scholarly journals Review on Confidentiality, Integrity and Availability in Information Security

2021 ◽  
Vol 8 (2) ◽  
pp. 34-42
Author(s):  
Kar Yee Chai ◽  
Mohamad Fadli Zolkipli

Information security is very significant needs to be secured due to people relying on networks and communication. Therefore, protecting information is a major challenge with the number of users increases rapidly in recent years. The aim of this article is to review Confidentiality, Integrity and Availability (CIA) in information security. This article focuses on the issues of information security and the requirements of information security. The articles, journals and conference papers are reviewed by researchers were published in 2016-2021. Security issues are analyzed in the recent methodologies. The result of the relationship between CIA in each information security requirement is at a moderate level. It is suggested cybersecurity risk awareness program for society is needed. Therefore, every user could get full advantages in networks and digital platforms.

2011 ◽  
Vol 1 (2) ◽  
pp. 10-17 ◽  
Author(s):  
Rossouw von Solms ◽  
Matthew Warren

Human security is often forgotten as a major information security factor. This paper explores the security issues that relate to human security and in particular the relationship to risk. The paper also uses case studies of real life security incidents to show the problems and issues that relate to a younger workforce and their lack of security awareness due to their own background and the use of social systems, such as Facebook. The paper also proposes a risk framework that can be used to understand human security issues.


Author(s):  
Nik Zulkarnaen Khidzir ◽  
Khairul Azhar Mat Daud ◽  
Ahmad Rasdan Ismail ◽  
Mohd. Shahfik Affendi Abd. Ghani ◽  
Mohd. Asrul Hery Ibrahim

Author(s):  
Paul J. Bolt ◽  
Sharyl N. Cross

Chapter 1 explores perspectives on world order, including power relationships and the rules that shape state behavior and perceptions of legitimacy. After outlining a brief history of the relationship between Russia and China that ranged from cooperation to military clashes, the chapter details Chinese and Russian perspectives on the contemporary international order as shaped by their histories and current political situation. Chinese and Russian views largely coincide on security issues, the desirability of a more multipolar order, and institutions that would enhance their standing in the world. While the Chinese–Russian partnership has accelerated considerably, particularly since the crisis in Ukraine in 2014, there are still some areas of competition that limit the extent of the relationship.


2021 ◽  
Vol 13 (11) ◽  
pp. 6494
Author(s):  
Grzegorz Baran ◽  
Aleksandra Berkowicz

The main idea of the paper is to combine modern research methods (as living labs that enable research in a real-life setting) with the new technological opportunities for entrepreneurship and innovation development (as digital platforms) to search for innovative solutions, while addressing the sustainable development problems. Thus, the paper aims to explain how real value for society is created within digital platform ecosystems and how they employ to this end novel solutions that better address existing social problems. Consequently, it proposes a conceptual framework to research and develop sustainable entrepreneurship and innovation with the use of digital platforms. This research study takes a synthesizing conceptual approach that seeks to integrate the existing knowledge drawn on two major streams of research: living labs as a methodology and digital platform ecosystems to enrich the theory of sustainable entrepreneurship and innovation development. The paper contributes to the body of knowledge by proposing a novel conceptual model of digital platform ecosystems as living labs for sustainable entrepreneurship and innovation. The model depicts digital platform ecosystems examined as living labs and the implicit processes that include platform users in problem-solving and value-creation in real-life settings. The novelty of the model stems from framing these processes that capture the relationship between individuals and opportunities as the foundations of entrepreneurship and the relationship between the problem space and the solution space, where the opportunities occur.


2021 ◽  
pp. 017084062110306
Author(s):  
Marc Steinberg

This article explores the automotive lineage and manufacturing origins of platforms. Challenging prevailing assumptions that the platform is a digital artefact, and platform capitalism a new era, this article traces crucial elements of platform capitalism to Toyotist automobile manufacture in order to rethink the relationship between technology and organization. Arguing that the very terminology and industry applications of the ‘platform’ emerge from the automobile industry over the course of the 20th century, this article cautions against the uncritical adoption of epochal paradigms, or assumptions that new technologies require new organizational forms. By parsing the platform into two types, the stack and the intermediary, this article demonstrates how the platform concept and data-driven production practice both develop out of the Toyota Production System in particular, and American and Japanese analyses of it. Toyotism, we show, is the unseen industrial and epistemological background against which the platform economy plays out. In making this case, this article highlights the crucial continuities between the data intensive production of companies like Uber and Amazon – emblematic of digital platform capitalism – and the organizational paradigms of the automobile industry. At a moment when the automobile returns to prominence amidst platforms such as Uber, Didi Chuxing, or Waymo, and as we find tech companies turning to automobile manufacturing, this automotive lineage of the platform offers a crucial reminder of the automotive origins of what we now call platform capitalism.


2022 ◽  
Vol 30 (3) ◽  
pp. 0-0

With the rapid development of information technology, information security has been gaining attention. The International Organization for Standardization (ISO) has issued international standards and technical reports related to information security, which are gradually being adopted by enterprises. This study analyzes the relationship between information security certification (ISO 27001) and corporate financial performance using data from Chinese publicly listed companies. The study focusses on the impact of corporate decisions such as whether to obtain certification, how long to hold certification, and whether to publicize information regarding certification. The results show that there is a positive correlation between ISO 27001 and financial performance. Moreover, the positive impact of ISO 27001 on financial performance gradually increases with time. In addition, choosing not to publicize ISO 27001 certification can negatively affect enterprise performance.


2020 ◽  
pp. 16-30
Author(s):  
Mukesh Soni ◽  
◽  
◽  
◽  
YashKumar Barot ◽  
...  

Health care information has great potential for improving the health care system and also providing fast and accurate outcomes for patients, predicting disease outbreaks, gaining valuable information for prediction in future, preventing such diseases, reducing healthcare costs, and improving overall health. In any case, deciding the genuine utilization of information while saving the patient's identity protection is an overwhelming task. Regardless of the amount of medical data it can help advance clinical science and it is essential to the accomplishment of all medicinal services associations, at the end information security is vital. To guarantee safe and solid information security and cloud-based conditions, It is critical to consider the constraints of existing arrangements and systems for the social insurance of information security and assurance. Here we talk about the security and privacy challenges of high-quality important data as it is used mainly by the healthcare structure and similar industry to examine how privacy and security issues occur when there is a large amount of healthcare information to protect from all possible threats. We will discuss ways that these can be addressed. The main focus will be on recently analyzed and optimized methods based on anonymity and encryption, and we will compare their strengths and limitations, and this chapter closes at last the privacy and security recommendations for best practices for privacy of preprocessing healthcare data.


Sign in / Sign up

Export Citation Format

Share Document