Specifying a security policy: a case study

Author(s):  
F. Cuppens ◽  
C. Saurel
Keyword(s):  
2019 ◽  
Vol 23 (2) ◽  
pp. 465
Author(s):  
Max André Antonio Rodrigues ◽  
Daniela de Castro Melo

A segurança pública é um dos principais problemas sociais do Brasil e incide em todas as esferas da sociedade, inclusive nas Universidades. O objetivo desta pesquisa foi realizar um diagnóstico da segurança institucional na Universidade Federal do Triângulo Mineiro – UFTM com o intuito de desenvolver e implantar uma política de segurança na universidade. Trata-se de estudo de caso, com pesquisa bibliográfica, documental, entrevista e grupos focais. O diagnóstico evidenciou a insegurança silenciosa que a comunidade acadêmica da UFTM vive, com problemas estruturais e organizacionais.Os resultados mostraram a necessidade de desenvolver ações de intervenção relacionadas à segurança no entorno da universidade, implementação de câmeras de vigilância e de departamento de segurança institucional, termais vigilantes e melhorar o controle na entrada das unidades da universidade. Palavras-chave: Administração pública. Segurança universitária. Gestão de riscos. Segurança institucional.THE SILENT(IN) SECURITY IN UNIVERSITY CAMPS: study at Federal University of Triângulo MineiroAbstractPublic security is one of the main social problems in Brazil and affects all spheres of society, including universities. The objective of this research was to make a diagnosis of institutional security at the Federal University of Triângulo Mineiro -UFTM in order to develop and implement a security policy at the university. This is a case study, with bibliographic, documentary research, interview and focus groups. The diagnosis showed the silent insecurity that the UFTM academiccommunity lives with structural and organizational problems. The results showed the need to develop intervention actions related to security around the university, implementation of surveillance cameras and institutional security department, have more vigilantand improve control at the entrance of the university units.Keywords: Public administration. University security. Risk management. Institutional security.


2004 ◽  
Vol 5 (1) ◽  
pp. 67-87
Author(s):  
Jeong-Yong Kim

This article presents the model of 'business-track diplomacy' to test a state's utilization of economic engagement strategy as security policy. The model provides ways to think around security issues and alternative security options that go beyond the traditional military containment approach to security in international relations. As a case study, the article investigates Hyundai Group's Mountain Kumgang tourism with North Korea. In this case study, it demonstrates that not only the Kim Dae-Jung government's strong policy-making will of business-track diplomacy towards North Korea but also the Hyundai Group's business will and vulnerability of the North Korean economy played important roles in realizing the tour project and thus, enhanced inter-Korean economic cooperation.


2018 ◽  
Vol 26 (1) ◽  
pp. 91-108 ◽  
Author(s):  
Khaled A. Alshare ◽  
Peggy L. Lane ◽  
Michael R. Lane

Purpose The purpose of this case study is to examine the factors that impact higher education employees’ violations of information security policy by developing a research model based on grounded theories such as deterrence theory, neutralization theory and justice theory. Design/methodology/approach The research model was tested using 195 usable responses. After conducting model validation, the hypotheses were tested using multiple linear regression. Findings The results of the study revealed that procedural justice, distributive justice, severity and celerity of sanction, privacy, responsibility and organizational security culture were significant predictors of violations of information security measures. Only interactional justice was not significant. Research limitations/implications As with any exploratory case study, this research has limitations such as the self-reported information and the method of measuring the violation of information security measures. The method of measuring information security violations has been a challenge for researchers. Of course, the best method is to capture the actual behavior. Another limitation to this case study which might have affected the results is the significant number of faculty members in the respondent pool. The shared governance culture of faculty members on a US university campus might bias the results more than in a company environment. Caution should be applied when generalizing the results of this case study. Practical implications The findings validate past research and should encourage managers to ensure employees are involved with developing and implementing information security measures. Additionally, the information security measures should be applied consistently and in a timely manner. Past research has focused more on the certainty and severity of sanctions and not as much on the celerity or swiftness of applying sanctions. The results of this research indicate there is a need to be timely (swift) in applying sanctions. The importance of information security should be grounded in company culture. Employees should have a strong sense of treating company data as they would want their own data to be treated. Social implications Engaging employees in developing and implementing information security measures will reduce employees’ violations. Additionally, giving employees the assurance that all are given the same treatment when it comes to applying sanctions will reduce the violations. Originality/value Setting and enforcing in a timely manner a solid sanction system will help in preventing information security violations. Moreover, creating a culture that fosters information security will help in positively affecting the employees’ perceptions toward privacy and responsibility, which in turn, impacts information security violations. This case study applies some existing theories in the context of the US higher education environment. The results of this case study contributed to the extension of existing theories by including new factors, on one hand, and confirming previous findings, on the other hand.


2019 ◽  
pp. 260-300
Author(s):  
Lee Miles
Keyword(s):  

2008 ◽  
pp. 1727-1740
Author(s):  
Charla Griffy-Brown ◽  
Mark W.S. Chun

This chapter demonstrates the importance of a well-formulated and articulated information security policy by integrating best practices with a case analysis of a major Japanese multinational automotive manufacturer and the security lessons it learned in the implementation of its Web-based portal. The relationship between information security and business needs and the conflict that often results between the two are highlighted. The case also explores the complexities of balancing business expedience with long-term strategic technical architecture. The chapter provides insight and offers practical tools for effectively developing and implementing information security policies and procedures in contemporary business practice.


2018 ◽  
Vol 26 (1) ◽  
pp. 58-90 ◽  
Author(s):  
Rashmi Anand ◽  
Sanjay Medhavi ◽  
Vivek Soni ◽  
Charru Malhotra ◽  
D.K. Banwet

Purpose Digital India, the flagship programme of Government of India (GoI) originated from National e-Governance Project (NeGP) in the year 2014. The programme has important aspect of information security and implementation of IT policy which supports e-Governance in a focused approach of Mission Mode. In this context, there is a need to assess situation of the programme which covers a study of initiatives and actions taken by various actor involved and processes which are responsible for overall e-Governance. Therefore, the purpose of this case study is to develop a Situation-Actor-Process (SAP), Learning-Action-Performance (LAP) based inquiry model to synthesize situation of information security governance, IT policy and overall e-Governance. Design/methodology/approach In this case study both systematic inquiry and matrices based SAP-LAP models are developed. Actors are classified who are found responsible and engaged in IT policy framing, infrastructure development and also in e-Governance implementation. Based on a synthesis of SAP components, various LAP elements were then synthesized then which further led to learning from the case study. Suitable actions and performance have also been highlighted, followed by a statement of the impact of the efficacy i.e. transformation of information security, policy and e-Governance on the Digital India programme. Findings On developing the SAP-LAP framework, it was found that actors like the Ministry of Electronics and Information Technology of the Govt. of India secures a higher rank in implementing various initiatives and central sector schemes to accelerate the agenda of e-Governance. Actions of other preferred actors include more investments in IT infrastructure, policy development and a mechanism to address cyber security threats for effective implementation of e-Governance. It was found that actors should be pro-active on enhancing technical skills, capacity building and imparting education related to ICT applications and e-Governance. Decision making should be based on the sustainable management practices of e-Governance projects implementation to manage change, policy making and the governmental process of the Indian administration and also to achieve Sustainable Development Goals by the Indian economy. Research limitations/implications The SAP-LAP synthesis is used to develop the case study. However, few other qualitative and quantitative multi criteria decision making approaches could also be explored for the development of IT security based e-Governance framework in the Indian context. Practical implications The synthesis of SAP leads to LAP components which can bridge the gaps between information security, IT policy governance and e-Governance process. Based on the learning from the Situation, it is said that the case study can provide decision making support and has impact on the e-Governance process i.e. may enhance awareness about e-services available to the general public. Such work is required to assess the transparency and accountability on the Government. Social implications Learning based on the SAP-LAP framework could provide decision making support to the administrators, policy makers and IT sector stakeholders. Thus, the case study would further help in addressing the research gaps, accelerating e-Governance initiatives and in capturing cyber threats. Originality/value The SAP-LAP model is found as an intuitive approach to analyze the present status of information security governance, IT policy and e-Governance in India in a single unitary model.


Sign in / Sign up

Export Citation Format

Share Document