Critical Infrastructure Infomation Security: Impacts of Identity and Related Crimes
نویسندگان
چکیده
The physical and digital security of a nation’s critical infrastructure is necessary for its citizens, commerce and their public and private owners’ to conduct successful business transactions. A complicating factor towards this security is the multi-jurisdictional nature of some critical infrastructure assets e.g., telecommunications or financial systems. Information systems (IS) and information technology are playing an ever more important role in the security of a nation’s (state, territory, or province’s) critical infrastructure. This longitudinal study investigates public sector critical infrastructure incidents across nine sectors in an Australia state New South Wales. The New South Wales State Government is the largest by full-time employees in Australia. An action research methodology was employed. Data was collected by online survey, complemented by interviews and secondary data searches. Results were reinforced from independent sources. Our main finding is that NSW State Government IS security incidents against critical infrastructure assets are decreasing in both nominal and relative terms over time as prevention techniques and solutions are increasingly becoming available. However, we must be cautious in making causal inferences or generalising to other organisational situations without further study investigating other exogenous determinants.
منابع مشابه
Environment Security and Decrease of Crimes with CPTED Approach Critical and Analytical Discussion
Crime and the fear of crime are pervasive and endemic concerns in modern post-industrial society and criminal justice systems are clearly failing to tackle both issues. In this research after mentioning the abstract for motivation and the vital opinion in the security public, the role of city framework (programming the environmental design) in the decrease and prediction of crimes in the city...
متن کاملStudy of Latest Emerging Trends on Cyber Security and its challenges to Society
Cyber Security plays an important role in the development of information technology as well as Internet services. Our attention is usually drawn on “Cyber Security” when we hear about “Cyber Crimes”. Our first thought on “National Cyber Security” therefore starts on how good is our infrastructure for handling “Cyber Crimes” [1]. This paper focus on cyber security emerging trends while adopting ...
متن کاملCases of Limitations and Violations of the Principles of Moral and Criminal Law in the Study of Reasons for Crimes Against Security Based on Expediency
Background: In specific criminal law, security crimes are of special importance due to their harmful effects on the whole society and the country. One of the reasons for studying crimes against security is that the way and method of discovering and investigating the perpetrators of crimes against security is different from other crimes. The purpose of explaining the limitations and deviations f...
متن کاملCases of Limitation and Deviation from the Principles of Ethical and Criminal Law through the Study of the Cause of Crimes against Security on the Basis of Expediency
Background: In specific criminal law, security crimes are of special importance for the whole society and the country due to their harmful effects on the public. One of these cases is the study of evidence in crimes against security that the manner and method of detection and investigation of perpetrators of crimes against security is different from other crimes. The purpose of explaining the c...
متن کاملRisk assessment of multi-order dependencies between critical ICT infrastructures
Assessing risk in information and communication infrastructures is a challenging topic due to the complexity of critical infrastructures (CIs) and of the various dependencies between such infrastructures. This chapter discusses the basic concepts of risk assessment for CIs. Moreover, it describes a recently proposed methodology for criticality assessment. The main goal of this methodology is to...
متن کامل