A Framework for ICT Security Policy Management

Author(s):  
Sitalakshmi Venkatraman

Organisations around the world are increasingly relying on the potential of information and communication technologies (ICTs) for their business operations as well as competitiveness. Huge amounts of money and time are invested on ICT infrastructure as there exists a high level of business dependency on ICT. Hence, protecting the ICT resources using effective security policies is of utmost importance for the sustenance of organisations. With the recent exponential rise in ICT security threats witnessed worldwide, governments and businesses are trying to successfully develop ICT security policies for their internal and external operations. While ICT security best practices are quite similar globally, ICT security policy management is very much localised and specific to different business scenarios and applications. Moreover, ICT security policies in an organization keep evolving from time to time and more recently changes take place at a much faster pace. This situation warrants a pragmatic framework for the development and management of ICT security policies in an organisation. Much research has focused on formulating frameworks for ICT management in general and there is a paucity of guidelines in literature for ICT security policy management, in particular. This chapter explores ICT security management issues faced in different environments and proposes an integrated framework for managing ICT security policies in an iterative manner. The framework provides the flexibility and adaptability for different organisations to follow the guidelines effectively as it emphasises on policy alignment with business objectives. Since the framework underpins the continuous improvement philosophy, it caters to ICT security policy reform and implementations for the future as well.

Author(s):  
Dalbir Singh

ICT Security Policy includes information security-related policies, guidelines and best practices that are enforced in the Malaysian public sector. These policies are priority areas that contain guidelines for implementing ICT infrastructure in the public sector. However, there is a significant gap between these policies and awareness towards computer security policy among government servants in the public sector. Therefore a study involving government servants in the Manpower Department, Ministry of Human Resources was carried out to identify the critical success factor of these policies. The study was conducted through quantitative and qualitative methods. A survey was conducted to measure the level of awareness among government servants in agencies against computer security policies. Flaw factors in computer security policy implementation were discussed to obtain strategies to ensure the successful implementation of computer security policies in an agency. The significant factors leading to a successful implementation of computer security policy at the governmental agencies were validated by experts. As a result, a guideline has been prepared to be applied as an improvement proposal to increase the awareness of government servants on ICT security policy in the agencies.


Author(s):  
Eric Luiijf

Advancements of information and communication technologies (ICT) cause infrastructure owners to augment current infrastructures with such ICT. The creation of more efficient and effective end-user services provides economical benefits and increases customer satisfaction. Concurrently, ICT advancements allow governmental and industrial sectors to develop complete new infrastructures and infrastructure services, the so called Next Generation Infrastructures (NGI). NGI will offer new services to society, end-users and the supply-chain of organisations and linked, dependent infrastructural services. For over fifty years, the introduction of new ICT-based services and infrastructures has been tightly coupled with failures in ICT-security. This chapter on NGI discusses the root causes of these security failures. Based on historical experiences, this chapter predicts threats and cyber security failures alike for the envisioned NGI such as smart (energy) grids, smart road transport infrastructure, smart cities, and e-health. This prediction will become reality unless fundamental changes in the approach to security of ICT-based and ICT-controlled infrastructures are taken.


2015 ◽  
pp. 528-556
Author(s):  
István Mezgár ◽  
Sonja Grabner-Kräuter

New information and communication technologies and their integration extend possibilities for high-level human collaboration. Various groups of people can come together according to their private or business interests forming a virtual community through social networks. However, in addition to the positive effects of this technical breakthrough there are dangerous potential side effects using these high-level networked systems; the sensitive personal or business data can be misused. Therefore, privacy has an increasingly important role in social networks and is becoming a significant area related to business ethics taking into consideration the close connection between trust and privacy. The goal of this chapter is to discuss the role and relationships between trust and privacy in mobile (business) social networks and to introduce the possible types of privacy threats and countermeasures in case of online social networks. A short summary on future trends in mobile social networks is also presented.


Author(s):  
Rolf H. Weber

The tremendous developments in information and communication technologies (ICTs) over the last 20 years have substantially changed communication practices across the world. The Internet and mobile phones help to open new horizons for connections between people, leading to a global network for the sharing of information and ideas. In this new environment, human rights need to have a place, and traditional notions related to mass media need to be adapted to the needs of civil society. Freedom of expression has become much more individualistic, with information exchanges no longer relying on the traditional intermediaries (mass media) but on the exchange of ideas on social networking and other platforms. Civil society participation in the information world requires the necessary infrastructure however. And since states have an obligation to see to it that human rights are realized in practice, this may mean the facilitation of private investments to improve the ICT infrastructure. In this context, ICT policies favoring human rights must encompass a right to development.


Author(s):  
Andrea Pozzali ◽  
Paolo Ferri

Developments in information and communication technologies have raised the issue of the intergenerational digital divide that can take place between “digital natives” and “digital immigrants”. Despite emphatic claims concerning how educational systems must take into account the specific characteristics of “digital natives”, sound empirical research on these topics is lacking, especially for Europe. This paper presents the results of research performed during the course of 2008, studying how university students in Italy use digital technologies. The research is based on a survey of 1086 undergraduate students at the University of Milan-Bicocca, complemented by focus groups and in-depth interviews. The results of our research show that, even if university students are familiar with digital technologies, the general possession of high level skills in accessing and using the Internet should not be taken for granted.


2011 ◽  
pp. 750-776
Author(s):  
Seraphin B. Calo ◽  
Clare-Marie Karat ◽  
John Karat ◽  
Jorge Lobo ◽  
Robert Craven ◽  
...  

The goal of policy-based security management is to enable military personnel to specify security requirements in terms of simple, intuitive goals. These goals are translated into the concrete system settings in a way that the system behaves in a consistent and desirable way. This technology minimizes the technical expertise required by military personnel and automates security management while allowing a high level control by the human in the loop. This chapter describes a framework for managing security policies, and an overview of two prototypes that simplify different aspects of policy management in the context of coalition operations.


2011 ◽  
pp. 56-65
Author(s):  
Pierre F. Tiako

Deficient information and communication technologies (ICT) infrastructure, lack of awareness on e-commerce issues, network payment and secure transaction services present enormous challenges to developing countries. For e-commerce to be a viable tool for trade in developing countries (DC), a “secure infrastructure” which makes possible the electronic exchange of financial transactions is a necessary prerequisite. There has been significant research on e-commerce security, although most of these studies have focused on developed countries. Less attention has been paid to underdeveloped countries that face different circumstances due to the above challenges. From technological perspectives, this work discusses important issues of e-commerce security for developing countries in regards to lack of fraud repression and justice in those countries.


Author(s):  
Pierre F. Tiako

Deficient information and communication technologies (ICT) infrastructure, lack of awareness on e-commerce issues, network payment and secure transaction services present enormous challenges to developing countries. For e-commerce to be a viable tool for trade in developing countries (DC), a “secure infrastructure” which makes possible the electronic exchange of financial transactions is a necessary prerequisite. There has been significant research on e-commerce security, although most of these studies have focused on developed countries. Less attention has been paid to underdeveloped countries that face different circumstances due to the above challenges. From technological perspectives, this work discusses important issues of e-commerce security for developing countries in regards to lack of fraud repression and justice in those countries.


Author(s):  
István Mezgár ◽  
Sonja Grabner-Kräuter

New information and communication technologies and their integration extend possibilities for high-level human collaboration. Various groups of people can come together according to their private or business interests forming a virtual community through social networks. However, in addition to the positive effects of this technical breakthrough there are dangerous potential side effects using these high-level networked systems; the sensitive personal or business data can be misused. Therefore, privacy has an increasingly important role in social networks and is becoming a significant area related to business ethics taking into consideration the close connection between trust and privacy. The goal of this chapter is to discuss the role and relationships between trust and privacy in mobile (business) social networks and to introduce the possible types of privacy threats and countermeasures in case of online social networks. A short summary on future trends in mobile social networks is also presented.


Author(s):  
Surender Kumar ◽  
Durgansh Sharma

The hasty development of information and communication technologies (ICTs) has overwhelmingly altered many aspects of life and societies all around the globe. High-quality information and communication technology (ICT) infrastructure is essential for developing countries to match the pace of economic growth. This can be achieved only with sophisticated infrastructure. Enormous competitive pressure on businesses across the world has made Information and Communication Technologies (ICTs) one of the main drivers of economic growth. This paper studies a select set of economic factors and their respective impacts on ICT development in five leading emerging economies known as BRICS (Brazil, Russia, India, China, and South Africa). The authors' findings demonstrate that in addition to deregulation, existing conditions (socioeconomic factors) must also be considered. They conclude by avowing that policy makers can more easily realize economic development via ICTs if they consider these conditions while cultivating their technology strategies.


Sign in / Sign up

Export Citation Format

Share Document