Assessing the Effectiveness of Cybersecurity Measures in the United States Telecommunications Industry: A Comprehensive Analysis

Authors

  • Mark W. Twain University of California, USA
  • John L. Morrison University of California, USA
  • William. F. Scott University of Southern California

DOI:

https://doi.org/10.53819/81018102t4159

Abstract

This research study assessed the effectiveness of cybersecurity measures in the United States telecommunications industry through a comprehensive analysis. Descriptive survey design was employed to establish a theoretical foundation and draw insights from existing scholarly articles, industry reports, and relevant cybersecurity frameworks. The analysis focused on historical cyber threat data and incidents within the telecommunications sector to identify prevalent threats and vulnerabilities. The literature review provided valuable insights into the challenges faced by the industry and the evolving landscape of cybersecurity. Quantitative data was collected through surveys administered to telecommunication companies operating in the United States. The surveys covered various aspects of cybersecurity practices, protocols, and incidents. The data collected from the surveys was analyzed to evaluate the effectiveness of existing cybersecurity measures in mitigating cyber threats. Additionally, qualitative insights and perspectives were gathered through interviews with key stakeholders, including cybersecurity experts, telecommunication industry professionals, and regulatory authorities. The findings of this study contribute to a better understanding of the state of cybersecurity in the United States telecommunications industry. The literature-based approach allowed for a comprehensive assessment of the industry's cybersecurity posture based on existing knowledge and research. The research outcomes provide valuable insights for telecommunication companies, policymakers, and regulatory authorities. By addressing the identified gaps and weaknesses, policymakers and regulatory authorities can implement targeted interventions to enhance cybersecurity practices. Telecommunication companies can leverage the research findings to strengthen their cybersecurity protocols and protect critical infrastructure. The research study demonstrates the importance of continuous evaluation and improvement of cybersecurity measures in the telecommunications industry. It highlights the need for ongoing collaboration between industry stakeholders, policymakers, and regulatory bodies to address the evolving cyber threat landscape effectively.

Keywords: Cybersecurity, Measures, United States, Telecommunications Industry, Comprehensive Analysis.

Author Biographies

Mark W. Twain, University of California, USA

Communication Department

John L. Morrison , University of California, USA

Communication Department

William. F. Scott, University of Southern California

Annenberg School for Communication and Journalism

References

Council of Europe. (2020). Budapest Convention on Cybercrime.

Cybersecurity Ventures. (2019). Official Annual Cybercrime Report.

Depoy, J., Phelan, J., Sholander, P., Smith, B., Varnado, G. B., & Wyss, G. (2005, October). Risk assessment for physical and cyber-attacks on critical infrastructures. In MILCOM 2005-2005 IEEE Military Communications Conference (pp. 1961-1969). IEEE.

Frischlich, L., Boberg, S., & Quandt, T. (2019). Comment sections as targets of dark participation? Journalists’ evaluation and moderation of deviant user comments. Journalism Studies, 20(14), 2014-2033.

Kellerhals, B. (2018). Breaking down the Gates with Participatory Journalism: Leveraging User-Generated Content for Today's Journalistic Practices (Doctoral dissertation, Colorado State University).

Koniagina, M., Belotserkovich, D., Vorona-Slivinskaya, L., & Pronkin, N. (2023). Measures to Ensure Cybersecurity and Regulation of the Internet of Things in the Russian Federation: Effectiveness Assessment. Journal of Economic Issues, 57(1), 257-274.

Koniagina, M., Belotserkovich, D., Vorona-Slivinskaya, L., & Pronkin, N. (2023). Measures to Ensure Cybersecurity and Regulation of the Internet of Things in the Russian Federation: Effectiveness Assessment. Journal of Economic Issues, 57(1), 257-274.

Lawrence, R. G., Radcliffe, D., & Schmidt, T. R. (2018). Practicing engagement: Participatory journalism in the Web 2.0 era. Journalism Practice, 12(10), 1220-1240.

Mabweazara, H. M., & Mare, A. (2021). Participatory Journalism in Africa: Digital News Engagement and User Agency in the South. Routledge.

Marr, B. (2019). The Key Definitions of Artificial Intelligence (AI) That Explain Its Importance. Forbes.

Mihailidis, P., & Gamwell, A. (2020). Designing Engagement in Local News: Using FOIA Requests to Create Inclusive Participatory Journalism Practices. Journalism Practice, 1-20.

Ralston, P. A., Graham, J. H., & Hieb, J. L. (2007). Cyber security risk assessment for SCADA and DCS networks. ISA transactions, 46(4), 583-594.

Salaudeen, M. A. (2021). From Personal to Professional: Exploring the Influences on Journalists’ Evaluation of Citizen Journalism Credibility. Journalism Practice, 1-24.

Saridou, T., Panagiotidis, K., Tsipas, N., & Veglis, A. (2018). Semantic tools for participatory journalism. Journal of Media Critiques [JMC], 4(14).

Schlosser, N. J. (2020). Journalists between Hitler and Adenauer: From Inner Emigration to the Moral Reconstruction of West Germany. By Volker R. Berghahn. Princeton: Princeton University Press, 2019. Pp. vii+ 277. Cloth $45.00. ISBN 978-069117936. Central European History, 53(2), 485-486.

Shackelford, S. J., Proia, A. A., Martell, B., & Craig, A. N. (2015). Toward a global cybersecurity standard of care: Exploring the implications of the 2014 NIST cybersecurity framework on shaping reasonable national and international cybersecurity practices. Tex. Int'l LJ, 50, 305.

Slapničar, S., Vuko, T., Čular, M., & Drašček, M. (2022). Effectiveness of cybersecurity audit. International Journal of Accounting Information Systems, 44, 100548.

Symantec Corporation. (2019). Internet Security Threat Report.

User Type, Industry Verticals: Global Opportunity Analysis and Industry Forecast, 2020–2027.

Verizon. (2020). Data Breach Investigations Report.

Downloads

Published

2023-06-17 — Updated on 2023-06-18

Versions

How to Cite

Twain, M. W., Morrison , J. L., & Scott, W. F. (2023). Assessing the Effectiveness of Cybersecurity Measures in the United States Telecommunications Industry: A Comprehensive Analysis. Journal of Marketing and Communication, 6(1), 1–10. https://doi.org/10.53819/81018102t4159 (Original work published June 17, 2023)

Issue

Section

Articles