2021
DOI: 10.34190/ejbrm.19.2.2509
|View full text |Cite
|
Sign up to set email alerts
|

Left in the Dark: Obstacles to Studying and Performing Critical Infrastructure Protection

Abstract: This paper highlights major methodological obstacles to studying and performing critical infrastructure protection (CIP) in general and CIP governance in particular. The study simultaneously examines a research project on and practice in the context of Swedish CIP. The complex planning approach of interest is called Styrel, a Swedish acronym for Steering Electricity to prioritised power consumers. It aims to identify and prioritise power consumers of societal importance, collectively referred to as critical in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 33 publications
0
1
0
Order By: Relevance
“…In other studies, the development of security controls refers to standard security programs or enterprise architecture (EA) with complete security functions (ISO/IEC, 2013; Suter, 2007; NIST, 2018; Center for Internet Security, 2021). CII protection for several service providers results from developing EA (Baina et al , 2020; Erastus et al , 2020; Große et al , 2021; Ramtohul and Soyjaudah, 2016). Despite the variety of approaches for developing security control, the EA approach is more necessary for CII protection at the national level because EA accounts for threats, vulnerabilities, security principles and functions (Putro and Sensuse, 2021).…”
Section: Introductionmentioning
confidence: 99%
“…In other studies, the development of security controls refers to standard security programs or enterprise architecture (EA) with complete security functions (ISO/IEC, 2013; Suter, 2007; NIST, 2018; Center for Internet Security, 2021). CII protection for several service providers results from developing EA (Baina et al , 2020; Erastus et al , 2020; Große et al , 2021; Ramtohul and Soyjaudah, 2016). Despite the variety of approaches for developing security control, the EA approach is more necessary for CII protection at the national level because EA accounts for threats, vulnerabilities, security principles and functions (Putro and Sensuse, 2021).…”
Section: Introductionmentioning
confidence: 99%