Information Security for Legal Safety

Author(s):  
Andreas Mitrakas

The growing use of information technology in sensitive daily transactions highlights the significance of information security to protect information assets. Vulnerabilities associated with public and private transactions pose challenges that government, private organizations, and individuals are compelled to respond to by adopting appropriate protection measures. Information security responds to the need of transacting parties for confidentiality, integrity, and availability of resources (Pfleeger, 2000). Information security is required in transactions carried out among, businesses, public administrations, and citizens. An organizational response to information security threats includes setting up and implementing appropriate policy frameworks that are typically endorsed by agreement. Beyond organizational objectives lies an emerging legal framework instigated by the role of information security as a means to safeguard information assets that are socially significant. Organizations are often required to implement information security measures mandated by industry regulations or legislation, such as in electronic banking transactions. The scope of these legal and regulatory requirements is to mitigate potential risk that entails liabilities for shareholders, employees, customers, trading partners, or other third parties involved in a transaction. Information security and its subsequent regulation are equally important for public services. In e-government services made available to citizens and businesses, information security ensures e-government transactions. The remainder of this article presents an overview of the prevailing legal and policy issues that are currently associated with information security.

2008 ◽  
pp. 2422-2431
Author(s):  
Andreas Mitrakas

The growing use of information technology in sensitive daily transactions highlights the significance of information security to protect information assets. Vulnerabilities associated with public and private transactions pose challenges that government, private organizations, and individuals are compelled to respond to by adopting appropriate protection measures. Information security responds to the need of transacting parties for confidentiality, integrity, and availability of resources (Pfleeger, 2000). Information security is required in transactions carried out among, businesses, public administrations, and citizens. An organizational response to information security threats includes setting up and implementing appropriate policy frameworks that are typically endorsed by agreement. Beyond organizational objectives lies an emerging legal framework instigated by the role of information security as a means to safeguard information assets that are socially significant. Organizations are often required to implement information security measures mandated by industry regulations or legislation, such as in electronic banking transactions. The scope of these legal and regulatory requirements is to mitigate potential risk that entails liabilities for shareholders, employees, customers, trading partners, or other third parties involved in a transaction. Information security and its subsequent regulation are equally important for public services. In e-government services made available to citizens and businesses, information security ensures e-government transactions. The remainder of this article presents an overview of the prevailing legal and policy issues that are currently associated with information security.


Author(s):  
Jörg Uffen ◽  
Michael H. Breitner

Organizations are investing substantial resources in technical security measures that aim at preventively protecting their information assets. The way management – or information security executives – deals with potential security measures varies individually and depends on personality traits and cognitive factors. Based on the Theory of Planned Behavior, the authors examine the relationship between the personality traits of conscientiousness, neuroticism and openness with attitudes and intentions towards managing technical security measures. The highly relevant moderating role of compliance factors is also investigated. The hypothesized relationships are analyzed and validated using empirical data from a survey of 174 information security executives. Findings suggest that conscientiousness is important in determining the attitude towards the management of technical security measures. In addition, the findings indicate that when executives are confronted with information security standards or guidelines, the personality traits of conscientiousness and openness will have a stronger effect on attitude towards managing security measures than without moderators.


2015 ◽  
pp. 836-853
Author(s):  
Jörg Uffen ◽  
Michael H. Breitner

Organizations are investing substantial resources in technical security measures that aim at preventively protecting their information assets. The way management – or information security executives – deals with potential security measures varies individually and depends on personality traits and cognitive factors. Based on the Theory of Planned Behavior, the authors examine the relationship between the personality traits of conscientiousness, neuroticism and openness with attitudes and intentions towards managing technical security measures. The highly relevant moderating role of compliance factors is also investigated. The hypothesized relationships are analyzed and validated using empirical data from a survey of 174 information security executives. Findings suggest that conscientiousness is important in determining the attitude towards the management of technical security measures. In addition, the findings indicate that when executives are confronted with information security standards or guidelines, the personality traits of conscientiousness and openness will have a stronger effect on attitude towards managing security measures than without moderators.


Author(s):  
David Baxter Bakibinga

Witness protection is now firmly entrenched in the modern criminal justice systems especially in jurisdictions dealing with organized and violent crime. The decision by the government of The Commonwealth of The Bahamas to enact legislation in respect to procedural and non-procedural measures for protection of witnesses is commendable, given that violent and organized crime is rife in the country. This article highlights the basic tenets of witness protection and the legal framework, both at the international and national level. It also addresses the role of key duty bearers in the process of witness protection. Furthermore the procedural and non-procedural measures taken by law enforcement officers in The Bahamas are explored. And lastly, the challenges encountered in the implementation of the witness protection measures in The Bahamas are examined. This is intended to aid policy makers, advisers and those entrusted with decision making, like parliamentarians, to devise means and ways to eradicate and/or mitigate challenges faced in the implementation of witness protection measures in The Bahamas.


2021 ◽  
Vol 1 (2) ◽  
pp. 80-95
Author(s):  
N. P. Gribin

The article reveals the content of the destructive influence of Western countries on the communication regimes and information space of the friendly Central Asian states, which poses a threat to their national security and contradicts the national interests of the Russian Federation. The importance of joint efforts with the states of the Central Asian region, including those in the format of the SCO and CSTO regional organizations, to ensure information security and a positive impact on the communication regimes of this region is noted. Attention is drawn to the role of national mass media in the arsenal of tools for influencing the minds and psychology of the population of Central Asian countries and in this regard gives a description of Western information structures that exercise such influence, the mechanisms of their functioning and the way to neutralize their activities. The dynamism of the matter under study and its subjection to changes in the balance of power in the international arena are noted. The role of the state in ensuring information security and protecting citizens from distorted information and communication influence is analyzed separately. The paper suggests considerations regarding the organization of a systematic counteraction to the destructive actions of individual states in the information field of countries in Central Asia, in particular, it suggests the need to create a comprehensive system, together with the Russian Federation, to block and neutralize malicious information and propaganda materials, and also a proposal regarding the creation of a global communication order based on the formation of an international legal framework for rational civilized regulation of country communication regimes at the global and regional levels.


Author(s):  
Pilar González-Navarro ◽  
Rosario Zurriaga-Llorens ◽  
Adekunle Tosin Olateju ◽  
Lucía Llinares-Insa

1992 ◽  
Vol 3 (1) ◽  
pp. 63-72 ◽  
Author(s):  
Trevor D. Heaver

Shippers are seeking international gateways that can provide them with services consistent with “seamless logistics”. This places pressures on public and private organizations, such as customs and freight forwarders, to adopt competitive technologies and systems. Electronic data interchange and integrated logistics management practices enable significant improvements in border procedures. A comparison of developments in four countries reveals that strategic changes by customs will enable more efficient logistics services. However, customs and forwarders in the countries are progressing at different rates.


2018 ◽  
Vol 50 (9) ◽  
pp. 1213-1237 ◽  
Author(s):  
James W. Cortada

This essay discusses the interrelationship among administrative practices, use of information and computing technologies (ICTs) in public and private organizations, and the role of information. This provides a historical overview of trends in all three areas, arguing that they were entwined, largely in the post–World War II era. The essay suggests how information exists in organizations, posing historical research questions undertaken by historians and makes recommendations on themes and methods for future studies. It argues that the use of information is the fundamental subject most in need of research as it was the basis for administrative activities and for the use of ICTs.


Sign in / Sign up

Export Citation Format

Share Document