scholarly journals Parliamentary control of security information agency in terms of security culture: State and problems

2013 ◽  
Vol 47 (3) ◽  
pp. 475-492 ◽  
Author(s):  
Radivojevic Nenad
Author(s):  
Bilal AlSabbagh ◽  
Stewart Kowalski

This article discusses the design and specifications of a Socio-Technical Security Information and Event Management System (ST-SIEM). This newly-developed artifact addresses an important limitation identified in today incident response practice—the lack of sufficient context in actionable security information disseminated to constituent organizations. ST-SIEM tackles this limitation by considering the socio-technical aspect of information systems security. This concept is achieved by correlating the technical metrics of security warnings (which are generic in nature, and the sources of which are sometimes unknown) with predefined social security metrics (used for modeling the security culture of constituent organizations). ST-SIEM, accordingly, adapts the risk factor of the triggered security warning based on each constituent organization security culture. Moreover, the artifact features several socio-technical taxonomies with an impact factor to support organizations in classifying, reporting, and escalating actionable security information. The overall project uses design science research as a framework to develop the artifact.


2017 ◽  
Vol 4 (2) ◽  
pp. 8-21 ◽  
Author(s):  
Bilal AlSabbagh ◽  
Stewart Kowalski

This article discusses the design and specifications of a Socio-Technical Security Information and Event Management System (ST-SIEM). This newly-developed artifact addresses an important limitation identified in today incident response practice—the lack of sufficient context in actionable security information disseminated to constituent organizations. ST-SIEM tackles this limitation by considering the socio-technical aspect of information systems security. This concept is achieved by correlating the technical metrics of security warnings (which are generic in nature, and the sources of which are sometimes unknown) with predefined social security metrics (used for modeling the security culture of constituent organizations). ST-SIEM, accordingly, adapts the risk factor of the triggered security warning based on each constituent organization security culture. Moreover, the artifact features several socio-technical taxonomies with an impact factor to support organizations in classifying, reporting, and escalating actionable security information. The overall project uses design science research as a framework to develop the artifact.


Author(s):  
I. D. Rudinskiy ◽  
D. Ya. Okolot

The article discusses aspects of the formation of information security culture of college students. The relevance of the work is due to the increasing threats to the information security of the individual and society due to the rapid increase in the number of information services used. Based on this, one of the important problems of the development of the information society is the formation of a culture of information security of the individual as part of the general culture in its socio-technical aspect and as part of the professional culture of the individual. The study revealed the structural components of the phenomenon of information security culture, identified the reasons for the interest in the target group of students. It justifies the need for future mid-level specialists to form an additional universal competency that ensures the individual’s ability and willingness to recognize the need for certain information, to identify and evaluate the reliability and reliability of data sources. As a result of the study, recommendations were formulated on the basis of which a culture of information security for college students can be formed and developed and a decomposition of this process into enlarged stages is proposed. The proposals on the list of disciplines are formulated, within the framework of the study of which a culture of information security can develop. The authors believe that the recommendations developed will help future mid-level specialists to master the universal competency, consisting in the ability and willingness to recognize the need for certain information, to identify and evaluate the reliability and reliability of data sources, as well as to correctly access the necessary information and its further legitimate use, which ultimately forms a culture of information security.


Author(s):  
Manoj Kumar ◽  
Rohit Tanwar

In the computerized age as a result of the broad utilization of web, information covering up in advanced symbolism assumes a fundamental part to guarantee copyright assurance and power from pernicious assaults. Today the exponential development in web clients request secure information correspondence, for that it is required to send the information as encoded or shrouded shape. Numerous data framework security procedures are accessible.Information transmission needs security. Information covering up can be accomplished through numerous techniques. Distinctive information concealing procedures are talked about in this paper which incorporates watermarking, steganography, fingerprinting, cryptography and advanced mark.


2020 ◽  
Vol 2020 (10-3) ◽  
pp. 82-92
Author(s):  
Gekkaya Funda

The formation of external policy of any country aims at serving the state’s interests. For this matter, many countries seek their way through this by taking into account the potential prospects available to them. The fundamental subtleties and factors that influence a state’s choices of external policy include geographical location, history, security, culture, trade, political ideology, military might, et cetera. Countries often make external contacts based on some regulations and response to unfolding events. Thus, external policy to an extent pertains to the guiding principles outlined to be pursued through state values, decisions and actions taken by the states themselves and their attempt to develop, manage and control the external relations of national societies. In this regard, the Caucasian region has been an important factor in Turkey’s foreign policy. Since these states emerged in the early 1990s, energy has taken a center stage within the region, while Turkey remains a transit route to the world...


Author(s):  
Alessandro Pollini ◽  
Tiziana C. Callari ◽  
Alessandra Tedeschi ◽  
Daniele Ruscio ◽  
Luca Save ◽  
...  

AbstractComputer and Information Security (CIS) is usually approached adopting a technology-centric viewpoint, where the human components of sociotechnical systems are generally considered as their weakest part, with little consideration for the end users’ cognitive characteristics, needs and motivations. This paper presents a holistic/Human Factors (HF) approach, where the individual, organisational and technological factors are investigated in pilot healthcare organisations to show how HF vulnerabilities may impact on cybersecurity risks. An overview of current challenges in relation to cybersecurity is first provided, followed by the presentation of an integrated top–down and bottom–up methodology using qualitative and quantitative research methods to assess the level of maturity of the pilot organisations with respect to their capability to face and tackle cyber threats and attacks. This approach adopts a user-centred perspective, involving both the organisations’ management and employees, The results show that a better cyber-security culture does not always correspond with more rule compliant behaviour. In addition, conflicts among cybersecurity rules and procedures may trigger human vulnerabilities. In conclusion, the integration of traditional technical solutions with guidelines to enhance CIS systems by leveraging HF in cybersecurity may lead to the adoption of non-technical countermeasures (such as user awareness) for a comprehensive and holistic way to manage cyber security in organisations.


Sign in / Sign up

Export Citation Format

Share Document