating the general public or enhancing awareness on cyber threats or crimes is an important strategy towards improving civil protection in countries. Furthermore, 15% of the respondents indicated that risk management and decisions are important in enhance civil protection through cyber security; 13% of the study participants mentioned that improving cybersecurity technologies is the best strategy and the least number of participants (4%) mentioned effective allocation of resources.

4.3. Correlation Analysis

Table 8 contains the findings of correlation analysis used to determine the link between the research variables.
The results revealed a positive correlation between cyber security technologies and civil protection (r = 0.482), which is equally significant at 0.05. There was a positive correlation between cybercrime reduction and civil protection (r = 0.631), which was significant at 0.05, and indication practices such as enforcing cyber security laws or policies, training people in cyber protection techniques, and embracing cyber technologies help to enhance civil protection. The government’s role in cyber security showed a positive correlation with civil protection (r = 0.546), at a 0.05 level of significance (p = 0.00 < 0.05), showing that increased investment in cyber infrastructure by the government has a great role in improving civil protection.

4.4. Results of Regression Analysis

Regression analysis was also conducted to determine the extent to which civil protection is predicted by the different aspects of cyber security technologies, cybercrime reduction, and government role in cyber security, and the results are presented in Table 9. Regression analysis was used to analyze the amount to which the independent variables (cyber security technology, cybercrime reduction, and government engagement in cyber security) contribute to strengthening civil safety in Europe based on different projected values. The positive multiple correlation coefficient (R) of 0.702 was an indication that the three independent variables in this study were greatly associated with civil protection. Furthermore, the R-Square value revealed that the three independent factors resulted in a 66.1% shift in civil protection.
The one-way ANOVA in Table 10 was used to assess if the three independent variables were superior predictors of the dependent variable or whether the linear regression model well fitted the data. F (3,342) = 352.413, p < 0.05 demonstrates that the model and data are sufficiently matched.
In Table 11, the model’s unstandardized coefficients were investigated to determine the impact of cyber security technology, cybercrime reduction, and the involvement of the government in cyber security on civil protection. The beta coefficient of cyber security technologies was 0.281, implying that a unit change in cyber security technologies resulted in a 28.1% increase in civil protection. Similarly, the beta coefficient of cybercrime was 0.186, meaning that a unit change in cybercrime reduction resulted in an 18.6% increase in civil protection. Finally, a unit shift in the role of the government in cyber security would result in a 19.2% increase in civil protection.
The beta coefficient (β1) was 0.315, and the p-value (0.001) was less than the significance level (0.05); hence, we accepted hypothesis 1 that cyber security technologies positively affects civil protection. The beta coefficient (β2) was 0.117 and significant at 0.05 (p = 0.014); hence, we accepted hypothesis 2 that cybercrime reduction practices have a positive influence on civil protection. The beta coefficient (β3) was 0,341, and the variable was significant where p-value = 0.000, indicating a substantial relationship between government role in cyber security and civil protection. We, therefore, accept hypothesis 3 that there is a significant relationship between government role in cyber security and civil protection.

5. Discussion

The study demonstrated a substantial link between government involvement in cyber security and civil protection, as well as a positive relationship between cyber security technologies and civil protection, cybercrime reduction methods, and civil protection.
Cybersecurity is a priority in most countries since it affects the protection of people. According to this report, cybercrimes include many aspects of hacking passwords, websites, or networks of countries or organizations, as well as conducting other criminal offences while utilizing information technology. Cybercrimes in this context significantly impair people’s privacy or secrecy because they involve attackers gaining unauthorized access to and using private or institutional data inadvertently. This study reveals that monitoring and adjustments are a crucial strategy for preventing cybercrime and therefore boosting the security of computer systems. This process is essential for identifying any potentially harmful activity and for enhancing cyber security in any environment using computer networks [74]. Never offer malicious attackers on a computer network or information system the chance to access and store sensitive data on a peripheral device. Only by carefully watching the entire system can this be accomplished. According to this study, cybercrimes can be prevented by effectively managing risks and making sound decisions. In this case, careful assessment of the numerous cyberattack threats helps businesses allocate resources to the most vulnerable component [75]. Studies have repeatedly demonstrated that the bulk of issues relating to cybercrime or cyberattacks arise from a firm’s lack of experienced IT professionals [76]. According to the majority of researchers, many people lack the skills and knowledge necessary to protect private or public data or information correctly, making it more vulnerable to hackers. This study also discovered that one of the most crucial ways to improve cybersecurity is to have a well-trained security staff with the abilities to handle the many dynamics of a cyberspace. This gives the expert team the opportunity to develop the best safeguards for the accessible sensitive data by allowing them to recognize any risks that may already be present in the IT department. It is essential for every institution or country to be knowledgeable about the many preventive measures for reducing cybercrime and protecting sensitive data from hacker intrusion [77]. It is vital to remember that knowledge is power. This study also demonstrated how essential it is to enact various cybersecurity laws as a preventative strategy. In this case, comprehensive cybercrime legislation and cyber-threat countermeasures that may be established on a national or global level are crucial for protecting a country’s or private organization’s cyberspace. Most countries and businesses have embraced the development of frameworks for cyber-security laws, which could essentially help in the fight against cybercrime. These frameworks are essential because they offer protections for safeguarding key information infrastructure, hence reducing the present national risks. The poll respondents also generally agreed with the researcher’s assessment of the contribution that fighting cybercrime makes in improving human security. The participants in the survey were unanimous in their agreement with the researcher’s challenges for combating cybercrime and enhancing human security in Greece. Participants in the survey strongly backed the research team’s strategic plan to combat cybercrime and enhance human security in Europe. According to Boyens et al. [1], it can be extremely challenging to pinpoint the genuine perpetrator of cyberattacks since the computers that the attack appears to originate from will have been compromised and utilized to relay and amplify the attack orders. The attribution problem is what is being discussed here. Contrary to conventional conflict, the intended target of retaliation is still unclear; hence, a notion of deterrence is ineffective. Thus, resilience must be the main emphasis of cyberweapon defense, together with proactive strategies and thorough contingency planning, to enable speedy recovery in the event of an attack. The cyber infrastructure may be used to lessen the impacts in addition to acting as a possible channel for spreading and amplifying an initial triggering event [78]. If proper backup preparations are in place, information systems may help in the management of other systemic risks. To reassure communities and lessen the possibility of social unrest and unhappiness, they can offer substitute means of delivering crucial services and disseminate the latest information and advice on catastrophic scenarios.

6. Conclusions

The study established that cybersecurity plays an important role in improving the levels of civil protection in a country. Hackers and other cybercriminals have advanced technologically due to the fast changes in technology and the complexity of online operations. The cybersecurity of both commercial and public organizations throughout the globe has been consistently impacted in this case as they employ all types of technology to modify the most sensitive data. This demonstrates the need of having a strategic vision to direct various nations or organizations in combating the problem of cybercrime. The most successful approaches for preventing cybercrime and enhancing cybersecurity center on eliminating human error to strengthen cyber security, include thorough risk assessment, ongoing monitoring of the organization’s network or information systems, and proper decision-making. Another key step in avoiding cybercrimes is the creation of national or international frameworks for cyber security policy. Such policies are essential for attaining economic and social development and, as a result, for defending societies that rely on the internet against all types of risks and threats [79]. Threats to cybersecurity are becoming an increasing worry as technology continues to advance [80]. Cybercriminals always create new strategies to target systems and the organizations that host them [81]. There are numerous cybersecurity solutions available that can aid in reducing the various risks or hazards related to cybersecurity. Any country would benefit from increased civic protection as a result of this. With improved cybersecurity, the general public is well equipped with important data and information on how to prepare, mitigate, and respond to different disasters or crises [40].

7. Recommendations

The following are recommendations based on the study findings:
To secure their cyberspace and thereby improve their overall cyber-security, nations must create national specialized cybersecurity authorities.
Public and internal personnel should be informed about the fundamentals of cyber security and how to safeguard sensitive information against cyberattacks by governments and commercial organizations.

Limitations, Reliability, and Future Work

The limitations of the research are mainly related to the composition of the sample and the way the survey was conducted. The number of 345 executives and managers who participated in the survey, although it was appropriate in size, largely covered IT businesses and fewer public sector organizations and services mainly related to civil protection; only a limited number of them were related to cyber security. Another limitation that was taken into account was the respondents’ unwillingness to complete and submit the questionnaire in its whole and on time.
In future research, an attempt will be made to investigate the readiness of the public sector in Greece to deal with crises on the internet with implications for civil protection. Moreover, the online conducting of surveys has almost been imposed on scientific research due to the COVID-19 pandemic. In fact, due to the complexity of the subject being investigated, it would be more correct to conduct the research face-to-face and with in-depth interviews with experts in the fields of civil protection and cyber security. Despite these limitations, it is estimated that the reliability of the research is quite high due to the significant sample size in relation to Greece, while the techniques chosen and used were appropriate according to the relevant international literature.

Author Contributions

Conceptualization, S.K. and F.C.; methodology, S.K. and D.K.; software, M.P. and D.K.; validation, S.K. and F.C.; formal analysis, D.K. and F.C.; investigation, S.K. and M.P.; resources, S.K. and M.P.; data curation, D.K. and M.P.; writing—original draft preparation, S.K. and F.C.; writing—review and editing, M.P. and D.K.; visualization, F.C., M.P. and D.K supervision, F.C.; project administration S.K. and F.C. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Informed consent was obtained from all subjects involved in the study.

Data Availability Statement

Data available on request.

Acknowledgments

This research did not receive any specific grant from funding agencies in the public, commercial, or not-for-profit sectors. The authors thank the editor and the anonymous reviewers for the feedbacks and their insightful comments on the original submission. All errors and omissions remain the responsibility of the authors.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Boyens, J.; Smith, A.; Bartol, N.; Winkler, K.; Holbrook, A.; Fallon, M. Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2021.
  2. Carrapico, H.; Farrand, B. Discursive continuity and change in the time of COVID-19: The case of EU cybersecurity policy. J. Eur. Integr. 2020, 42, 1111–1126. [Google Scholar] [CrossRef]
  3. Chigada, J.; Madzinga, R. Cyberattacks and threats during COVID-19: A systematic literature review. SA J. Inf. Manag. 2021, 23, 11. [Google Scholar] [CrossRef]
  4. Eling, M.; Elvedi, M.; Falco, G. The Economic Impact of Extreme Cyber Risk Scenarios. N. Am. Actuar. J. 2022, 1–15. [Google Scholar] [CrossRef]
  5. Lallie, H.S.; Shepherd, L.A.; Nurse, J.R.; Erola, A.; Epiphaniou, G.; Maple, C.; Bellekens, X. Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Comput. Secur. 2021, 105, 102248. [Google Scholar] [CrossRef] [PubMed]
  6. Dean, J. Cybercrime Is Bigger than Drugs, Says Police Chief. 2015. Available online: https://www.thetimes.co.uk/article/cybercrime-is-bigger-than-drugs-says-police-chief-vhdcrw6ms3s (accessed on 21 December 2022).
  7. Patel, K.; Chudasama, D. Protecting Ourselves from Digital Crimes. Natl. J. Cyber Secur. Law 2021, 4, 12–20. [Google Scholar]
  8. Xu, L.; Li, Y.; Fu, J. Cybersecurity investment allocation for a multi-branch firm: Modeling and optimization. Mathematics 2019, 7, 587. [Google Scholar] [CrossRef] [Green Version]
  9. Cavelty, M.D.; Egloff, F.J. The Politics of Cybersecurity: Balancing Different Roles of the State. St Antony’s Int. 2019, 1, 37–57. [Google Scholar]
  10. Jang-Jaccard, J.; Nepal, S. A survey of emerging threats in cybersecurity. J. Comput. Syst. Sci. 2014, 80, 973–993. [Google Scholar] [CrossRef]
  11. Aldasoro, I.; Gambacorta, L.; Giudici, P.; Leach, T. The drivers of cyber risk. J. Financ. Stab. 2022, 60, 100989. [Google Scholar] [CrossRef]
  12. Coles-Kemp, L.; Ashenden, D.; O’Hara, K. Why should I? Cybersecurity, the security of the state and the insecurity of the citizen. Politics Gov. 2018, 6, 41–48. [Google Scholar] [CrossRef]
  13. Aldasoro, I.; Gambacorta, L.; Giudici, P.; Leach, T. Operational and Cyber Risks in the Financial Sector. 2020. Available online: www.bis.org (accessed on 21 December 2022).
  14. Lee, I. Internet of Things (IoT) cybersecurity: Literature review and iot cyber risk management. Future Internet 2020, 12, 157. [Google Scholar] [CrossRef]
  15. Nurse, J.R.C.; Creese, S.; De Roure, D. Security Risk Assessment in Internet of Things Systems. IT Prof. 2017, 19, 20–26. [Google Scholar] [CrossRef] [Green Version]
  16. Zhao, X.; Xue, L.; Whinston, A. Managing interdependent information security risks: Cyberinsurance, managed security services, and risk pooling arrangements. J. Manag. Inf. Syst. 2013, 30, 123–152. [Google Scholar] [CrossRef] [Green Version]
  17. OECD. Cybersecurity Policy Making at a Turning Point. 2012. Available online: https://www.oecd-ilibrary.org/content/paper/5k8zq92vdgtl-en (accessed on 20 December 2022).
  18. Un, C.; Thinyane, M.; Christine, D. Building Cybersecurity Awareness; United Nations University: Shibuya City, Japan, 2021; Available online: https://collections.unu.edu/view/UNU:8262#viewAttachments (accessed on 19 December 2022).
  19. Fekete, A.; Rhyner, J. Sustainable Digital Transformation of Disaster Risk—Integrating New Types of Digital Social Vulnerability and Interdependencies with Critical Infrastructure. Sustainability 2020, 12, 9324. [Google Scholar] [CrossRef]
  20. Tsiafoulis, S.G.; Zorkadis, V.C.; Pimenidis, E. Maximum Entropy Oriented Anonymization Algorithm for Privacy Preserving Data Mining. In Global Security, Safety and Sustainability & e-Democracy; Georgiadis, C.K., Jahankhani, H., Pimenidis, E., Bashroush, R., Al-Nemrat, A., Eds.; Springer: Berlin/Heidelberg, Germany, 2012; Volume 99, pp. 9–16. [Google Scholar]
  21. Al-Haija, Q.A. Top-Down Machine Learning-Based Architecture for Cyberattacks Identification and Classification in IoT Communication Networks. Front. Big Data 2022, 4, 782902. [Google Scholar] [CrossRef]
  22. Yesmin, T.; Agasti, S.; Pandit, J.K.; Mondal, B. Cyber Security and Its Prediction with Cloud Data Computing and IoT. Smart Innov. Syst. Technol. 2023, 311, 43–50. [Google Scholar]
  23. Kalogiannidis, S.; Toska, E.; Chatzitheodoridis, F. Contribution of Civil Protection to the Urban Economy: Evidence from a Small-Sized Greek City. Sustainability 2022, 14, 981. [Google Scholar] [CrossRef]
  24. Kalogiannidis, S.; Kalfas, D.; Chatzitheodoridis, F.; Kontsas, S. The Impact of Digitalization in Supporting the Performance of Circular Economy: A Case Study of Greece. JRFM 2022, 15, 349. [Google Scholar] [CrossRef]
  25. Maglaras, L.; Drivas, G.; Chouliaras, N.; Boiten, E.; Lambrinoudakis, C.; Ioannidis, S. Cybersecurity in the Era of Digital Transformation: The case of Greece. In Proceedings of the Presented at the 2020 International Conference on Internet of Things and Intelligent Applications, ITIA 2020, Zhenjiang, China, 27–29 November 2020. [Google Scholar]
  26. Kuzior, A.; Brożek, P.; Kuzmenko, O.; Yarovenko, H.; Vasilyeva, T. Countering Cybercrime Risks in Financial Institutions: Forecasting Information Trends. JRFM 2022, 15, 613. [Google Scholar] [CrossRef]
  27. Ramses A, W. High Representative of the Union for Foreign Affairs and Security Policy. In Oxford Encyclopedia of EU Law; Oxford University Press: Oxford, UK, 2022. [Google Scholar]
  28. Li, Y.; Liu, Q. A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments. Energy Rep. 2021, 7, 8176–8186. [Google Scholar] [CrossRef]
  29. Galinec, D.; Moznik, D.; Guberina, B. Cybersecurity and cyber defence: National level strategic approach. Automatika 2017, 58, 273–286. [Google Scholar] [CrossRef]
  30. Abie, H.; Ranise, S.; Verderame, L.; Cambiaso, E.; Ugarelli, R.; Giunta, G.; Praça, I.; Battisti, F. Cyber-Physical Security for Critical Infrastructures Protection: First International Workshop. In Proceedings of the CPS4CIP 2020, Guildford, UK, 18 September 2020; Springer International Publishing: Cham, Switzerland, 2021; Volume 12618. [Google Scholar]
  31. Christou, G. The challenges of cybercrime governance in the European Union. Eur. Politics Soc. 2018, 19, 355–375. [Google Scholar] [CrossRef] [Green Version]
  32. Moonen, G.; Meijers, D. Disasters and Crisis Management. 2021. Available online: https://www.eca.europa.eu/Lists/ECADocuments/JOURNAL21_03/JOURNAL21_03.pdf (accessed on 22 December 2022).
  33. Georgiadis, C.K.; Jahankhani, H.; Pimenidis, E.; Bashroush, R.; Al-Nemrat, A. (Eds.) Global Security, Safety and Sustainability & e-Democracy; Springer: Berlin/Heidelberg, Germany, 2012; Volume 99. [Google Scholar]
  34. Sulich, A.; Rutkowska, M.; Krawczyk-Jezierska, A.; Jezierski, J.; Zema, T. Cybersecurity and Sustainable Development. Procedia Comput. Sci. 2021, 192, 20–28. [Google Scholar] [CrossRef]
  35. Paoli, L.; Visschers, J.; Verstraete, C. The impact of cybercrime on businesses: A novel conceptual framework and its application to Belgium. Crime Law Soc Chang. 2018, 70, 397–420. [Google Scholar] [CrossRef]
  36. Kay, A.; Hutcherson, C.; Keene, C.; Zhang, X.; Terwilliger, M.G. How financial Institutions address cybersecurity threats: A critical analysis. Issues Inf. Syst. 2021, 22, 63–74. [Google Scholar]
  37. European Commission. Commission Signs Agreement with Industry on Cybersecurity and Steps up Efforts to Tackle Cyber-Threats. 2016. Available online: https://ec.europa.eu/commission/presscorner/detail/en/IP_16_2321 (accessed on 21 December 2022).
  38. Chipa, I.H.; Gamboa-Cruzado, J.; Villacorta, J.R. Mobile Applications for Cybercrime Prevention: A Comprehensive Systematic Review. IJACSA 2022, 13, 73–82. [Google Scholar] [CrossRef]
  39. Ho, H.; Ko, R.; Mazerolle, L. Situational Crime Prevention (SCP) techniques to prevent and control cybercrimes: A focused systematic review. Comput. Secur. 2022, 115, 102611. [Google Scholar] [CrossRef]
  40. Alabdulatif. Cybercrime and Abalysis of Laws in Kingdom of Saudi Arabia. 2018. Available online: https://uh-ir.tdl.org/bitstream/handle/10657/3107/ALABDULATIF-THESIS-2018.pdf?sequence=1 (accessed on 21 December 2022).
  41. Collier, B.; Thomas, D.R.; Clayton, R.; Hutchings, A.; Chua, Y.T. Influence, infrastructure, and recentering cybercrime policing: Evaluating emerging approaches to online law enforcement through a market for cybercrime services. Polic. Soc. 2022, 32, 103–124. [Google Scholar] [CrossRef]
  42. Zaballos, A.G.; Herranz, F.G. From Cybersecurity to Cybercrime: A Framework for Analysis and Implementation. Inter-American Development Bank. 2013. Available online: https://publications.iadb.org/publications/english/viewer/From-Cybersecurity-to-Cybercrime-A-Framework-for-Analysis-and-Implementation.pdf (accessed on 23 December 2022).
  43. Floridi, L.; Taddeo, M. (Eds.) The Ethics of Information Warfare; Springer International Publishing: Cham, Switzerland, 2014; Volume 14. [Google Scholar]
  44. Maahs, D.L. Managerial Strategies Small Businesses Use to Prevent Cybercrime. 2014. Available online: https://scholarworks.waldenu.edu/cgi/viewcontent.cgi?article=7028&context=dissertations (accessed on 22 December 2022).
  45. WEF, ‘Cybercrime Prevention Principles for Internet Service Providers. 2020. Available online: https://www3.weforum.org/docs/WEF_Cybercrime_Prevention_ISP_Principles.pdf (accessed on 19 December 2022).
  46. Minović, A. Cybersecurity in the Western Balkans: Policy Gaps and Cooperation Opportunities: EU Cyber Direct. 2016. Available online: https://eucyberdirect.eu/atlas/sources/cybersecurity-in-the-western-balkans-policy-gaps-and-cooperation-opportunities (accessed on 21 December 2022).
  47. Hughes, B.B.; Bohl, D.; Irfan, M.; Margolese-Malin, E.; Solórzano, J.R. ICT/Cyber benefits and costs: Reconciling competing perspectives on the current and future balance. Technol. Forecast. Soc. Chang. 2017, 115, 117–130. [Google Scholar] [CrossRef] [Green Version]
  48. De Bruijn, H.; Janssen, M. Building Cybersecurity Awareness: The need for evidence-based framing strategies. Gov. Inf. Q. 2017, 34, 1–7. [Google Scholar] [CrossRef]
  49. Kure, H.I.; Islam, S.; Razzaque, M.A. An integrated cyber security risk management approach for a cyber-physical system. Appl. Sci. 2018, 8, 898. [Google Scholar] [CrossRef] [Green Version]
  50. Roldán-Molina, G.; Almache-Cueva, M.; Silva-Rabadão, C.; Yevseyeva, I.; Basto-Fernandes, V. A Comparison of Cybersecurity Risk Analysis Tools. Procedia Comput. Sci. 2017, 121, 568–575. [Google Scholar] [CrossRef]
  51. Yadav, C.S.; Singh, J.; Yadav, A.; Pattanayak, H.S.; Kumar, R.; Khan, A.A.; Haq, M.A.; Alhussen, A.; Alharby, S. Malware Analysis in IoT & Android Systems with Defensive Mechanism. Electronics 2022, 11, 2354. [Google Scholar]
  52. Hiller, J.S.; Russell, R.S. The challenge and imperative of private sector cybersecurity: An international comparison. Comput. Law Secur. Rev. 2013, 29, 236–245. [Google Scholar] [CrossRef]
  53. Kshetri, N. The Quest to Cyber Superiority: Cybersecurity Regulations, Frameworks, and Strategies of Major Economies; Springer: Cham, Switzerland, 2016; p. 240. [Google Scholar]
  54. Bellasio, J.; Flint, R.; Ryan, N.; Søndergaard, S.; Monsalve, C.G.; Meranto, A.S.; Knack, A. Developing Cybersecurity Capacity: A Proof-of-Concept Implementation Guide; RAND Corporation: Santa Monica, CA, USA, 2018. [Google Scholar]
  55. Bernat, L. Enhancing the Digital Security of Critical Activities, Going Digital Toolkit Note. OECD. 2021, Volume 17. Available online: https://goingdigital.oecd.org/data/notes/No17_ToolkitNote_DigitalSecurity.pdf (accessed on 19 December 2022).
  56. Kianpour, M.; Kowalski, S.J.; Øverby, H. Systematically understanding cybersecurity economics: A survey. Sustainability 2021, 13, 13677. [Google Scholar] [CrossRef]
  57. Fatima, R.; Yasin, A.; Liu, L.; Wang, J. How persuasive is a phishing email? A phishing game for phishing awareness. J. Comput. Secur. 2019, 27, 581–612. [Google Scholar] [CrossRef]
  58. Yasin, A.; Fatima, R.; Liu, L.; Wang, J.; Ali, R.; Wei, Z. Understanding and deciphering of social engineering attack scenarios. Secur. Priv. 2021, 4, e161. [Google Scholar] [CrossRef]
  59. Solomon, M.G.; Sunderam, V.; Xiong, L.; Li, M. Enabling mutually private location proximity services in smart cities: A comparative assessment. In Proceedings of the 2016 IEEE International Smart Cities Conference (ISC2), Trento, Italy, 12–15 September 2016; pp. 1–8. [Google Scholar]
  60. Calderoni, L.; Palmieri, P.; Maio, D. Probabilistic Properties of the Spatial Bloom Filters and Their Relevance to Cryptographic Protocols. IEEE Trans. Inf. Forensics Secur. 2018, 13, 1710–1721. [Google Scholar] [CrossRef]
  61. Calderoni, L.; Bandini, S.; Maio, D. Privacy preservation in outsourced mobility traces through compact data structures. J. Inf. Secur. Appl. 2020, 55, 102630. [Google Scholar] [CrossRef]
  62. Téglásy, B.Z.; Katsikas, S. A Location-Based Global Authorization Method for Underwater Security. arXiv 2022, arXiv:2210.07666. [Google Scholar]
  63. Achim, M.V.; Văidean, V.L.; Borlea, S.N.; Florescu, D.R. The impact of the development of society on economic and financial crime. Case study for uropean union member states. Risks 2021, 9, 97. [Google Scholar] [CrossRef]
  64. Almeida, F.; Santos, J.D.; Monteiro, J.A. The Challenges and Opportunities in the Digitalization of Companies in a Post-COVID-19 World. IEEE Eng. Manag. Rev. 2020, 48, 97–103. [Google Scholar] [CrossRef]
  65. He, Y.; Aliyu, A.; Evans, M.; Luo, C. Health care cybersecurity challenges and solutions under the climate of COVID-19: Scoping review. J. Med. Internet Res. 2021, 23, e21747. [Google Scholar] [CrossRef] [PubMed]
  66. Arce, D.G. Malware and market share. J. Cybersecur. 2018, 4, tyy010. [Google Scholar] [CrossRef] [Green Version]
  67. Pool, J.; Akhlaghpour, S.; Fatehi, F. Health Data Privacy in the COVID-19 Pandemic Context: Discourses on HIPAA. Stud. Health Technol. Inform. 2021, 279, 70–77. [Google Scholar]
  68. Moumtzidis, I.; Kamariotou, M.; Kitsios, F. Digital Transformation Strategies Enabled by Internet of Things and Big Data Analytics: The Use-Case of Telecommunication Companies in Greece. Information 2022, 13, 196. [Google Scholar] [CrossRef]
  69. Kalfas, D.; Zagkas, D.; Dragozi, E.; Zagkas, T. Estimating value of the ecosystem services in the urban and peri-urban green of a town Florina-Greece, using the CVM. Int. J. Sustain. Dev. World Ecol. 2020, 27, 310–321. [Google Scholar] [CrossRef]
  70. Kalfas, D.; Chatzitheodoridis, F.; Loizou, E.; Melfou, K. Willingness to Pay for Urban and Suburban Green. Sustainability 2022, 14, 2332. [Google Scholar] [CrossRef]
  71. Kalogiannidis, S.; Kalfas, D.; Chatzitheodoridis, F. The Impact of Collaborative Communication on the Physical Distribution Service Quality of Soft Drinks: A Case Study of Beverage Manufacturing Companies in Greece. Beverages 2022, 8, 47. [Google Scholar] [CrossRef]
  72. Kalogiannidis, S.; Kalfas, D.; Chatzitheodoridis, F.; Olympia, P. Role of Crop-Protection Technologies in Sustainable Agricultural Productivity and Management. Land 2022, 11, 1680. [Google Scholar] [CrossRef]
  73. Kalogiannidis, S.; Kalfas, D.; Loizou, E.; Chatzitheodoridis, F. Forestry Bioeconomy Contribution on Socioeconomic Development: Evidence from Greece. Land 2022, 11, 2139. [Google Scholar] [CrossRef]
  74. UNDRR, ‘Making Critical Infrastructure Resilient: Ensuring Continuity of Service—Policy and Regulations in Europe and Central Asia. 2020. Available online: https://www.undrr.org/publication/making-critical-infrastructure-resilient-ensuring-continuity-service-policy-and (accessed on 22 December 2022).
  75. Prince, D. Cybersecurity: The Security and Protection Challenges of Our Digital World. Computer 2018, 51, 16–19. [Google Scholar] [CrossRef] [Green Version]
  76. Coletta, C.; Evans, L.; Heaphy, L.; Kitchin, R. Creating Smart Cities; Routledge: London, UK, 2018; p. 254. [Google Scholar]
  77. Gutzwiller, R.; Dykstra, J.; Payne, B. Gaps and opportunities in situational awareness for cybersecurity. Digit. Threat. Res. Pract. 2020, 1, 1–6. [Google Scholar] [CrossRef]
  78. Drozdova, E.A. Civil Liberties and Security in Cyberspace. Hoover Institution. 2013, pp. 240–250. Available online: https://www.hoover.org/sites/default/files/uploads/documents/0817999825_183.pdf (accessed on 20 December 2022).
  79. Coventry, L.; Branley, D. Cybersecurity in healthcare: A narrative review of trends, threats and ways forward. Maturitas 2018, 113, 48–52. [Google Scholar] [CrossRef]
  80. Ayres, N.; Maglaras, L.A. Cyberterrorism targeting the general public through social media. Secur. Commun. Netw. 2016, 9, 2864–2875. [Google Scholar] [CrossRef] [Green Version]
  81. Lacy, M.; Prince, D. Securitization and the global politics of cybersecurity. Glob. Discourse 2018, 8, 100–115. [Google Scholar] [CrossRef] [Green Version]
Figure 1. Maps of Europe and Greece as the study areas. (a) Europe, (b) Greece—study area.
Figure 1. Maps of Europe and Greece as the study areas. (a) Europe, (b) Greece—study area.
Applsci 13 02607 g001
Figure 2. Strategies to enhance civil protection through cyber security.
Figure 2. Strategies to enhance civil protection through cyber security.
Applsci 13 02607 g002
Table 1. Research questions and specific objectives of the study.
Table 1. Research questions and specific objectives of the study.
Research QuestionRationale (Specific Objectives)
What is the effect of cyber security technologies on civil protection?To establish the effect of cyber security technologies on civil protection.
What is the influence of cyber risk reduction practices on civil protection?To explore the influence of cyber risk reduction practices on civil protection.
What is the relationship between the government’ role in cyber security and civil protection?To determine the relationship between the government’s role in cyber security and civil protection.
What are the cyber risks or disasters that are associated with poor civil protection in different sectors (electricity, communications, etc.)?To find out the cyber risks or disasters associated with poor civil protection in different sectors (electricity, communications, etc.)?
What are the different operational models and current strategies for managing cyber risks in critical infrastructure?To establish the operational models and current strategies for managing cyber risks in critical infrastructure?
Source: Authors’ own work (2022).
Table 2. Strategic steps to avoid cybercrimes.
Table 2. Strategic steps to avoid cybercrimes.
Monitoring and alertsIt is crucial to have robust system monitoring in place to prevent malicious attackers from accessing and storing sensitive data on a peripheral device. This includes network monitoring and alerting settings to spot unusual behavior.
Risk management decision-makingThey may decide how assets and a constrained budget should be used by performing a risk assessment. The element in question will access technical hardware, software, and assign monetary risk value if it is degraded or infected by a virus.
Up-to-date technologyThe effective use of security technology and the required tools. Due to old computer firmware, shoddy security methods, and antiquated safety technologies, the corporation will continue to be exposed to hackers.
Security teamSensitive and confidential information should be immediately protected by well-trained professional personnel; the IT department should be watchful to know about frequent risks.
Knowledge is powerMaintaining thorough awareness of prospective risks and assaults is essential for preventing cybercrimes.
Table 3. Showing additional strategies to counter cyberattacks.
Table 3. Showing additional strategies to counter cyberattacks.
Mitigation StrategyRationale
Use critical infrastructure to help deter the execution of harmful malware and unauthorized apps.One of the finest security techniques is application whitelisting, which only permits a limited set of programs to execute while prohibiting all others, even dangerous malware.
Patch software such as Microsoft Office, Java, PDF players, or Flash, and Patch operating system vulnerabilities.Most attacks target operating systems and vulnerable applications. The amount of exploitable entry points that an attacker can use is decreased by ensuring these are effectively patched [57].
Game-based learningAttracts a wide range of users to learn about cybersecurity [58].
Based on user responsibilities, limit access to administrative functions to operating systems and apps.By limiting certain rights, malware may be stopped from operating or have less room to proliferate throughout the network.
Table 4. Participants’ demographic characteristics.
Table 4. Participants’ demographic characteristics.
CharacteristicFrequencyPercentage (%)
Gender
Male21762.9
Female12837.1
Age bracket in years
Below 30267.5
30–4018954.8
41–5011332.8
Above 50174.9
Designation
Employee17350.2
Director6719.4
Manager8624.9
Administrator195.5
Years spent in the IT sector
Below 56318.3
5–1019757.1
Above 10 years8524.6
Total345100
Source: Authors’ own work (2022).
Table 5. Opinions on the effect of cyber security technologies on civil protection in Greece.
Table 5. Opinions on the effect of cyber security technologies on civil protection in Greece.
AgreeDisagree
Behavioral analytics help to analyze user behavior on websites, mobile apps, systems, and networks in organizations74.4%25.6%
Platforms for behavioral analytics may be used by cybersecurity experts to identify possible threats and weaknesses.71.4%28.6%
Blockchain may be used by cybersecurity experts to protect devices or systems, develop industry-standard security procedures, and make it almost impossible for hackers to access databases.56.4%43.6%
Cybersecurity experts can react to and identify targeted assaults using extended detection and response (XDR), automatically validate and correlate warnings, and provide extensive analytics.13.5%86.5%
Organizations must embrace new cyber security emerging technologies to enhance their resilience to cyber disasters and crises66.2%33.8%
Source: Authors’ own work (2022).
Table 6. Opinions on the influence of cyber risk reduction practices on civil protection.
Table 6. Opinions on the influence of cyber risk reduction practices on civil protection.
AgreeDisagree
Cybersecurity reduction influences the performance of critical infrastructure such as power plants, electricity grids, communication networks, and cloud systems64.6%35.4%
Cybersecurity risk mitigation is possible through the utilization of security policies and processes to reduce the overall risk or impact of cybercrimes51.2%48.8%
Prevention, detection, and remediation attributes in cybersecurity help in disaster management80.3%19.7%
Proactive cybersecurity risk mitigation enhances disaster preparedness in organizations and in the general public53.5%46.5%
Implementing new cybersecurity technologies helps to mitigate the different threats to poor civil protection64.3%35.7%
Source: Authors’ own work (2022).
Table 7. Opinions on the government’s influence in the relationship between cyber security and civil protection.
Table 7. Opinions on the government’s influence in the relationship between cyber security and civil protection.
AgreeDisagree
Analysis of cybersecurity issues has continued to weaken due limited involvement of the government in addressing causes of cybercrime15.7%84.3%
Large portions of the Critical National Infrastructure in the majority of OECD nations are privately owned rather than being under direct government authority.53.5%46.5%
Numerous civilian systems are susceptible to cybersecurity flaws and assaults; therefore, a solely military strategy to cybersecurity defense has minimal utility.51.7%48.3%
Cybersecurity concerns that pose a significant long-term physical danger to the globe or to specific countries are likely to pale in comparison to other global hazards, in which information infrastructures play an essential but seemingly secondary role.35.6%64.4%
Source: Authors’ own work (2022).
Table 8. Cross-tabulation of aspects of cyber security technologies, cybercrime reduction, and government role in cyber security and civil protection.
Table 8. Cross-tabulation of aspects of cyber security technologies, cybercrime reduction, and government role in cyber security and civil protection.
Cyber Security TechnologiesCybercrime ReductionGovernment Role in Cyber SecurityCivil Protection
Cyber security technologies1
Cybercrime reduction0.548 **1
0.00
Government role in cyber security0.551 *0.649 *1
0.020.000
Civil protection (dep.)0.482 *0.631 *0.546 *1
0.000.000.000.00
** and * respectively indicate statistical significance at a 5% significance level.
Table 9. Model Summary.
Table 9. Model Summary.
ModelRR SquareAdjusted R SquareStd. Error of the Estimate
0.702 a0.6610.6590.37412
a Predictors: Cyber security technologies, cybercrime reduction, and government role in cyber security.
Table 10. ANOVA analysis.
Table 10. ANOVA analysis.
ModelSum of SquaresdfMean SquareFSig.
Regression36.040318.361352.4130.016
Residual30.1083420.027
Total66.148345
Dependent Variable: Civil protection; Predictors: Cyber security technologies, cybercrime reduction, and government role in cyber security.
Table 11. Regression coefficients.
Table 11. Regression coefficients.
ModelUnstandardized CoefficientsStandardized CoefficientsTSig.
BStd. ErrorBeta
(Constant)0.3180.136 2.4380.026
Cyber security technologies0.2810.0570.3973.7360.003
Cybercrime Reduction0.1860.0670.2133.1950.021
Government role in cyber security0.1920.0490.2823.5110.002
Dependent Variable: Civil protection. Predictors: Cyber security technologies, cybercrime reduction, and government role in cyber security. Source: Authors’ own work (2022).
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Kalogiannidis, S.; Paschalidou, M.; Kalfas, D.; Chatzitheodoridis, F. Relationship between Cyber Security and Civil Protection in the Greek Reality. Appl. Sci. 2023, 13, 2607. https://doi.org/10.3390/app13042607

AMA Style

Kalogiannidis S, Paschalidou M, Kalfas D, Chatzitheodoridis F. Relationship between Cyber Security and Civil Protection in the Greek Reality. Applied Sciences. 2023; 13(4):2607. https://doi.org/10.3390/app13042607

Chicago/Turabian Style

Kalogiannidis, Stavros, Maria Paschalidou, Dimitrios Kalfas, and Fotios Chatzitheodoridis. 2023. "Relationship between Cyber Security and Civil Protection in the Greek Reality" Applied Sciences 13, no. 4: 2607. https://doi.org/10.3390/app13042607

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop