Challenges in Managing Information Security in the New Millennium

Author(s):  
Gurpreet Dhillon

In the past decade two developments have brought information security management issues to the fore. First has been the increased dependence of organizations on information and communication technologies, not only for key operational purposes but also for gaining strategic advantage. Second, abetted by information and communication technologies, the whole business model for many organizations has been transformed. Whereas in the past companies could rely on confining themselves to a particular geographical area to conduct their business. Today companies are increasingly becoming location independent and are finding themselves to be strategically disadvantaged if they are confined to a particular place. The consequence of advances in information technologies and the changing boundaries of the firm have brought the importance of data and information to the fore. This is because it is information that helps companies realize their objectives and helps managers to take adequate decisions. In the business model of the past, data and information to a large extend was confined to a particular location and it was relatively easy to protect it from falling in the hands of those who should not have it (i.e. maintain confidentiality). Because information was usually processed in a central location, it was also possible to ensure, with a relative degree of certainty, that it’s content and form did not change (i.e. maintain integrity) and ensure that it was readily accessible to authorized personnel (i.e. maintain availability). In fact maintaining confidentiality, integrity and availability were the main tenants for managing security. Today because the nature of the organization and scope of information processing has evolved, managing information security is not just restricted to maintaining confidentiality, integrity and availability.

2020 ◽  
Author(s):  
N. Romashkina ◽  
◽  
A. Markov ◽  
D. Stefanovich ◽  
◽  
...  

The monograph is devoted to topical issues of international security and strategic stability in the context of accelerated development of information and communication technologies. It justifies the importance of ensuring international information security. The monograph examines the possibility of establishing an ITarms control regime under the UN auspices. Different aspects of regulation of software security systems and of the use of supercomputers in the context of the international information security are examined. The impact of information and communication technologies on strategic stability is analyzed. This monograph is addressed to specialists in the field of information and communication technologies and international security, university lecturers, students and graduate students of universities, as well as a wide range of readers.


Author(s):  
Hristo Terziev

Internet of Things is a new world for connecting object space in the real world with virtual space in a computer environment. To build IoT as an effective service platform, end users need to trust the system. With the growing quantity of information and communication technologies, the need to ensure information security and improve data security is increasing. One of the potential solutions for this are steganographic methods. Steganography based on the least significant bit (LSB) is a popular and widely used method in the spatial domain.


Episteme ◽  
2009 ◽  
Vol 6 (1) ◽  
pp. 25-37 ◽  
Author(s):  
Luciano Floridi

ABSTRACTThe paper develops some of the conclusions, reached in Floridi (2007), concerning the future developments of Information and Communication Technologies (ICTs) and their impact on our lives. The two main theses supported in that article were that, as the information society develops, the threshold between online and offline is becoming increasingly blurred, and that once there won't be any significant difference, we shall gradually re-conceptualise ourselves not as cyborgs but rather as inforgs, i.e. socially connected, informational organisms. In this paper, I look at the development of the so-called Semantic Web and Web 2.0 from this perspective and try to forecast their future. Regarding the Semantic Web, I argue that it is a clear and well-defined project, which, despite some authoritative views to the contrary, is not a promising reality and will probably fail in the same way AI has failed in the past. Regarding Web 2.0, I argue that, although it is a rather ill-defined project, which lacks a clear explanation of its nature and scope, it does have the potentiality of becoming a success (and indeed it is already, as part of the new phenomenon of Cloud Computing) because it leverages the only semantic engines available so far in nature, us. I conclude by suggesting what other changes might be expected in the future of our digital environment.


2021 ◽  
Vol 4 (4) ◽  
pp. 41-46
Author(s):  
Ra’no Parpieva ◽  
◽  
Nafisa Norboyeva ◽  
Adiba Turayeva

This article will serve to select the system required for the effective use of information and communication technologies in the banking system and the impact of national payment systems in the banking sector on modern society, the effective use of new modern information technologies in the system.Study of foreign experience to select information and communication technologies that should be used in modern banks with information and communication technologies in the banking system, which have been used before.


2021 ◽  
Author(s):  
Larisa Gagarina ◽  
Grigoriy Kuznecov ◽  
Evgeniy Portnov ◽  
Anna Doronina

The textbook examines the main milestones in the history of the development of information technologies, computing and computer technology abroad and in Russia. Special attention is paid to the methodology of scientific research in the field of infocommunications. The current sections of the development of telecommunications technologies in the field of multimedia networks and network operating systems are presented. In order to develop practical skills, a laboratory workshop is given. Meets the requirements of the federal state educational standards of higher education of the latest generation. For senior students of technical specialties, postgraduates, researchers, teachers of higher educational institutions, students of advanced training institutes.


Author(s):  
Raphael Amit ◽  
Christoph Zott

The rapidly changing economic landscape, coupled with transformational advances in information and communication technologies, presents many challenges to managers of large and small enterprises alike. They need to adopt a holistic approach to continuously renew and innovate their organizations’ capabilities, their product and service mix, their product-market strategies, their activity systems, and more. In response to such challenges, two perspectives have emerged in the strategic management literature in the last two decades: the dynamic capabilities paradigm and the business model perspective. With few exceptions, these viewpoints have been kept separate. In this chapter, we explore the rich links between these two perspectives and suggest that business model design, when viewed through a process lens, is in fact a dynamic capability. Our contribution is to elaborate on the mechanisms of this capability.


Author(s):  
Gerald F. Davis ◽  
Eun Woo Kim

Organizations are increasingly subject to political demands from outside actors and their own members. Information and communication technologies (ICTs) are enabling a flourishing of grassroots social innovations and demands for justice that challenge traditional top-down theories of change. Over the past twenty years, scholars have found that social movement theory provides a useful approach to understanding movements within organizations, movements that target organizations, and movements that create organizations and industries. We review this recent work and propose an account that can help guide future research on the increasingly prevalent tide of politicallyoriented movements within organizations. We conclude that this is an especially promising domain for future research aimed at informing practice.


Author(s):  
José Manuel Gaivéo

Healthcare activities and all that are related with it are conducted by people. This single fact has brought up many precautions about patients and about information related with their health. Using information and communication technologies to support this kind of information requires particular attention about what happens, namely about who can use it and for what it can be used. This chapter intends to identify the vulnerabilities that could be explored, using an international security standard to support a proactive attitude in face of potential threats that explore the identified vulnerabilities, damaging organizational information assets. Another intention is the establishment of a basis of references in information security to define a level of risk classification to build a referential to the potential that a given threat has to exploit the vulnerabilities of an asset, preventing damages to personal and organizational property, including information, and also activity continuity.


Author(s):  
Elif Yucebas

The speed of transformation and development in information and communication technologies is an important fact triggering the restructuring process of public administration. The developing countries have become integrated into this process through public administration reform methods presented by international institutions. Transfer of information and communication technologies have become important for modernizing public administration organizations of developing countries and adapting them to the global system. In multilevel governance, use and implementation of the information technologies enabling network structuring between institutions have a particular importance. In this sense, the purpose of this study is to present the process followed by Turkey for adapting information and communication technologies to public administration organization and provision of public services in the frame of a multilevel governance approach.


Sign in / Sign up

Export Citation Format

Share Document