Explore chapters and articles related to this topic
Higher Education in Capacity and Capability Building for the Information Economy
Published in Gopal Singh Latwal, Sudhir Kumar Sharma, Prerna Mahajan, Piet Kommers, Role of ICT in Higher Education, 2020
Keith Sherringham, Bhuvan Unhelkar
The trends from Table 30.2, as well as other emerging business areas, form some of the many operational aspects of a business that are being automated as well as providing opportunities for revenue and market differentiators for educational institutions. A key priority is not just the development of the technology and ICT-centric offerings, but the wider business and societal including: Addressing the business integration and business adoption (including the processes, policies, procedures, governance, security, privacy, audit, and regulatory).Assisting with the frameworks and regulatory regimes that need to be developed and applied.Researching the adoption, integration, and societal impacts.Providing a diverse range of offerings in support of the emerging trends.Information assurance including access, quality, privacy, and security.
Systems Theory
Published in Vivek Kale, Enterprise Process Management Systems, 2018
Many systems face increasing security challenges due to threats from malicious adversaries ranging from hackers to terrorists. Information assurance, which is the activity of protecting data and its flow across communication networks, is a major concern of system developers and users. In a similar fashion, physical security is an important design criteria for many systems as well.
Cyber Defence and Countermeasures
Published in Stanislav Abaimov, Maurizio Martellini, Cyber Arms, 2020
Stanislav Abaimov, Maurizio Martellini
Information assurance15 is a multidisciplinary area of study and professional activity which aims to protect businesses by reducing risks associated with information and information systems by means of a comprehensive and systematic management of security countermeasures, which is driven by risk analysis and cost-effectiveness.
Self-Determination and Perceived Information Control in Cloud Storage Service
Published in Journal of Computer Information Systems, 2020
Yuan Li, Kuo-Chung Chang, Jingguo Wang
Generally, individuals have concerns about the privacy and security of their personal information in cloud storage service. This is because they are uncertain about the type of personal information that will be collected or used by the service providers.3 A common approach to enhance individuals’ perceived information control is the establishment of information assurance mechanisms such as privacy policies6,7 and privacy-preserving technologies.9 However, as Table 1 presents, there is a gap between information assurance and perceived information control (or subsequent information disclosure). This is because the conversion of assurance mechanisms (either institutional or technological) to individuals’ perceptions of information control was not adequately investigated. Moreover, some inconsistencies exist in prior literature. Particularly, the assumption that awareness of information assurance would change individuals’ perceptions about privacy and security is unwarranted23, as they may respond differently to the external stimuli.
Security challenges in the transition to 4G mobile systems in developing countries
Published in Cogent Engineering, 2023
Fanuel Melak Asmare, Lijaddis Getnet Ayalew
Aside from technological reasons, a lack of basic awareness, knowledge, and skills of cyber threats plays a significant role in developing countries’ poor cyber security (Kshetri, 2010). Careless online users are easy targets for cyberattacks. The fact that many developing countries lack cyber security experts exacerbates this problem. In (Serianu,), it is reported that Africa has less than 10,000 cyber security professionals, despite having a population of more than 1.3 billion people. According to ISACA (an independent association of information security professionals), as of mid-2018, sub-Saharan African cybersecurity professionals constituted only 4% of ISACA-accredited information assurance experts globally, totaling only 5700 (Nduati, 2018).
Visual displays for cyber network defense
Published in Ergonomics, 2020
Christen E. L. Sushereba, Kevin B. Bennett, Adam Bryant
Cyber network Defence (CND, also known as information assurance or information security), is a diverse set of activities with the goal of protecting computerised proprietary information, financial assets, and physical systems (electronically controlled). The frequency of cyber attacks, the diverse ways in which they are perpetrated, and the consequences of successful attacks all pose substantial challenges. For example, a recent study (International Business Machines Corporation 2018) estimated that there were close to 100,000 cyber attacks in 2017 with intentional malicious activity. The general need for effective CND has been referred to as “… one of the most serious economic and national security challenges we face as a nation.” (Obama 2009).