Figures
Explore figures and images from publications
Fig 1 - available via license: Creative Commons Attribution 4.0 International
Content may be subject to copyright.
Chart of the institutional cybersecurity framework. Source: https://www.cert.at/reports/report_ 2014_chap06/content.html

Chart of the institutional cybersecurity framework. Source: https://www.cert.at/reports/report_ 2014_chap06/content.html

Source publication
Article
Full-text available
By exploring the political strategies that seek to advance and implement a “culture of cybersecurity” in Austria, we argue that the regimes of digital safety and security (DS&S) that are emerging worldwide should not be merely understood as a political reaction to the risks brought about by digitalization. Rather, cybersecurity further constitutes...

Context in source publication

Context 1
... state actors in a revamped institutional framework to centralize cyber forces. To overcome the lack of an institutional structure with a clear distribution of responsibilities, as lamented in the preceding ICT strategy, the ACSS establishes a framework that builds on pre-existing agencies and sets up new centers and platforms. As visualized in Fig. 1, the ACSS distinguishes between three hierarchical levels of government with different tasks and responsibilities, ranging from the political to the strategic and operational level, and involves multiple actors. Whereas institutional makeup appears intelligible at the political and strategic level, it becomes rather messy at the ...

Citations

... Calderaro and Craig ( Calderaro and Craig, 2020 ) stated that the primary goal of law in this sector is to ensure that no organization or individual harms other societies, individuals, states, or organizations in any way. The objective is to provide a safe atmosphere for everyone while maintaining a good quality of service ( Haddad and Binder, 2019 ). The findings show that each of the seven nations supports CS legislation drafted by national governments. ...
Article
Full-text available
Cyber threats have risen as a result of the growing usage of the Internet. Organizations must have effective cybersecurity policies in place to respond to escalating cyber threats. Individual users and corporations are not the only ones who are affected by cyber-attacks; national security is also a serious concern. Different nations' cybersecurity rules make it simpler for cybercriminals to carry out damaging actions while making it tougher for governments to track them down. Hence, a comprehensive cybersecurity policy is needed to enable governments to take a proactive approach to all types of cyber threats. This study investigates cybersecurity regulations and attributes used in seven nations in an attempt to fill this research gap. This paper identified fourteen common cybersecurity attributes such as telecommunication, network, Cloud computing, online banking, E-commerce, identity theft, privacy, and smart grid. Some nations seemed to focus, based on the study of key available policies, on certain cybersecurity attributes more than others. For example, the USA has scored the highest in terms of online banking policy, but Canada has scored the highest in terms of E-commerce and spam policies. Identifying the common policies across several nations may assist academics and policymakers in developing cybersecurity policies. A survey of other nations' cybersecurity policies might be included in the future research.
... Most businesses nowadays place a high premium on security to safeguard their Information and Communication Technology (ICT) business environments from cyberattacks. Furthermore, due to financial and criminal objectives, many economic businesses and cultural/educational institutions are vulnerable to a variety of threats (e.g., viruses, worms, Trojan horses, and spyware), resulting in a tarnished company reputation, large financial losses, and the leakage of personal data belonging to users or consumers [3]. For all of these reasons, it has become vital for each organization to have certain security policies to safeguard their operations [4]. ...
Article
Full-text available
Cybersecurity is a critical issue that must be prioritized not just by enterprises of all kinds, but also by national security. To safeguard an organization’s cyberenvironments, information, and communication technologies, many enterprises are investing substantially in cybersecurity these days. One part of the cyberdefense mechanism is building an enterprises’ security policies library, for consistent implementation of security controls. Significant and common cybersecurity policies of various enterprises are compared and explored in this study to provide robust and comprehensive cybersecurity knowledge that can be used in various enterprises. Several significant common security policies were identified and discussed in this comprehensive study. This study identified 10 common cybersecurity policy aspects in five enterprises: healthcare, finance, education, aviation, and ecommerce. We aimed to build a strong infrastructure in each business, and investigate the security laws and policies that apply to all businesses in each sector. Furthermore, the findings of this study reveal that the importance of cybersecurity requirements differ across multiple organizations. The choice and applicability of cybersecurity policies are determined by the type of information under control and the security requirements of organizations in relation to these policies.
... Teknolojik gelişmelerin aracılık ettiği mobil cihazlar, bu cihazlar aracılığıyla kullanılan uygulamalar, bireylerin sürekli olarak izlenmesine olanak tanıyan güvenlik kameraları, son zamanlarda artan bir biçimde güvenlik aracı olarak kullanılan drone teknolojisi gibi araçlar, sadece bireyleri denetleme teknolojileri değil; aynı zamanda bireylerin gözetleniyor olduklarını bilmelerinin bir sonucu olarak da refleksif denetimin de bir parçasıdırlar. Dolayısıyla toplumsal koşulların teknolojikleşmesiyle beraber artan dijital toplum tasavvuru ve siber güvenlik kültürü, salgın gibi çeşitli tehditleri de kapsayacak biçimde güvenliğe ilişkin tüm girişimlerin ve refleksif eylem denetiminin dijitalleşmesine zemin hazırlamaktadır (Haddad & Binder, 2019). Bu bağlamda siber güvenlik kültürü, bir taraftan bireyi dışarıdan denetleyen teknolojik bir iktidar stratejisini; diğer yanda bunun bilincinde olan bireyin yine teknolojik araçlarla kendine yönelik bir eylem denetimini içeren yeni bir kontrol biçimine olanak tanımaktadır Buradan hareketle, refleksivitenin içeriğinin, iktidar ilişkilerinden bağımsız değerlendirilemeyeceği ifade edilebilir. ...
... Thus, where the incipient digital society is collectively reimagined, negotiated, and created. Therefore, online identity theft is an issue of major concern for online retailers of goods and services in these developing economy markets where the state of an emerging digital society and the sociotechnical relationships of checks and balances required to govern its emergence are in a constant state of transition (Haddad and Binder 2019). Though the work by Jordan et al. (2018) replicated some constructs used in this present study to measure the impact of fear of identity theft, perceived risk in online purchase intentions; their work was not narrowed to measure the mediating role of online security and privacy concern that becomes the focal lens of this study. ...
Chapter
Full-text available
This study measures the influence of fear of financial loss (FOFL), fear of reputational damage (FORD), with the mediating effect of online security and privacy concern (OSPCON) towards online purchase intentions in an emerging economy’s context. Data was conveniently collected from University students of four of the public higher institutions in Ghana. Out of the 201 questionnaires distributed, 179 were eligible for analysis. A Quantitative methodological approach was adopted which relied on the Partial Least Square approach to Structural Equation Modelling (PLS-SEM) for the statistical analysis. Seemingly, FOFL and FORD constructs were not seen to be a significant direct predictor of online purchase intention. However, the mediating effect of OSPCON for both FOFL and FORD towards online purchase intention in the Ghanaian context was found to be significant, hence the mediated-hypotheses were supported. Nonetheless, we have highlighted the need for additional and further research taking a cue from the study’s limitations. The study contributes to our knowledge of how online identity theft practices lead to the unwillingness of online customers to embark on online transactions in an emerging economy, given the rampant outburst of online transactions in the developed world. The originality of this study is in the fact that it focuses on an emerging economy, which is under-researched.
... This method analyzes threats in addition to developing secure data. We make sure to consider important factors such as valuable data collection, memory storage, retrieval and a well-organized high-level network source to establish an intelligent city [14]. ...
Article
Full-text available
Nowadays the use of information and communica-tion technology has been incorporated in a general way in the daily life of a nation allowing the optimization in its processes.However, with it comes serious risks and threats that can affect cyber security because of the vulnerability they show. In addition,there are several factors that contribute to the proliferation of criminal actions in cyber security, the profitability offered by its exploitation in economic, political or other terms, the ease and low cost of the tools used to carry out attacks and the ease of hidingthe attacker, make it possible for these activities to be carried out anonymously, from anywhere in the world and with impunity.Themain objective of the research is to analyze and design National Cybersecurity Strategies to counter attacks. The methodology ofthis research was conducted in an exploratory and descriptive manner. As a result of the research work, a design of National Cybersecurity Strategies was obtained after an in-depth analysisof the appropriate strategies and thus minimizing the different attacks that can be carried out. (PDF) Analysis of National Cybersecurity Strategies. Available from: https://www.researchgate.net/publication/348269147_Analysis_of_National_Cybersecurity_Strategies [accessed Jan 10 2022].
Chapter
This chapter builds on Ayse Ceyhan’s ‘technologization of security’ thesis to suggest alternative ways of harnessing technology for peacebuilding beyond physical security. We argue that in as much as technology is key to the various dimensions of security, its current application remains overly a ‘hard security’ issue (surveillance, biometrics and military intelligence). Yet, the emerging peace and security architecture is deeply rooted in human security facets that requires multidimensional approach. Application of technology to peace and security has also been found to generate new social challenges. For example, in politically charged ethnic societies, researchers have established a significant correlation between cell phone coverage and occurrence of violence. The concern of this chapter is therefore to explore ways of harnessing the ‘constructive’ attributes of technology for peace, at the same time define the ‘negative externalities’ resulting from ‘fusion of technology’ to the infrastructure of peace (I4P) within the fourth industrial revolution (4IR) environment.