2009 International Conference on Availability, Reliability and Security 2009
DOI: 10.1109/ares.2009.127
|View full text |Cite
|
Sign up to set email alerts
|

An Inclusive Information Society Needs a Global Approach of Information Security

Abstract: The information economy and the information society heavily depend on information security. Developing an inclusive and reliable information society should avoid any infrastructure or security divides. To master information related risks and cyberthreats, and to bring effective information security solutions to the end-users, a global and interdisciplinary approach is required. This paper considers information security issues in a holistic way, putting the individual and the question of responsibility at the c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
6
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 0 publications
0
6
0
Order By: Relevance
“…These studies often aim to generate or test theory. Case study methods have mainly been used for studies of frameworks for cultivating (Dojkovski et al, 2010;Nemati and Church, 2009), understanding (Alfawaz et al, 2010;Harnesk and Lindström, 2011) or assessing information security culture (Ghernaouti-Hélie, 2009;Schlienger and Teufel, 2005), as well as investigating management challenges related to information security cultures (Dojkovski et al, 2007a;Gaunt, 2000). Table VIII shows that these studies belong to two types of research: descriptive or theory generating.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…These studies often aim to generate or test theory. Case study methods have mainly been used for studies of frameworks for cultivating (Dojkovski et al, 2010;Nemati and Church, 2009), understanding (Alfawaz et al, 2010;Harnesk and Lindström, 2011) or assessing information security culture (Ghernaouti-Hélie, 2009;Schlienger and Teufel, 2005), as well as investigating management challenges related to information security cultures (Dojkovski et al, 2007a;Gaunt, 2000). Table VIII shows that these studies belong to two types of research: descriptive or theory generating.…”
Section: Methodsmentioning
confidence: 99%
“…CISOs, however, have struggled with "a perceived lack of power, confusion about their role identity and their inability to engage effectively with employees", making it difficult to fulfil this task. The final topic, management challenges (Ashenden, 2008;Ghernaouti-Hélie, 2009;Dojkovski et al, 2007a;Gaunt, 2000;Johnsen et al, 2006), represents 8 per cent of all investigated papers. All of these studies have typically addressed the challenges that managers face when "managing individuals in an organization" (Ashenden, 2008) to create a way of working.…”
mentioning
confidence: 99%
“…The exact definition for cyber security is still actively debated in the research community. Some authors use cyber security interchangeably with information security (Astakhova, 2014;Ghernaouti-Helie, 2009). One of the definitions encountered defines cyber security as the protection and preservation of confidentiality, integrity and availability (CIA) of information, which is an asset, in the realm of cyberspace (IEC 27032/IEC 27032, 2012).…”
Section: Introductionmentioning
confidence: 99%
“…Research has shown the global information society and knowledge economy are constrained by the development and overall acceptance of an international cyber security framework (Ghernaouti-Hélie, 2009). The validity of such a framework or model requires a challenging multidimensional cyber security approach for everyone from individuals to organizations and states (Ghernaouti-Hélie, 2009).…”
mentioning
confidence: 99%
“…The validity of such a framework or model requires a challenging multidimensional cyber security approach for everyone from individuals to organizations and states (Ghernaouti-Hélie, 2009). Ghernaouti-Hélie (2009) emphasized that promoting a culture of cyber security contributes to building a safe and inclusive information society but currently most of efforts are focused on awareness which is appropriate and mandatory but not sufficient.…”
mentioning
confidence: 99%