Conceptualizing Communications Security: a Value Chain Approach

نویسنده

  • Axel ARNBAK
چکیده

Cybersecurity has become a top priority for policymakers these days, but as the engineering saying goes: “if you don’t know what you want, it’s hard to do it right.” This paper finds considerable shortcomings in current conceptual and legal frameworks for communications security policymaking. The misleading concept of cybersecurity incorporates a wide range of social issues under its umbrella, such as child protection, foreign policy and intellectual property protection. Cybersecurity distracts communications security conceptualizations and policies from the technical conception that should be at their core, i.e. ensuring confidentiality, integrity and availability of communications to authorized entities. The paper develops a value chain approach for the conceptualization and legal governance of communications security. This value chain approach is informed by an empirical case study into HTTPS governance and multilateral security engineering methods SQUARE and MSRA. It offers a 9-step framework for granular, functional communications security conceptualizations, tailored to specific communications settings. The framework enables policymakers to devise technical security goals, apprise constitutional values, confront stakeholders interests and balance associated public and private interests. The value chain approach should assist policymakers in deciding what they want, and to know whether they are the appropriate actor to get it right.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Formal approach on modeling and predicting of software system security: Stochastic petri net

To evaluate and predict component-based software security, a two-dimensional model of software security is proposed by Stochastic Petri Net in this paper. In this approach, the software security is modeled by graphical presentation ability of Petri nets, and the quantitative prediction is provided by the evaluation capability of Stochastic Petri Net and the computing power of Markov chain. Each...

متن کامل

Identifying and Ranking Technology-Telecommunications Context of Information Security anagement System in E-Government Using Fuzzy AHP Approach

In recent years, many security threats have entered into the organizations’ information and changed the  organizational performance resulting in their exorbitant costs. This question is of particular importanceabout government agencies that use information and Internet systems. This issue enabled the top managers of organizations to implement a security system and minimize these costs. Using In...

متن کامل

Value-Focused Assessment of Information System Security in Organizations

This paper presents findings of an empirical study of information system (IS) security values adhered to by user managers in a cross section of firms in various industries. Using Keeney’s (1999) value-focused thinking approach, 73 managers were interviewed to identify a set of fundamental and means values that are essential in protecting the information resources of a firm. The findings are use...

متن کامل

The Conceptualization of Value in the Value Proposition of New Health Technologies; Comment on “Providing Value to New Health Technology: The Early Contribution of Entrepreneurs, Investors, and Regulatory Agencies”

Lehoux et al provide a highly valid contribution in conceptualizing value in value propositions for new health technologies and developing an analytic framework that illustrates the interplay between health innovation supply-side logic (the logic of emergence) and demand-side logic (embedding in the healthcare system). This commentary brings forth several considerations on this article. First, ...

متن کامل

Performance Appraisal of Research and Development Projects Value-Chain for Complex Products and Systems: The Fuzzy Three-Stage DEA Approach

The purpose of the current research is to provide a performance appraisal system capable of considering the value chain network structure of research and development (R&D) projects for Complex products and systems (CoPS) under uncertainty of data. Therefore, in order to achieve this goal, a network data envelopment analysis (NDEA) approach and the possibilistic programming to provide a new fuzz...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017