Skip to main content
Erschienen in: Electronic Commerce Research 3/2014

01.11.2014

Public IT service strategy for social information security in the intelligence all-things environment

verfasst von: Jinho Yoo, Hangbae Chang

Erschienen in: Electronic Commerce Research | Ausgabe 3/2014

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In the area of public information service, information leakage through an insider is occurring frequently in recent. Considering the difficulty in tracking security breach incidents upon using cutting-edge technology instead of technology-centered security measure, establishing fundamental solution strategy is essential since the era of intelligence all-things environment is approaching which is referred to as future information & communications convergence environment. However, existing studies on the prevention of personal information leakage & misuse through insider have been centered on technical approach but security studies on managerial factor, especially, on identifying the possibility of information leakage in connection to work process have been very lacking. This study proposed ways to improve public information service for the social information security of individuals such as personal or policy information that are dealt with in public information service. It examined vulnerabilities in managerial, technical and operating environment areas for the purpose of preventing personal information leakage and misuse by selecting 8 representative public information services. For the purpose of solving such vulnerabilities, public information service strategy was deduced for preventing personal information leakage and misuse by referring to both domestic and international studies and cases on personal information protection.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Tsohoua, A., Kokolakis, S., Karyda, M., & Kiountouzis, E. (2008). Investigating information security awareness: Research and practice gaps. Information Security Journal: A Global Perspective, 17(5–6), 207–227. Tsohoua, A., Kokolakis, S., Karyda, M., & Kiountouzis, E. (2008). Investigating information security awareness: Research and practice gaps. Information Security Journal: A Global Perspective, 17(5–6), 207–227.
2.
Zurück zum Zitat Taylor, D. G., Davis, D. F., & Jillapalli, R. (2009). Privacy concern and online personalization: The moderating effects of information control and compensation. Electronic Commerce Research, 9(3), 203–223.CrossRef Taylor, D. G., Davis, D. F., & Jillapalli, R. (2009). Privacy concern and online personalization: The moderating effects of information control and compensation. Electronic Commerce Research, 9(3), 203–223.CrossRef
3.
Zurück zum Zitat ISO/IEC 27002:2005 (2005). Information technology Security techniques Code of practice for information security management. ISO/IEC 27002:2005 (2005). Information technology Security techniques Code of practice for information security management.
4.
Zurück zum Zitat Jahyun Goo, C., & Huang, D. (2008). Facilitating relational governance through service level agreements in IT outsourcing: An application of the commitment-trust theory. Decision Support Systems, 46(1), 216–232.CrossRef Jahyun Goo, C., & Huang, D. (2008). Facilitating relational governance through service level agreements in IT outsourcing: An application of the commitment-trust theory. Decision Support Systems, 46(1), 216–232.CrossRef
5.
Zurück zum Zitat Kaufman, J. H., Edlund, S., Ford, D. A., & Powers, C. (2005). The social contract core. Electronic Commerce Research, 5(1), 141–165.CrossRef Kaufman, J. H., Edlund, S., Ford, D. A., & Powers, C. (2005). The social contract core. Electronic Commerce Research, 5(1), 141–165.CrossRef
6.
Zurück zum Zitat Da Veiga, A., & Eloff, J. H. P. (2010). A framework and assessment instrument for information security culture. Computers and Security, 29(2), 196–207.CrossRef Da Veiga, A., & Eloff, J. H. P. (2010). A framework and assessment instrument for information security culture. Computers and Security, 29(2), 196–207.CrossRef
7.
Zurück zum Zitat Baggett, W. O. (2003). Creating a culture of security. The Internal Auditor, 3(60), 37–41. Baggett, W. O. (2003). Creating a culture of security. The Internal Auditor, 3(60), 37–41.
8.
Zurück zum Zitat Von Solms, R. (2000). Driving safely on the information superhighway. Information Management & Computer Security, 5(1), 20–22.CrossRef Von Solms, R. (2000). Driving safely on the information superhighway. Information Management & Computer Security, 5(1), 20–22.CrossRef
9.
Zurück zum Zitat D’Arcy, J., Hovav, A., & Galletta, D. (2009). User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach. Information Systems Research, 20(1), 79–98.CrossRef D’Arcy, J., Hovav, A., & Galletta, D. (2009). User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach. Information Systems Research, 20(1), 79–98.CrossRef
10.
Zurück zum Zitat Da Veiga, A., & Eloff, J. H. P. (2007). An information security governance framework. Information Systems Management, 24(4), 361–372.CrossRef Da Veiga, A., & Eloff, J. H. P. (2007). An information security governance framework. Information Systems Management, 24(4), 361–372.CrossRef
11.
Zurück zum Zitat Richards, N. (2002). The critical importance of information security to financial institutions. Business Credit, 104(9), 35–36. Richards, N. (2002). The critical importance of information security to financial institutions. Business Credit, 104(9), 35–36.
12.
Zurück zum Zitat Smith, R., & Shao, J. (2007). Privacy and e-commerce: A consumer-centric perspective. Electronic Commerce Research, 7(2), 89–116.CrossRef Smith, R., & Shao, J. (2007). Privacy and e-commerce: A consumer-centric perspective. Electronic Commerce Research, 7(2), 89–116.CrossRef
13.
Zurück zum Zitat Weber, R. H. (2010). Internet of things—new security and privacy challenges. Computer Law & Security Review, 26(1), 23–30.CrossRef Weber, R. H. (2010). Internet of things—new security and privacy challenges. Computer Law & Security Review, 26(1), 23–30.CrossRef
14.
Zurück zum Zitat Ruighaver, A. B., Maynard, S. B., & Chang, S. (2007). Organisational security, culture: Extending the end-user perspective. Computers and Security, 26, 56–62.CrossRef Ruighaver, A. B., Maynard, S. B., & Chang, S. (2007). Organisational security, culture: Extending the end-user perspective. Computers and Security, 26, 56–62.CrossRef
15.
Zurück zum Zitat Mattern, F., & Floerkemeier, C. (2010). From the internet of computers to the internet of things. Lecture Notes in Computer Science, 6462, 242–259.CrossRef Mattern, F., & Floerkemeier, C. (2010). From the internet of computers to the internet of things. Lecture Notes in Computer Science, 6462, 242–259.CrossRef
16.
Zurück zum Zitat Chang, H., HyukjunKwon, J. K., & Kim, Y. (2011). A case study on intelligent service design in ubiquitous computing. Computing and Informatics, 30, 513–529. Chang, H., HyukjunKwon, J. K., & Kim, Y. (2011). A case study on intelligent service design in ubiquitous computing. Computing and Informatics, 30, 513–529.
17.
Zurück zum Zitat Pham, H., Ye, Y., & Nguyen, V. (2003). Autonomous mapping of e-business demands and supplies via invisible internet agents. Electronic Commerce Research, 3(3–4), 365–395.CrossRef Pham, H., Ye, Y., & Nguyen, V. (2003). Autonomous mapping of e-business demands and supplies via invisible internet agents. Electronic Commerce Research, 3(3–4), 365–395.CrossRef
18.
Zurück zum Zitat Hellriegel, D., Slocum Jr., J. W., & Woodman R. W. (1998). Organizational behavior, Eighth edition, South-Western College Publishing. Hellriegel, D., Slocum Jr., J. W., & Woodman R. W. (1998). Organizational behavior, Eighth edition, South-Western College Publishing.
19.
Zurück zum Zitat Mackenzie, K., Buckby, S., & Irvine, H. (2009). A framework for evaluating business lead users’ virtual reality innovations in second life. Electronic Commerce Research, 9(3), 183–202.CrossRef Mackenzie, K., Buckby, S., & Irvine, H. (2009). A framework for evaluating business lead users’ virtual reality innovations in second life. Electronic Commerce Research, 9(3), 183–202.CrossRef
20.
Zurück zum Zitat Kruger, H. A., & Kearney, W. D. (2006). A prototype for assessing information security awareness. Computers and Security, 25(4), 289–296.CrossRef Kruger, H. A., & Kearney, W. D. (2006). A prototype for assessing information security awareness. Computers and Security, 25(4), 289–296.CrossRef
21.
Zurück zum Zitat Dlamini, M. T., Eloff, J. H. P., & Eloff, M. M. (2009). Information security: The moving target. Computers & Security, 28(3–4), 189–198.CrossRef Dlamini, M. T., Eloff, J. H. P., & Eloff, M. M. (2009). Information security: The moving target. Computers & Security, 28(3–4), 189–198.CrossRef
22.
Zurück zum Zitat Jaeger, P. T., & Thompson, K. M. (2004). Social information behavior and the democratic process: Information poverty, normative behavior, and electronic government in the United States. Library & Information Science Research, 26(1), 94–107.CrossRef Jaeger, P. T., & Thompson, K. M. (2004). Social information behavior and the democratic process: Information poverty, normative behavior, and electronic government in the United States. Library & Information Science Research, 26(1), 94–107.CrossRef
23.
Zurück zum Zitat Cappelli, D., Moore, A., Shimeall, T. J., & Trzeciak, R. (2006). Common sense guide to prevention and detection of insider threats. Pittsburgh: Carnegie Mellon University CyLab. Cappelli, D., Moore, A., Shimeall, T. J., & Trzeciak, R. (2006). Common sense guide to prevention and detection of insider threats. Pittsburgh: Carnegie Mellon University CyLab.
24.
Zurück zum Zitat Liu, D., Wang, X. F., & Jean Camp, L. (2009). Mitigating inadvertent insider threats with incentives. Financial Cryptography and Data Security, 5628, 1–16. Liu, D., Wang, X. F., & Jean Camp, L. (2009). Mitigating inadvertent insider threats with incentives. Financial Cryptography and Data Security, 5628, 1–16.
25.
Zurück zum Zitat Donaldson, W. H., & U.S., (2005). Capital markets in the post-Sarbanes-Oxley world: Why our markets should matter to foreign issuers. London School of Economics and Political Science: U.S. Securities and Exchange Commission. Donaldson, W. H., & U.S., (2005). Capital markets in the post-Sarbanes-Oxley world: Why our markets should matter to foreign issuers. London School of Economics and Political Science: U.S. Securities and Exchange Commission.
26.
Zurück zum Zitat Vroom, C., & Von Solms, R. (2004). Towards information security behavioural compliance. Computers and Security, 23(3), 191–198.CrossRef Vroom, C., & Von Solms, R. (2004). Towards information security behavioural compliance. Computers and Security, 23(3), 191–198.CrossRef
27.
Zurück zum Zitat Regner, T., Barria, J. A., Pitt, J. V., & Neville, B. (2010). Governance of digital content in the era of mass participation. Electronic Commerce Research, 10(1), 99–110.CrossRef Regner, T., Barria, J. A., Pitt, J. V., & Neville, B. (2010). Governance of digital content in the era of mass participation. Electronic Commerce Research, 10(1), 99–110.CrossRef
28.
Zurück zum Zitat Verton, D. (2000). Companies aim to build security awareness. Computerworld, 34(48), 24. Verton, D. (2000). Companies aim to build security awareness. Computerworld, 34(48), 24.
29.
Zurück zum Zitat Von Solms, S. H. (2000). Information security governance-compliance management vs. operational management. Computers and Security, 24(6), 443–447.CrossRef Von Solms, S. H. (2000). Information security governance-compliance management vs. operational management. Computers and Security, 24(6), 443–447.CrossRef
30.
Zurück zum Zitat Yeats, D., Cadle, J. (1996). Project management for information systems (2nd ed.). London: Pearson Professional. Yeats, D., Cadle, J. (1996). Project management for information systems (2nd ed.). London: Pearson Professional.
31.
Zurück zum Zitat Martins, A. (2002). Information security culture. Master’s dissertation, Rand Afrikaans University, Johannesburg. Martins, A. (2002). Information security culture. Master’s dissertation, Rand Afrikaans University, Johannesburg.
32.
Zurück zum Zitat Martins, A., Eloff, J. H. P. (2002). Information security culture, IFIP/SEC2002. In: Security in the information society (pp. 203–14). Boston: Kluwer Academic. Martins, A., Eloff, J. H. P. (2002). Information security culture, IFIP/SEC2002. In: Security in the information society (pp. 203–14). Boston: Kluwer Academic.
33.
Zurück zum Zitat Robbins, S., Odendaal, A., Roodt, G. (2003). Organisational behaviour - global and southern African perspectives. Cape Town: Pearson Education South Africa. Robbins, S., Odendaal, A., Roodt, G. (2003). Organisational behaviour - global and southern African perspectives. Cape Town: Pearson Education South Africa.
Metadaten
Titel
Public IT service strategy for social information security in the intelligence all-things environment
verfasst von
Jinho Yoo
Hangbae Chang
Publikationsdatum
01.11.2014
Verlag
Springer US
Erschienen in
Electronic Commerce Research / Ausgabe 3/2014
Print ISSN: 1389-5753
Elektronische ISSN: 1572-9362
DOI
https://doi.org/10.1007/s10660-014-9155-2

Weitere Artikel der Ausgabe 3/2014

Electronic Commerce Research 3/2014 Zur Ausgabe