{"id":"https://openalex.org/W7117973509","doi":"https://doi.org/10.7717/peerj-cs.3337","title":"Cyber security challenges for software vendors through a fuzzy-TOPSIS approach","display_name":"Cyber security challenges for software vendors through a fuzzy-TOPSIS approach","publication_year":2026,"publication_date":"2026-01-02","ids":{"openalex":"https://openalex.org/W7117973509","doi":"https://doi.org/10.7717/peerj-cs.3337"},"language":"en","primary_location":{"id":"doi:10.7717/peerj-cs.3337","is_oa":true,"landing_page_url":"https://doi.org/10.7717/peerj-cs.3337","pdf_url":null,"source":{"id":"https://openalex.org/S4210178049","display_name":"PeerJ Computer Science","issn_l":"2376-5992","issn":["2376-5992"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320104","host_organization_name":"PeerJ, Inc.","host_organization_lineage":["https://openalex.org/P4310320104"],"host_organization_lineage_names":["PeerJ, Inc."],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"PeerJ Computer Science","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.7717/peerj-cs.3337","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5077724667","display_name":"Abdullah M. Alnajim","orcid":"https://orcid.org/0000-0003-3223-1105"},"institutions":[{"id":"https://openalex.org/I4210092650","display_name":"Buraydah Colleges","ror":"https://ror.org/00j0krs40","country_code":"SA","type":"education","lineage":["https://openalex.org/I4210092650"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Abdullah M. Alnajim","raw_affiliation_strings":["Department of Information Technology, College of Computer, Qassim University, Buraydah, Buraydah, Saudi Arabia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Information Technology, College of Computer, Qassim University, Buraydah, Buraydah, Saudi Arabia","institution_ids":["https://openalex.org/I4210092650"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064895609","display_name":"Abdul Wahid Khan","orcid":"https://orcid.org/0000-0001-9327-290X"},"institutions":[{"id":"https://openalex.org/I156216236","display_name":"Qassim University","ror":"https://ror.org/01wsfe280","country_code":"SA","type":"education","lineage":["https://openalex.org/I156216236"]},{"id":"https://openalex.org/I4210092650","display_name":"Buraydah Colleges","ror":"https://ror.org/00j0krs40","country_code":"SA","type":"education","lineage":["https://openalex.org/I4210092650"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Abdul Wahid Khan","raw_affiliation_strings":["Department of Computer Science, College of Engineering and Information Technology, Qassim University, Buraydah, Saudi Arabia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, College of Engineering and Information Technology, Qassim University, Buraydah, Saudi Arabia","institution_ids":["https://openalex.org/I4210092650","https://openalex.org/I156216236"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021338963","display_name":"Shah Zaib","orcid":null},"institutions":[{"id":"https://openalex.org/I4210154218","display_name":"University of Science and Technology Bannu","ror":"https://ror.org/04be2dn15","country_code":"PK","type":"education","lineage":["https://openalex.org/I4210154218"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Shah Zaib","raw_affiliation_strings":["Department of Computer Science, University of Science & Technology Bannu, KP, Pakistan"],"raw_orcid":"https://orcid.org/0000-0003-0443-2428","affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Science & Technology Bannu, KP, Pakistan","institution_ids":["https://openalex.org/I4210154218"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006210094","display_name":"Shabbab Ali Algamdi","orcid":"https://orcid.org/0000-0003-3435-6681"},"institutions":[{"id":"https://openalex.org/I142608572","display_name":"Prince Sattam Bin Abdulaziz University","ror":"https://ror.org/04jt46d36","country_code":"SA","type":"education","lineage":["https://openalex.org/I142608572"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Shabbab Algamdi","raw_affiliation_strings":["Department of Software Engineering, College of Computer Science and Engineering, Prince Sattam bin Abdulaziz University, Al Kharj, Saudi Arabia"],"raw_orcid":"https://orcid.org/0000-0003-3435-6681","affiliations":[{"raw_affiliation_string":"Department of Software Engineering, College of Computer Science and Engineering, Prince Sattam bin Abdulaziz University, Al Kharj, Saudi Arabia","institution_ids":["https://openalex.org/I142608572"]}]},{"author_position":"last","author":{"id":null,"display_name":"Faheem Khan","orcid":"https://orcid.org/0000-0001-6220-0225"},"institutions":[{"id":"https://openalex.org/I12832649","display_name":"Gachon University","ror":"https://ror.org/03ryywt80","country_code":"KR","type":"education","lineage":["https://openalex.org/I12832649"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Faheem Khan","raw_affiliation_strings":["Department of Computer Engineering, Gachon University, Seongnam-si, Seoul, South Korea"],"raw_orcid":"https://orcid.org/0000-0001-6220-0225","affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Gachon University, Seongnam-si, Seoul, South Korea","institution_ids":["https://openalex.org/I12832649"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5077724667"],"corresponding_institution_ids":["https://openalex.org/I4210092650"],"apc_list":{"value":1395,"currency":"USD","value_usd":1395},"apc_paid":{"value":1395,"currency":"USD","value_usd":1395},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.00701371,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"12","issue":null,"first_page":"e3337","last_page":"e3337"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.5095999836921692,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.5095999836921692,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13038","display_name":"Internet of Things and AI","score":0.024900000542402267,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13927","display_name":"Cyberloafing and Workplace Behavior","score":0.02070000022649765,"subfield":{"id":"https://openalex.org/subfields/3317","display_name":"Demography"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ambiguity","display_name":"Ambiguity","score":0.5620999932289124},{"id":"https://openalex.org/keywords/security-through-obscurity","display_name":"Security through obscurity","score":0.5192999839782715},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.5067999958992004},{"id":"https://openalex.org/keywords/order","display_name":"Order (exchange)","score":0.5041999816894531},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.4982999861240387},{"id":"https://openalex.org/keywords/work","display_name":"Work (physics)","score":0.4611999988555908},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.4514999985694885},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.43560001254081726},{"id":"https://openalex.org/keywords/automation","display_name":"Automation","score":0.4036000072956085},{"id":"https://openalex.org/keywords/obstacle","display_name":"Obstacle","score":0.39820000529289246}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7195000052452087},{"id":"https://openalex.org/C2780522230","wikidata":"https://www.wikidata.org/wiki/Q1140419","display_name":"Ambiguity","level":2,"score":0.5620999932289124},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5393999814987183},{"id":"https://openalex.org/C114869243","wikidata":"https://www.wikidata.org/wiki/Q133735","display_name":"Security through obscurity","level":5,"score":0.5192999839782715},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.5067999958992004},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.5041999816894531},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.4982999861240387},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.49160000681877136},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.4611999988555908},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.4514999985694885},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.43560001254081726},{"id":"https://openalex.org/C115901376","wikidata":"https://www.wikidata.org/wiki/Q184199","display_name":"Automation","level":2,"score":0.4036000072956085},{"id":"https://openalex.org/C2776650193","wikidata":"https://www.wikidata.org/wiki/Q264661","display_name":"Obstacle","level":2,"score":0.39820000529289246},{"id":"https://openalex.org/C195518309","wikidata":"https://www.wikidata.org/wiki/Q13424265","display_name":"Security testing","level":5,"score":0.36809998750686646},{"id":"https://openalex.org/C121017731","wikidata":"https://www.wikidata.org/wiki/Q11661","display_name":"Information technology","level":2,"score":0.35249999165534973},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.3474999964237213},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.33719998598098755},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.32359999418258667},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.3163999915122986},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.3000999987125397},{"id":"https://openalex.org/C51566761","wikidata":"https://www.wikidata.org/wiki/Q1235853","display_name":"TOPSIS","level":2,"score":0.299699991941452},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.29809999465942383},{"id":"https://openalex.org/C52420254","wikidata":"https://www.wikidata.org/wiki/Q7445028","display_name":"Security convergence","level":5,"score":0.290800005197525},{"id":"https://openalex.org/C110121322","wikidata":"https://www.wikidata.org/wiki/Q865811","display_name":"Distribution (mathematics)","level":2,"score":0.2890999913215637},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.2847999930381775},{"id":"https://openalex.org/C2778348673","wikidata":"https://www.wikidata.org/wiki/Q739302","display_name":"Production (economics)","level":2,"score":0.28200000524520874},{"id":"https://openalex.org/C13159133","wikidata":"https://www.wikidata.org/wiki/Q365674","display_name":"Security engineering","level":5,"score":0.2766000032424927},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.2669999897480011},{"id":"https://openalex.org/C2777986313","wikidata":"https://www.wikidata.org/wiki/Q1661989","display_name":"Industry 4.0","level":2,"score":0.26579999923706055},{"id":"https://openalex.org/C172862783","wikidata":"https://www.wikidata.org/wiki/Q5165888","display_name":"Control system security","level":5,"score":0.265500009059906},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.2623000144958496},{"id":"https://openalex.org/C83163435","wikidata":"https://www.wikidata.org/wiki/Q3954104","display_name":"Security management","level":2,"score":0.25119999051094055}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.7717/peerj-cs.3337","is_oa":true,"landing_page_url":"https://doi.org/10.7717/peerj-cs.3337","pdf_url":null,"source":{"id":"https://openalex.org/S4210178049","display_name":"PeerJ Computer Science","issn_l":"2376-5992","issn":["2376-5992"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320104","host_organization_name":"PeerJ, Inc.","host_organization_lineage":["https://openalex.org/P4310320104"],"host_organization_lineage_names":["PeerJ, Inc."],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"PeerJ Computer Science","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:ec3deb6709914e529fec70c7c55cc8a7","is_oa":true,"landing_page_url":"https://doaj.org/article/ec3deb6709914e529fec70c7c55cc8a7","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"PeerJ Computer Science, Vol 12, p e3337 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.7717/peerj-cs.3337","is_oa":true,"landing_page_url":"https://doi.org/10.7717/peerj-cs.3337","pdf_url":null,"source":{"id":"https://openalex.org/S4210178049","display_name":"PeerJ Computer Science","issn_l":"2376-5992","issn":["2376-5992"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320104","host_organization_name":"PeerJ, Inc.","host_organization_lineage":["https://openalex.org/P4310320104"],"host_organization_lineage_names":["PeerJ, Inc."],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"PeerJ Computer Science","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":69,"referenced_works":["https://openalex.org/W38708963","https://openalex.org/W1501321335","https://openalex.org/W1863670505","https://openalex.org/W1877420198","https://openalex.org/W1903961850","https://openalex.org/W1908212390","https://openalex.org/W1966741850","https://openalex.org/W1992803055","https://openalex.org/W2043792182","https://openalex.org/W2048759110","https://openalex.org/W2063236501","https://openalex.org/W2094870730","https://openalex.org/W2123978750","https://openalex.org/W2143280167","https://openalex.org/W2155243985","https://openalex.org/W2158894011","https://openalex.org/W2167786744","https://openalex.org/W2314111863","https://openalex.org/W2336324030","https://openalex.org/W2357724087","https://openalex.org/W2410120897","https://openalex.org/W2416671302","https://openalex.org/W2460747769","https://openalex.org/W2486979789","https://openalex.org/W2491381822","https://openalex.org/W2512538847","https://openalex.org/W2520418200","https://openalex.org/W2725577111","https://openalex.org/W2790750960","https://openalex.org/W2799439485","https://openalex.org/W2890236709","https://openalex.org/W2895569380","https://openalex.org/W2900103399","https://openalex.org/W2903168143","https://openalex.org/W2925250375","https://openalex.org/W2936932759","https://openalex.org/W2941644334","https://openalex.org/W2955561618","https://openalex.org/W2970263100","https://openalex.org/W3005902394","https://openalex.org/W3050309716","https://openalex.org/W3084058207","https://openalex.org/W3086992677","https://openalex.org/W3157727874","https://openalex.org/W3177310074","https://openalex.org/W4200224789","https://openalex.org/W4200471400","https://openalex.org/W4205648909","https://openalex.org/W4231725517","https://openalex.org/W4245723868","https://openalex.org/W4281915919","https://openalex.org/W4289521440","https://openalex.org/W4303856605","https://openalex.org/W4307548875","https://openalex.org/W4308995726","https://openalex.org/W4309873793","https://openalex.org/W4313244884","https://openalex.org/W4327952329","https://openalex.org/W4383553028","https://openalex.org/W4385740959","https://openalex.org/W4394575944","https://openalex.org/W4394603151","https://openalex.org/W4400823912","https://openalex.org/W4401070185","https://openalex.org/W4401276542","https://openalex.org/W4403313129","https://openalex.org/W4404757845","https://openalex.org/W4406975766","https://openalex.org/W6885111269"],"related_works":[],"abstract_inverted_index":{"Cyber":[0,52],"security":[1,53,94,122,131,147,186,220,287],"has":[2,243],"become":[3],"a":[4,55,77,106,125,227,238,303],"critical":[5],"part":[6],"of":[7,28,43,63,116,133,136,141,150,155,161,164,172,183,193,206,229,299],"computer":[8],"systems":[9],"and":[10,19,24,31,37,65,71,83,152,170,175,179,222,249,281,301,311],"recent":[11],"technological":[12,44],"developments":[13],"have":[14],"focused":[15],"on":[16,35,113,211],"making":[17],"production":[18],"distribution":[20],"processes":[21],"more":[22],"fluid":[23],"efficient.":[25],"The":[26,73,88,119,259],"introduction":[27],"Industry":[29],"4.0":[30],"its":[32],"significant":[33],"impact":[34],"life":[36],"the":[38,41,114,117,181,189,204,215,234,297],"economy":[39],"highlights":[40],"importance":[42,205],"progress.":[45],"However,":[46],"modern":[47],"technology":[48],"faces":[49],"several":[50],"challenges.":[51],"is":[54,76,302],"major":[56,92],"obstacle":[57],"to":[58,67,81,102,197,202,224,256,279,296,309],"software":[59,266,317],"companies\u2019":[60],"full":[61],"adoption":[62],"automation":[64],"connectivity":[66],"transform":[68],"production,":[69],"logistics,":[70],"distribution.":[72],"proposed":[74],"article":[75],"systematic":[78],"literature":[79],"review":[80],"identify":[82],"document":[84],"these":[85],"difficulties":[86],"systematically.":[87],"SLR":[89],"identified":[90,120],"13":[91],"cyber":[93,121,185],"threats,":[95],"which":[96],"are":[97],"less":[98],"than":[99],"or":[100],"equal":[101],"25":[103],"percent.":[104],"Through":[105],"questionnaire":[107],"exercise,":[108],"industry":[109],"experts":[110],"were":[111,219],"consulted":[112],"substance":[115],"report.":[118],"challenges":[123],"span":[124],"broad":[126],"spectrum,":[127],"encompassing":[128],"issues":[129,218,221,314],"like":[130],"issues/access":[132],"cyberattacks,":[134],"lack":[135,140,149,154,160,163,171],"right":[137],"knowledge,":[138],"framework,":[139],"technical":[142],"support,":[143],"disaster":[144],"issues,":[145,148,159],"cost":[146],"confidentiality":[151],"trust,":[153],"management,":[156],"unauthorized":[157],"access":[158,223],"resources,":[162],"metrics,":[165],"administrative":[166],"mistakes":[167],"during":[168],"development,":[169],"quality,":[173],"liability,":[174],"reliability.":[176],"We":[177],"prioritized":[178],"evaluated":[180],"severity":[182],"each":[184],"problem":[187],"using":[188],"Fuzzy-Technique":[190],"for":[191,265,306,318],"Order":[192],"Preference":[194],"by":[195],"Similarity":[196],"Ideal":[198],"Solution":[199],"(TOPSIS)":[200],"technique":[201,241],"highlight":[203],"our":[207,212],"work":[208,232,293],"further.":[209],"Based":[210],"recommended":[213],"methodology,":[214],"most":[216],"common":[217],"cyber-attacks,":[225],"with":[226,277,285],"score":[228],"0.768.":[230],"Our":[231],"incorporates":[233],"cutting-edge":[235],"Fuzzy-TOPSIS":[236],"method,":[237],"powerful":[239],"computational":[240],"that":[242],"proven":[244],"effective":[245],"in":[246,251,315],"handling":[247],"fuzziness":[248],"ambiguity":[250],"many":[252],"areas":[253],"when":[254],"applied":[255],"decision-making":[257],"problems.":[258],"study":[260],"should":[261],"provide":[262],"valuable":[263],"information":[264],"development":[267],"companies":[268,307],"facing":[269],"cybersecurity":[270,300,313],"threats.":[271],"In":[272],"addition,":[273],"it":[274],"provides":[275],"vendors":[276],"tools":[278],"prioritize":[280],"assess":[282],"risks":[283],"associated":[284],"different":[286],"priorities.":[288],"Considering":[289],"all":[290],"aspects,":[291],"this":[292],"contributes":[294],"significantly":[295],"topic":[298],"useful":[304],"tool":[305],"trying":[308],"understand":[310],"address":[312],"developing":[316],"fuzzy":[319],"logic":[320],"systems.":[321]},"counts_by_year":[],"updated_date":"2026-05-21T06:26:12.895304","created_date":"2026-01-02T00:00:00"}
