Skip to main content
Top

2024 | OriginalPaper | Chapter

7. Sichere Digitalwirtschaft

Cyber-Sicherheit, mehr als nur Technik

Author : Tom F. Hofmann

Published in: Digitalwirtschaft

Publisher: Springer Fachmedien Wiesbaden

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Zusammenfassung

Cybersicherheit ist ein elementarer Bestandteil jeder Organisation. Trotz dieser Feststellung sehen wir seit Jahren einen Anstieg der Vorfälle. Technik allein scheint nicht die Lösung zu sein, die Herausforderungen im Aufbau und Betrieb von Cybersicherheit sind sehr viel komplexer. Dieses Kapitel adressiert die Grundlagen des Aufbaus einer gesamtheitlichen Cybersicherheit, darunter die richtige Definition der CISO-Rolle, den Faktor Mensch in der Cybersicherheit, sowie alternative Lösungswege und -ansätze für Organisationen. Hierzu verknüpfe ich Organisationsdesign, Sozialwissenschaft und Human-Centered-Design und liefert den Lesenden konkrete Beispiele und Vorlagen.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
go back to reference Ackoff, Russell L. (1979). „The future of operational research is past“. Journal of the operational research society, 30(2), 93–104. Ackoff, Russell L. (1979). „The future of operational research is past“. Journal of the operational research society, 30(2), 93–104.
go back to reference Arwinge, O., & Olve, N.-G. (2017). Three lines of defense for organizing risk management. In Bank regulation (S. 284–309). Routledge.CrossRef Arwinge, O., & Olve, N.-G. (2017). Three lines of defense for organizing risk management. In Bank regulation (S. 284–309). Routledge.CrossRef
go back to reference Bennis, W. G., Nanus, B., & Bennis, S. (1985). Leaders: Strategies for taking charge (Bd. 200). Harper & Row. Bennis, W. G., Nanus, B., & Bennis, S. (1985). Leaders: Strategies for taking charge (Bd. 200). Harper & Row.
go back to reference Bundesamt für Sicherheit in der Informationstechnik (BSI). (2017c). Leitfaden zur Basis-Absicherung nach IT-Grundschutz. Bundesamt für Sicherheit in der Informationstechnik (BSI). (2017c). Leitfaden zur Basis-Absicherung nach IT-Grundschutz.
go back to reference Campobasso, M., & Allodi, L. (2020). Impersonation-as-a-service: Characterizing the emerging criminal infrastructure for user impersonation at scale. Proceedings of the 2020 ACM SIGSAC conference on computer and communications security, 1665–1680. Campobasso, M., & Allodi, L. (2020). Impersonation-as-a-service: Characterizing the emerging criminal infrastructure for user impersonation at scale. Proceedings of the 2020 ACM SIGSAC conference on computer and communications security, 1665–1680.
go back to reference Campobasso, Michele, and Luca Allodi. „Know your cybercriminal: Evaluating attacker preferences by measuring profile sales on an active, leading criminal market for user impersonation at scale.“ 32nd USENIX Security Symposium (USENIX Security 23). 2023. Campobasso, Michele, and Luca Allodi. „Know your cybercriminal: Evaluating attacker preferences by measuring profile sales on an active, leading criminal market for user impersonation at scale.“ 32nd USENIX Security Symposium (USENIX Security 23). 2023.
go back to reference Conklin, J. (2005). Wicked problems and social complexity. Building shared understanding of wicked problems. John Wiley & Sons. Conklin, J. (2005). Wicked problems and social complexity. Building shared understanding of wicked problems. John Wiley & Sons.
go back to reference d.School. (2010). An introduction to design thinking PROCESS GUIDE. d.School. (2010). An introduction to design thinking PROCESS GUIDE.
go back to reference DiStaso, M. W. (2018). Communication challenges in cybersecurity. Journal of Communication Technology, 1(1), 43–60.CrossRef DiStaso, M. W. (2018). Communication challenges in cybersecurity. Journal of Communication Technology, 1(1), 43–60.CrossRef
go back to reference Frans M. van Eijnatten. (1991). An anthology of the socio-technical systems design (STSD) paradigm:. Frans M. van Eijnatten. (1991). An anthology of the socio-technical systems design (STSD) paradigm:.
go back to reference Frans M. van Eijnatten. (1992). The socio-technical systems design (STSD) paradigm: A full bibliography of English-language literature. University of Technology, Eindhoven. Frans M. van Eijnatten. (1992). The socio-technical systems design (STSD) paradigm: A full bibliography of English-language literature. University of Technology, Eindhoven.
go back to reference Gerken, S., Uebernickel, F., & de Paula, D. (2022). Design thinking: A global study on implementation practices in organizations: past-present-future. Universitätsverlag Potsdam. Gerken, S., Uebernickel, F., & de Paula, D. (2022). Design thinking: A global study on implementation practices in organizations: past-present-future. Universitätsverlag Potsdam.
go back to reference Hill, A. D., Kern, D. A., & White, M. A. (2012). Building understanding in strategy research: The importance of employing consistent terminology and convergent measures. Strategic Organization, 10(2), 187–200.CrossRef Hill, A. D., Kern, D. A., & White, M. A. (2012). Building understanding in strategy research: The importance of employing consistent terminology and convergent measures. Strategic Organization, 10(2), 187–200.CrossRef
go back to reference Hofmann, T. F., de Paula, D., & Uebernickel, F. (2023). Social aspects in organisational cyber-security effectiveness – Of British coal mines, resilience and emergence. In Wirtschaftsinformatik 2023 Proceedings (Bd. 89). https://aisel.aisnet.org/wi2023/89. Zugegriffen am 26.04.2024. Hofmann, T. F., de Paula, D., & Uebernickel, F. (2023). Social aspects in organisational cyber-security effectiveness – Of British coal mines, resilience and emergence. In Wirtschaftsinformatik 2023 Proceedings (Bd. 89). https://​aisel.​aisnet.​org/​wi2023/​89. Zugegriffen am 26.04.2024.
go back to reference Holland, J. H. (1992). Complex adaptive systems. Daedalus, 121(1), 17–30. Holland, J. H. (1992). Complex adaptive systems. Daedalus, 121(1), 17–30.
go back to reference Information Systems Audit and Control Association (Hrsg.). (2012). COBIT 5 for information security. ISACA. Information Systems Audit and Control Association (Hrsg.). (2012). COBIT 5 for information security. ISACA.
go back to reference ISO/IEC. (2022). ISO/IEC 27002:2022 Information security, cybersecurity and privacy protection – Information security controls. ISO/IEC. (2022). ISO/IEC 27002:2022 Information security, cybersecurity and privacy protection – Information security controls.
go back to reference Kolko, J. (2015, September 1). Design thinking comes of age. Harvard Business Review, September 2015. https://hbr.org/2015/09/design-thinking-comes-of-age Kolko, J. (2015, September 1). Design thinking comes of age. Harvard Business Review, September 2015. https://​hbr.​org/​2015/​09/​design-thinking-comes-of-age
go back to reference Kurtz, C. F., & Snowden, D. J. (2003). The new dynamics of strategy: Sense-making in a complex and complicated world. IBM SYSTEMS JOURNAL, 42(3), 22.CrossRef Kurtz, C. F., & Snowden, D. J. (2003). The new dynamics of strategy: Sense-making in a complex and complicated world. IBM SYSTEMS JOURNAL, 42(3), 22.CrossRef
go back to reference Lewrick, M., Link, P., & Leifer, L. (2020). The design thinking toolbox: A guide to mastering the most popular and valuable innovation methods. Wiley.CrossRef Lewrick, M., Link, P., & Leifer, L. (2020). The design thinking toolbox: A guide to mastering the most popular and valuable innovation methods. Wiley.CrossRef
go back to reference Luzeaux, D. (Hrsg.). (2011). Complex systems and systems of systems engineering. ISTE. Luzeaux, D. (Hrsg.). (2011). Complex systems and systems of systems engineering. ISTE.
go back to reference Mencken, H. L. (1922). Prejudices: Second series. Alfred A. Knopf. Mencken, H. L. (1922). Prejudices: Second series. Alfred A. Knopf.
go back to reference Moen, R. D., & Norman, C. L. (2010). Circling back. Quality Progress, 43(11), 22. Moen, R. D., & Norman, C. L. (2010). Circling back. Quality Progress, 43(11), 22.
go back to reference Norman, D. A. (2013). The design of everyday things (Revised and expanded edition). Basic Books. Norman, D. A. (2013). The design of everyday things (Revised and expanded edition). Basic Books.
go back to reference Osterwalder, A., Pigneur, Y., Oliveira, M. A.-Y., & Ferreira, J. J. P. (2011). Business model generation: A handbook for visionaries, game changers and challengers. African Journal of Business Management, 5(7), 22–30. Osterwalder, A., Pigneur, Y., Oliveira, M. A.-Y., & Ferreira, J. J. P. (2011). Business model generation: A handbook for visionaries, game changers and challengers. African Journal of Business Management, 5(7), 22–30.
go back to reference Osterwalder, A., Pigneur, Y., Bernarda, G., & Smith, A. (2015). Value proposition design: How to create products and services customers want. Wiley. Osterwalder, A., Pigneur, Y., Bernarda, G., & Smith, A. (2015). Value proposition design: How to create products and services customers want. Wiley.
go back to reference Pasmore, W. A., & Khalsa, G. S. (1993). The contributions of Eric Trist to the social engagement of social science. Academy of Management Review, 18(3), 546–569.CrossRef Pasmore, W. A., & Khalsa, G. S. (1993). The contributions of Eric Trist to the social engagement of social science. Academy of Management Review, 18(3), 546–569.CrossRef
go back to reference Perera, S., Jin, X., Maurushat, A., & Opoku, D.-G. J. (2022). Factors affecting reputational damage to organisations due to cyberattacks. Informatics, 9(1), 28.CrossRef Perera, S., Jin, X., Maurushat, A., & Opoku, D.-G. J. (2022). Factors affecting reputational damage to organisations due to cyberattacks. Informatics, 9(1), 28.CrossRef
go back to reference Protzen, J.-P., & Harris, D. J. (2010). The universe of design: Horst Rittel’s theories of design and planning. Routledge.CrossRef Protzen, J.-P., & Harris, D. J. (2010). The universe of design: Horst Rittel’s theories of design and planning. Routledge.CrossRef
go back to reference Rammer, C., & Spielkamp, A. (2015). Hidden champions – driven by innovation: Empirische Befunde auf Basis des Mannheimer Innovationspanels. ZEW-Dokumentation, 15. Rammer, C., & Spielkamp, A. (2015). Hidden champions – driven by innovation: Empirische Befunde auf Basis des Mannheimer Innovationspanels. ZEW-Dokumentation, 15.
go back to reference Rittel, H. W., & Webber, M. M. (1973). Dilemmas in a general theory of planning. Policy Sciences, 4(2), 155–169.CrossRef Rittel, H. W., & Webber, M. M. (1973). Dilemmas in a general theory of planning. Policy Sciences, 4(2), 155–169.CrossRef
go back to reference Rosenthal, D. (2020). Das neue Datenschutzgesetz, Jusletter 16. November 2020 Rosenthal, D. (2020). Das neue Datenschutzgesetz, Jusletter 16. November 2020
go back to reference Rothrock, R. A., Kaplan, J., & Van Der Oord, F. (2018). The board’s role in managing cybersecurity risks. MIT Sloan Management Review, 59(2), 12–15. Rothrock, R. A., Kaplan, J., & Van Der Oord, F. (2018). The board’s role in managing cybersecurity risks. MIT Sloan Management Review, 59(2), 12–15.
go back to reference Snowden, D. (2000). “Cynefin, A Sense of Time and Place: an Ecological Approach to Sense Making and Learning in Formal and Informal Communities” conference proceedings of KMAC at the University of Aston, July 2000. Snowden, D. (2000). “Cynefin, A Sense of Time and Place: an Ecological Approach to Sense Making and Learning in Formal and Informal Communities” conference proceedings of KMAC at the University of Aston, July 2000.
go back to reference Snowden, D. J., & Boone, M. E. (2007). A leader’s framework for decision making. Issue November 2007. Harvard Business Review, 85(11), 68–76. Snowden, D. J., & Boone, M. E. (2007). A leader’s framework for decision making. Issue November 2007. Harvard Business Review, 85(11), 68–76.
go back to reference Streeter, D. C. (2013). The effect of human error on modern security breaches, 6. Streeter, D. C. (2013). The effect of human error on modern security breaches, 6.
go back to reference Trist, E. L., & Bamforth, K. W. (1951). Some social and psychological consequences of the longwall method of coal-getting: An examination of the psychological situation and defences of a work group in relation to the social structure and technological content of the work system. Human Relations, 4(1), 3–38. https://doi.org/10.1177/001872675100400101. Zugegriffen am 26.04.2024.CrossRef Trist, E. L., & Bamforth, K. W. (1951). Some social and psychological consequences of the longwall method of coal-getting: An examination of the psychological situation and defences of a work group in relation to the social structure and technological content of the work system. Human Relations, 4(1), 3–38. https://​doi.​org/​10.​1177/​0018726751004001​01. Zugegriffen am 26.04.2024.CrossRef
go back to reference Van Beurden, E. K., Kia, A. M., Zask, A., Dietrich, U., & Rose, L. (2013). Making sense in a complex landscape: How the cynefin framework from complex adaptive systems theory can inform health promotion practice. Health Promotion International, 28(1), 73–83. https://doi.org/10.1093/heapro/dar089. Zugegriffen am 26.04.2024.CrossRef Van Beurden, E. K., Kia, A. M., Zask, A., Dietrich, U., & Rose, L. (2013). Making sense in a complex landscape: How the cynefin framework from complex adaptive systems theory can inform health promotion practice. Health Promotion International, 28(1), 73–83. https://​doi.​org/​10.​1093/​heapro/​dar089. Zugegriffen am 26.04.2024.CrossRef
go back to reference Wu, G., Feder, A., Cohen, H., Kim, J. J., Calderon, S., Charney, D. S., & Mathé, A. A. (2013). Understanding resilience. Frontiers in Behavioral Neuroscience, 7, 10.CrossRef Wu, G., Feder, A., Cohen, H., Kim, J. J., Calderon, S., Charney, D. S., & Mathé, A. A. (2013). Understanding resilience. Frontiers in Behavioral Neuroscience, 7, 10.CrossRef
go back to reference Zwahlen, F., Marti, I., Richter, M., Konopatsch, C. J., & Hostettler, U. (2020). Wirtschaftsspionage in der Schweiz. Schlussbericht zuhanden des Nachrichtendienstes des Bundes (NDB). Bern: Universität Bern – Institut für Strafrecht und Kriminologie Zwahlen, F., Marti, I., Richter, M., Konopatsch, C. J., & Hostettler, U. (2020). Wirtschaftsspionage in der Schweiz. Schlussbericht zuhanden des Nachrichtendienstes des Bundes (NDB). Bern: Universität Bern – Institut für Strafrecht und Kriminologie
Metadata
Title
Sichere Digitalwirtschaft
Author
Tom F. Hofmann
Copyright Year
2024
DOI
https://doi.org/10.1007/978-3-658-45724-2_7

Premium Partner