Skip to main content

2021 | OriginalPaper | Buchkapitel

On the Definition of Data Regulation Risk

verfasst von : Guillaume Delorme, Guilaine Talens, Eric Disson, Guillaume Collard, Elise Gaget

Erschienen in: Service-Oriented Computing – ICSOC 2020 Workshops

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The rapid development of Information and Communication Technologies (ICT) has led to firms embracing data processing. Scholars and professionals have developed a range of assessments and management methodologies to better answer the needs for trust and privacy in ICT. With the ambition of establishing trust by reinforcing the protection of individuals’ rights and privacy, economic interests and national security, policy makers attempt to regulate data processing through enactment of laws and regulations. Non-compliance with these norms may harm companies which in turn need to incorporate it in their risk assessment. We propose to define this new class of risk: “Data Regulation Risk” (DRR) as “a risk originating from the possibility of a penalty from a regulatory agency following evidence of non-compliance with regulated data processing and/or ICT governances and processes and/or information technologies and services”. Our definition clarifies the meaning of the defined terms in a given context and adds a specific scope to facilitate and optimize decision-making.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Kossef, J.: Defining cybersecurity law. Iowa Law Rev. 103(1), 985–1031 (2017) Kossef, J.: Defining cybersecurity law. Iowa Law Rev. 103(1), 985–1031 (2017)
2.
Zurück zum Zitat Knight, F.: Risk, Uncertainty and Profit. Houghton Mifflin, Boston (1921) Knight, F.: Risk, Uncertainty and Profit. Houghton Mifflin, Boston (1921)
3.
Zurück zum Zitat Gambetta, D.: Can we trust trust. In: Trust: Making and Breaking Cooperative Relations, vol. 13, pp. 213–237 (2000) Gambetta, D.: Can we trust trust. In: Trust: Making and Breaking Cooperative Relations, vol. 13, pp. 213–237 (2000)
4.
Zurück zum Zitat Myerson, R.B.: Game Theory. Harvard University Press (2013) Myerson, R.B.: Game Theory. Harvard University Press (2013)
6.
Zurück zum Zitat Pearce, W.B.: Trust in interpersonal communication. Speech Monogr. 41(3), 236–244 (1974) Pearce, W.B.: Trust in interpersonal communication. Speech Monogr. 41(3), 236–244 (1974)
7.
Zurück zum Zitat Gefen, D., Rao, V.S., Tractinsky, N.: The conceptualization of trust, risk and their relationship in electronic commerce: the need for clarification. IEEE Computer Society (2002) Gefen, D., Rao, V.S., Tractinsky, N.: The conceptualization of trust, risk and their relationship in electronic commerce: the need for clarification. IEEE Computer Society (2002)
8.
Zurück zum Zitat Mayer, R.C., Davis, J.H., Schoorman, F.D.: An integrative model of organizational trust. Acad. Manag. Rev. 20(3), 709–734 (1995)CrossRef Mayer, R.C., Davis, J.H., Schoorman, F.D.: An integrative model of organizational trust. Acad. Manag. Rev. 20(3), 709–734 (1995)CrossRef
10.
Zurück zum Zitat Humphrey, J., Schmitz, H.: Trust and Inter firm relations in developing and transition economies. J. Dev. Stud. 34(4), 33–61 (1998)CrossRef Humphrey, J., Schmitz, H.: Trust and Inter firm relations in developing and transition economies. J. Dev. Stud. 34(4), 33–61 (1998)CrossRef
11.
Zurück zum Zitat Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation) Official Journal L (2016) Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation) Official Journal L (2016)
12.
Zurück zum Zitat California Consumer Privacy Act of 2018 (CCPA): California Civil Code, section 1798.100 (2018) California Consumer Privacy Act of 2018 (CCPA): California Civil Code, section 1798.100 (2018)
13.
Zurück zum Zitat Personal Data Protection Act of 2012 (PDPA): Parliament of Singapore, No. 26 (2012) Personal Data Protection Act of 2012 (PDPA): Parliament of Singapore, No. 26 (2012)
15.
Zurück zum Zitat Saper, N.: International cryptography regulation and the global information economy. Northwest. J. Technol. Intellect. Prop. 11(7), 673–688 (2013) Saper, N.: International cryptography regulation and the global information economy. Northwest. J. Technol. Intellect. Prop. 11(7), 673–688 (2013)
17.
Zurück zum Zitat Berger, C.: Uncertainty reduction theory. Dalam Griffin, EM A First Look at Communication Theory. Edisi, 6 (2006) Berger, C.: Uncertainty reduction theory. Dalam Griffin, EM A First Look at Communication Theory. Edisi, 6 (2006)
18.
19.
Zurück zum Zitat COUNCIL REGULATION (EC) No 428/2009 of 5 May 2009 setting up a Community regime for the control of exports, transfer, brokering and transit of dual-use items (EU dual-use), last consolidated version 2018/15/12 COUNCIL REGULATION (EC) No 428/2009 of 5 May 2009 setting up a Community regime for the control of exports, transfer, brokering and transit of dual-use items (EU dual-use), last consolidated version 2018/15/12
21.
Zurück zum Zitat Gordon, L., Loeb, M., Zhou, L.: The impact of information security breaches: has there been a downward shift in costs? J. Comput. Secur. 19(1), 33–56 (2011)CrossRef Gordon, L., Loeb, M., Zhou, L.: The impact of information security breaches: has there been a downward shift in costs? J. Comput. Secur. 19(1), 33–56 (2011)CrossRef
26.
Zurück zum Zitat Vom Brocke, J., et al.: Reconstructing the giant: on the importance of rigour in documenting the literature search process. In: ECIS Proceedings, p. 161 (2009) Vom Brocke, J., et al.: Reconstructing the giant: on the importance of rigour in documenting the literature search process. In: ECIS Proceedings, p. 161 (2009)
27.
Zurück zum Zitat Sheikhpour, R., Modiri, N.: An approach to map COBIT processes to ISO/IEC 27001 information security management controls. Int. J. Secur. Appl. 6(2), 13–28 (2012) Sheikhpour, R., Modiri, N.: An approach to map COBIT processes to ISO/IEC 27001 information security management controls. Int. J. Secur. Appl. 6(2), 13–28 (2012)
28.
Zurück zum Zitat Al-Ahmad, W., Mohammad, B.: Can a single security framework address information security risks adequately. Int. J. Digi. Inf. Wireless Commun. 2(3), 222–230 (2012) Al-Ahmad, W., Mohammad, B.: Can a single security framework address information security risks adequately. Int. J. Digi. Inf. Wireless Commun. 2(3), 222–230 (2012)
29.
Zurück zum Zitat Schlarman, S.: Selecting an IT control framework. Inf. Syst. Secur. 16(3), 147–151 (2007)CrossRef Schlarman, S.: Selecting an IT control framework. Inf. Syst. Secur. 16(3), 147–151 (2007)CrossRef
30.
Zurück zum Zitat Rebollo, O., Mellado, D., Fernandez-Medina, E.: A comparative review of cloud security proposals with ISO/IEC 27002. In: WOSIS, pp. 3–12 (2011) Rebollo, O., Mellado, D., Fernandez-Medina, E.: A comparative review of cloud security proposals with ISO/IEC 27002. In: WOSIS, pp. 3–12 (2011)
32.
Zurück zum Zitat Al-Ahmad, W., Mohammad, B.: Addressing information security risks by adopting standards. Int. J. Inf. Secur. Sci. 2(2), 28–43 (2013) Al-Ahmad, W., Mohammad, B.: Addressing information security risks by adopting standards. Int. J. Inf. Secur. Sci. 2(2), 28–43 (2013)
33.
Zurück zum Zitat Eloff, J., Eloff, M.: Information security architecture. Comput. Fraud Secur. 11(1), 10–16 (2005)CrossRef Eloff, J., Eloff, M.: Information security architecture. Comput. Fraud Secur. 11(1), 10–16 (2005)CrossRef
34.
Zurück zum Zitat Komljenovic, D., Gaha, M., Abdul-Nour, G., Langheit, C., Bourgeois, M.: Risks of extreme and rare events in Asset Management. Saf. Sci. 88(1), 129–145 (2016) Komljenovic, D., Gaha, M., Abdul-Nour, G., Langheit, C., Bourgeois, M.: Risks of extreme and rare events in Asset Management. Saf. Sci. 88(1), 129–145 (2016)
35.
Zurück zum Zitat Tixier, J., Dusserre, G., Salvi, O., Gaston, D.: Review of sixty two risk analysis methodologies of industrial plants. J. Loss Prev. Process Ind. 15(4), 291–303 (2002)CrossRef Tixier, J., Dusserre, G., Salvi, O., Gaston, D.: Review of sixty two risk analysis methodologies of industrial plants. J. Loss Prev. Process Ind. 15(4), 291–303 (2002)CrossRef
36.
Zurück zum Zitat Koivisto, R., et al.: Integrating FTA and risk assessment methodologies. In: FTA, pp. 37–38 (2008) Koivisto, R., et al.: Integrating FTA and risk assessment methodologies. In: FTA, pp. 37–38 (2008)
37.
Zurück zum Zitat Saleh, M.S., Alfantookh, A.: A new comprehensive framework for enterprise information security risk management. Appl. Comput. Inform. 9(2), 107–118 (2011)CrossRef Saleh, M.S., Alfantookh, A.: A new comprehensive framework for enterprise information security risk management. Appl. Comput. Inform. 9(2), 107–118 (2011)CrossRef
38.
Zurück zum Zitat Spears, J.L.: A holistic risk analysis method for identifying information security risks. In: Dowland, P., Furnell, S., Thuraisingham, B., Wang, X.S. (eds.) Security Management, Integrity, and Internal Control in Information Systems. IIFIP, vol. 193, pp. 185–202. Springer, Boston, MA (2005). https://doi.org/10.1007/0-387-31167-X_12CrossRef Spears, J.L.: A holistic risk analysis method for identifying information security risks. In: Dowland, P., Furnell, S., Thuraisingham, B., Wang, X.S. (eds.) Security Management, Integrity, and Internal Control in Information Systems. IIFIP, vol. 193, pp. 185–202. Springer, Boston, MA (2005). https://​doi.​org/​10.​1007/​0-387-31167-X_​12CrossRef
39.
Zurück zum Zitat Gerber, M., Von Solms, R.: Management of risk in the information age. Comput. Secur. 24(1), 16–30 (2005)CrossRef Gerber, M., Von Solms, R.: Management of risk in the information age. Comput. Secur. 24(1), 16–30 (2005)CrossRef
40.
Zurück zum Zitat Dor, D., Elovici, Y.: A model of the information security investment decision-making process. Comput. Secur. 63(1), 1–13 (2016)CrossRef Dor, D., Elovici, Y.: A model of the information security investment decision-making process. Comput. Secur. 63(1), 1–13 (2016)CrossRef
41.
Zurück zum Zitat Halliday, S., Badenhorst, K., Von Solms, R.: A business approach to effective information technology risk analysis and management. Inf. Manag. Comput. Secur. 4(1), 19–31 (1996)CrossRef Halliday, S., Badenhorst, K., Von Solms, R.: A business approach to effective information technology risk analysis and management. Inf. Manag. Comput. Secur. 4(1), 19–31 (1996)CrossRef
42.
Zurück zum Zitat Ross, R.: Managing enterprise risk in today’s world of sophisticated threats: a framework for developing broad-based, cost-effective information security programs. In: EDPACS, vol. 35, no. 2, pp. 1–10 (2007) Ross, R.: Managing enterprise risk in today’s world of sophisticated threats: a framework for developing broad-based, cost-effective information security programs. In: EDPACS, vol. 35, no. 2, pp. 1–10 (2007)
43.
Zurück zum Zitat Jallow, A., Majeed, B., Vergidis, K., Tiwari, A., Roy, R.: Operational risk analysis in business processes. BT Technol. J. 25(1), 168–177 (2007)CrossRef Jallow, A., Majeed, B., Vergidis, K., Tiwari, A., Roy, R.: Operational risk analysis in business processes. BT Technol. J. 25(1), 168–177 (2007)CrossRef
44.
Zurück zum Zitat Sohrabi Safa, N., Von Solms, R., Furnell, S.: Inf. Comput. Secur. 56(1), 70–82 (2016)CrossRef Sohrabi Safa, N., Von Solms, R., Furnell, S.: Inf. Comput. Secur. 56(1), 70–82 (2016)CrossRef
45.
Zurück zum Zitat Shedden P., Smith, W., Ahmas, A.: Information security risk assessment: towards a business practice perspective. In: AISMC, pp. 119–130 (2010) Shedden P., Smith, W., Ahmas, A.: Information security risk assessment: towards a business practice perspective. In: AISMC, pp. 119–130 (2010)
46.
Zurück zum Zitat Wangen, G.: Information security risk assessment: a method comparison. Computer 50(4), 52–61 (2017)CrossRef Wangen, G.: Information security risk assessment: a method comparison. Computer 50(4), 52–61 (2017)CrossRef
47.
Zurück zum Zitat Terje, A.: Risk assessment and risk management: review of recent advances on their foundation. Eur. J. Oper. Res. 253(1), 1–13 (2016)MathSciNetCrossRef Terje, A.: Risk assessment and risk management: review of recent advances on their foundation. Eur. J. Oper. Res. 253(1), 1–13 (2016)MathSciNetCrossRef
Metadaten
Titel
On the Definition of Data Regulation Risk
verfasst von
Guillaume Delorme
Guilaine Talens
Eric Disson
Guillaume Collard
Elise Gaget
Copyright-Jahr
2021
DOI
https://doi.org/10.1007/978-3-030-76352-7_40