2016
DOI: 10.1080/23738871.2016.1243721
|View full text |Cite
|
Sign up to set email alerts
|

Cybersecurity, trustworthiness and resilient systems: guiding values for policy

Abstract: Cyberspace relies on information technologies to mediate relations between different people, across different communication networks and is reliant on the supporting technology. These interactions typically occur without physical proximity and those working depending on cybersystems must be able to trust the overall human-technical systems that support cyberspace. As such, detailed discussion of cybersecurity policy would be improved by including trust as a key value to help guide policy discussions. Moreover,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…The underpinning factor of how successful IoT enabled cyber-terrorism is, is how resilient the system is to such attacks [27,28]. By recognising that the IoT is a potential enabler for cyber-terrorism, we are part of the way to reducing the impact of such attacks.…”
Section: Ethics and Responsibilities For Iot Enabled Cyber-terrorismmentioning
confidence: 99%
“…The underpinning factor of how successful IoT enabled cyber-terrorism is, is how resilient the system is to such attacks [27,28]. By recognising that the IoT is a potential enabler for cyber-terrorism, we are part of the way to reducing the impact of such attacks.…”
Section: Ethics and Responsibilities For Iot Enabled Cyber-terrorismmentioning
confidence: 99%
“…The steep rise of digital activity in modern life has created the need for strong cyber resilience. One important aspect of developing such resilience is the creation of cybersecurity policies (CSPs) that are able to coordinate and reinforce the efforts of a range of stakeholders (Henschke and Ford 2016;Pawlak and Barmpaliou 2017;Tiirmaa-Klaar 2016). Guiding policymakers in the development of CSPs are cybersecurity frameworks (CSFs).…”
Section: Introductionmentioning
confidence: 99%