Information Security as Digital Economy Critical Success Factor

Author(s):  
Ricardo de Sousa Correia

In an increasingly complex and competitive world, information is a valuable asset and a difference maker. It contributes to better government through supporting efficient business, assisting decision-making, mitigating risks, and adding economic value. This case study reviews Portuguese military information security requirements and its potential application on business company's crucial information protection. It's a military security policy, procedures, and measures approach to commercial environment. It's defined a security checklist to be applied by companies which want to achieve success. The explosive growth of information and communication technologies and their global dissemination and penetration have been a special impact on commercial activities, making them an attractive target to competitors and other agents. Cybersecurity is an organization's top priority. It's necessary to build an increasingly effective security policy in order to protect critical information. Keeping safe business competitive information advantages will be the key to success.

Author(s):  
A.V. Pecheniuk

The necessity of formation of an effective information security system of the enterprise is substantiated. It is emphasized that when designing an information policy, the firm must comply with the requirements of the current legislation, take into account the level of technical support, especially the regulation of employees' access to confidential information, etc. It is stated that the costs of organizing information security measures should be appropriate to its value. The article identifies major threats that could be breached by confidential information. The list of the main normative legal acts aimed at bringing to civil, administrative and criminal responsibility for illegal collection, disclosure and use of information constituting a trade secret. The main stages of building an information security policy are summarized, the most common types of information threats related to the use of modern computer technologies are described. The necessity of developing a domestic original accounting (management) program that could be used in the long term by the vast majority of Ukrainian enterprises is pointed out. There are three groups of tools that are applied in the theory and practice of information security of the enterprise (active, passive and combined), emphasizing the need for planning and continuous monitoring in real time of all important processes and conditions that affect data security. It is noted that even if the information security system is built taking into account all modern methods and means of protection, it does not guarantee one hundred percent protection of the information resources of the enterprise, but a well-designed information security policy allows to minimize the corresponding risks. Key words: information security, information policy, information security, confidential information, information threats, information and communication technologies, software.


Author(s):  
Pedro Fernandes da Anunciação ◽  
Vitor Dinis ◽  
Francisco Madeira Esteves

In an economy that tends to operate in real time, where companies reduce stocks and value the customization of products and services according to the needs of their customers, information systems and technologies assume a predominant role. Equipment maintenance proves to be critical in supplying markets and meeting consumer needs. Regarding the maintenance of equipment, most managers are faced with the technical indications of suppliers, serving as a reference for the respective interventions. However, these indications often do not contemplate the contingency of certain situations, excessive hours of operation, or temperatures higher than those indicated. Preventive maintenance assumes an important role in the maintenance area by allowing interventions that are more appropriate to the wear and tear of the equipment. The technological potential associated with the internet of things or analytics allows the generation of economic value by guaranteeing the adequate conditions of the equipment and by avoiding disruptions in supply to the markets.


2020 ◽  
Vol 1 (9) ◽  
pp. 170-181
Author(s):  
Sergiy Gnatyuk ◽  
Viktoriia Sydorenko ◽  
Yuliia Sotnichenko

The rapid development of information and communication technologies has increased the vulnerabilities of various networks, systems and objects as well as made it much more difficult to ensure their reliable protection and security. All these factors have led to the fact that the world's leading countries have begun to pay considerable attention to cybersecurity and critical information infrastructure protection. However, the protection of various types of information with restricted access (in particular, confidential information) at critical infrastructure objects remains unexplored. With this in mind, the paper analyzes the existing approaches of the world's leading countries to the confidential information protection at critical infrastructure. The analysis revealed that today there are no comprehensive, multifunctional methods of protecting confidential information at critical information infrastructure. In addition, the classification of critical information infrastructure objects according to information security requirements is developed. This classification by determining the type of processing information, possible access modes and criticality category, allows to ensure unity of approaches to protection of these objects belonging to different types, including information systems, automated control systems and information-telecommunication networks.


2014 ◽  
Vol 651-653 ◽  
pp. 1992-1999
Author(s):  
Wei Ming Tong ◽  
Jian Quan Liang ◽  
Xian Ji Jin ◽  
Lei Lu

This paper discusses the application of wireless sensor network in the smart grid and information security requirements, such as confidentiality, integrity, availability, and data freshness. We also analyze the physical attack and several typical network attacks of WSNs in smart grid. We elaborate the implementation process, characteristics and the hazards to the power grid of these attacks. In the paper, we propose a communications security policy of WSNs in smart grid and corresponding information security technologies, we analyze the characteristics and existing solutions of such information security technology, then we propose corresponding solutions of security technology applicable to smart grid. In the end, we summarize some issues in the realization of WSNs security technologies in smart grid and discuss the latest trends.


2020 ◽  
Author(s):  
Nathan Newton ◽  
Craig Anslow ◽  
Andreas Drechsler

© 27th European Conference on Information Systems - Information Systems for a Sharing Society, ECIS 2019. All rights reserved. The importance of information security in software development projects is long recognised, with many comprehensive standards and procedures in use to provide assurance of information security. The agile development paradigm conflicts with traditional security assurance by emphasising the delivery of functional requirements and a reduction in structured and linear development styles. Through a series of thirteen qualitative interviews, this study identifies practices that address this problem which have been successfully adopted by agile practitioners. The findings present four categories of practices - organisational, team, project, and technical - and twelve critical success factors that should be explicitly considered by practitioners to assure agile security. The critical success factors provide a foundation for practitioners to strategically identify and develop best practices to embed information security in agile development projects. The identified categories also highlight the importance of agile security practices centring around individuals and culture and contributes to the literature by providing a representation of agile security practices that encompasses a broad range of focal areas.


2017 ◽  
Vol 1 (2) ◽  
pp. 159-164
Author(s):  
Mark Nuijten

Abstract The registration of a medicinal product by EMA or FDA used to be the main driving critical success factor for the future sales of a new medicinal product. The current additional important criteria for reimbursement decisions are cost-effectiveness and budgetary impact, which are taken into consideration in order to make a value for money decision. In order to maximize the chances of obtaining reimbursement at a maximum price, it is very important to have a well thought through strategy at the early onset of the development program in order to proactively cope with the emerging reimbursement hurdles. This paper aims to provide a pricing, market access and reimbursement strategy, which is based on a strategic scan, sales forecast model, pricing model, and cost-effectiveness model. These models are interacted and linked with a discounted cash flow model in order to optimize the economic value of the company.


2018 ◽  
Vol 26 (2) ◽  
pp. 150-170 ◽  
Author(s):  
Cindy Zhiling Tu ◽  
Yufei Yuan ◽  
Norm Archer ◽  
Catherine E. Connelly

Purpose Effective information security management is a strategic issue for organizations to safeguard their information resources. Strategic value alignment is a proactive approach to manage value conflict in information security management. Applying a critical success factor (CSF) analysis approach, this paper aims to propose a CSF model based on a strategic alignment approach and test a model of the main factors that contributes to the success of information security management. Design/methodology/approach A theoretical model was proposed and empirically tested with data collected from a survey of managers who were involved in decision-making regarding their companies’ information security (N = 219). The research model was validated using partial least squares structural equation modeling approach. Findings Overall, the model was successful in capturing the main antecedents of information security management performance. The results suggest that with business alignment, top management support and organizational awareness of security risks and controls, effective information security controls can be developed, resulting in successful information security management. Originality/value Findings from this study provide several important contributions to both theory and practice. The theoretical model identifies and verifies key factors that impact the success of information security management at the organizational level from a strategic management perspective. It provides practical guidelines for organizations to make more effective information security management.


2020 ◽  
Author(s):  
Nathan Newton ◽  
Craig Anslow ◽  
Andreas Drechsler

© 27th European Conference on Information Systems - Information Systems for a Sharing Society, ECIS 2019. All rights reserved. The importance of information security in software development projects is long recognised, with many comprehensive standards and procedures in use to provide assurance of information security. The agile development paradigm conflicts with traditional security assurance by emphasising the delivery of functional requirements and a reduction in structured and linear development styles. Through a series of thirteen qualitative interviews, this study identifies practices that address this problem which have been successfully adopted by agile practitioners. The findings present four categories of practices - organisational, team, project, and technical - and twelve critical success factors that should be explicitly considered by practitioners to assure agile security. The critical success factors provide a foundation for practitioners to strategically identify and develop best practices to embed information security in agile development projects. The identified categories also highlight the importance of agile security practices centring around individuals and culture and contributes to the literature by providing a representation of agile security practices that encompasses a broad range of focal areas.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Kevin M. Dulle

Purpose The author offers a five-step “ERY method’ that expands the thinking around the core idea of a business” basic function and ideally translates it into an experience that is new and unique in the world. Design/methodology/approach Illustrates how experience designers use creative ideation as an effective method to help understand how to elevate an offering transaction to memorable customer experience. Findings The challenge for business is to avoid commoditization by producing engaging experiences that differentiate their offerings of services and goods. Originality/value Experience design has become a key skill for executives now that the competitive advantage and the economic value experiences create has become a critical success factor for corporations in many markets. This approach to ideation of experience design is unique.


Sign in / Sign up

Export Citation Format

Share Document