Understanding IT Security Risks

Author(s):  
Ron Lepofsky
Keyword(s):  
Author(s):  
Tridib Bandyopadhyay

Managers often decide to integrate supply chains of collaborating firms. Whether such decisions are for competitive posture, cost saving or operational efficiencies, it is important to understand that supply chains integrate not only the flow of goods but also the information processes and assets and more often than not, the IT networks of the firms. Thus two developments occur. First, IT security losses of one firm collocate at the other firm's servers as information assets like demand forecasts are shared. Second, the Intranets of both firms get connected with the help of VPN or similar technologies, making it possible that a breach can travel from one firm to the other. This in turn makes IT security risks of SC firms strategically interdependent. This chapter analyzes such interdependent IT security risks and provides insights for SC and IT managers who are poised to collaborate with other downstream or upstream partner firms.


Author(s):  
Tridib Bandyopadhyay

Managers often decide to integrate supply chains of collaborating firms. Whether such decisions are for competitive posture, cost saving or operational efficiencies, it is important to understand that supply chains integrate not only the flow of goods but also the information processes and assets and more often than not, the IT networks of the firms. Thus two developments occur. First, IT security losses of one firm collocate at the other firm's servers as information assets like demand forecasts are shared. Second, the Intranets of both firms get connected with the help of VPN or similar technologies, making it possible that a breach can travel from one firm to the other. This in turn makes IT security risks of SC firms strategically interdependent. This chapter analyzes such interdependent IT security risks and provides insights for SC and IT managers who are poised to collaborate with other downstream or upstream partner firms.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Sebastian Weydner-Volkmann ◽  
Linus Feiten

Purpose The purpose of this paper is to defend the notion of “trust in technology” against the philosophical view that this concept is misled and unsuitable for ethical evaluation. In contrast, it is shown that “trustworthy technology” addresses a critical societal need in the digital age as it is inclusive of IT-security risks not only from a technical but also from a public layperson perspective. Design/methodology/approach From an interdisciplinary perspective between philosophy andIT-security, the authors discuss a potential instantiation of a “trustworthy information and communication technology (ICT)”: a solution for privacy respecting video surveillance. Here, strong data protection measures address grave concerns such as the threat of bulk biometric tracking of citizens. In a logical argument, however, the authors show that this technical notion of “trust” needs to be complemented by interlocking trust relations to justify public trust. Findings Based on this argument, the authors demonstrate that the philosophical position considering “trust in technology” to denote either “reliability” or “interpersonal trust” is too limited as it fails to address critical aspects of IT-security. In a broader, socio-technical sense, however, it is shown that several distinct accounts of trust – technical, interpersonal and institutional – should meaningfully interlock, to address concerns with ICTs. Originality/value This conceptual study demonstrates the potential of “trust in technology” for a more comprehensive evaluation of ICTs within the context of operation. Furthermore, it adds to the discussion of trust in IT-security by highlighting the layperson’s challenge of judging a technology’s trustworthiness. Vice versa, it contributes to Ethics of Technology by highlighting crucial IT-security needs.


2013 ◽  
pp. 27-84 ◽  
Author(s):  
Tobias Ackermann
Keyword(s):  

Author(s):  
Bongani Ngwenya ◽  
Theuns Pelser

Information Technology (IT) expansion exposes organisations in developing countries to IT security risks. Zimbabwe’s tertiary education institutions (TEIs) are not spared. Every year, cyber-attacks increase and become more sophisticated, resulting in losses of personal and financial data for individuals, organisations and governments. As the world is interconnected, small and big organisations share the same internet platform. Therefore, IT security risks that affect one, affect all. When IT users are unaware of the risks and uninformed of ways to protect their IT systems, they remain vulnerable. Like other organisations in Zimbabwe, TEIs are vulnerable to cyber-attacks. The study that directed this article employed a quantitative methodological approach in the collection of the data and its analysis. A sample of 261 respondents was selected from the population of IT users in TEIs in Bulawayo. The results indicated that IT security awareness of IT users in TEIs in Bulawayo is low. This is evidenced by the low IT drivers’ contribution towards building IT users’ security awareness, and inadequate implementation and utilisation of IT security awareness tools. The prevailing phenomenon exposes TEIs in Bulawayo to a high risk of cyber-attacks. The results indicated a positive and significant correlation between IT security drivers’ contribution and IT security awareness tools utilisation in TEIs in Bulawayo. The implication is that an increase in IT security drivers’ contribution and IT security awareness tools utilisation will lead to increased IT security awareness. The study recommends that IT drivers double their contribution towards building IT security awareness through adequate implementation and utilisation of IT security awareness tools. This will safeguard the information that tertiary education institutions generate.


2020 ◽  
Vol 30 (3) ◽  
pp. 589-605 ◽  
Author(s):  
Laura Bitomsky ◽  
Olga Bürger ◽  
Björn Häckel ◽  
Jannick Töppel

Sign in / Sign up

Export Citation Format

Share Document