Information Security, Privacy and Confidentiality National Science Foundation's Past and Current Funding Profile and Future Opportunities

Author(s):  
L. Gruenwald
Author(s):  
Blessing Maumbe ◽  
Vesper T. Owei

Information security risks are a major threat to South Africa’s bid to build a broad-based information society. The integration of information security in e-government is no longer an option, but an imperative given the resulting “information overload” and the need to filter “good” from “bad” information. Unless South Africa integrates information security in its e-government development policy and practices, the acclaimed benefits of e-government will not be realized. The moral hazard problems arising from bad information behavior such as human manipulation, withholding information, unauthorized access, and violation of individual privacy and confidentiality heightens the need to combat info-security risks and vulnerabilities. South Africa’s readiness to deal with the information security risks has come under scrutiny. The information security infrastructure in South Africa is also not clearly understood. This chapter examines South Africa’s information security landscape and describes how institutional and agency coordination could help improve information security in e-government.


2015 ◽  
pp. 1018-1031
Author(s):  
Blessing M. Maumbe ◽  
Vesper T. Owei

Information security risks are a major threat to South Africa's bid to build a broad-based information society. The integration of information security in e-government is no longer an option, but an imperative given the resulting “information overload” and the need to filter “good” from “bad” information. Unless South Africa integrates information security in its e-government development policy and practices, the acclaimed benefits of e-government will not be realized. The moral hazard problems arising from bad information behavior such as human manipulation, withholding information, unauthorized access, and violation of individual privacy and confidentiality heightens the need to combat info-security risks and vulnerabilities. South Africa's readiness to deal with the information security risks has come under scrutiny. The information security infrastructure in South Africa is also not clearly understood. This chapter examines South Africa's information security landscape and describes how institutional and agency coordination could help improve information security in e-government.


Author(s):  
Heru Susanto ◽  
Mohammad Nabil Almunawar

Cloud computing services have grown rapidly over the years. Government agencies are also interested in cloud-based provision for their E-government processes. Despite the advantages of cloud-related technologies, there are many security issues as well that fall into several categories of breaches with serious impacts. All these breaches have serious legal and reputational implications. Therefore, governments need to ensure that inherent security threats can be neutralized to ensure that data or information stored in the cloud are well protected. It is imperative for cloud-based e-government (CB-eGov) to use an information security management system (ISMS) to effectively manage CB-eGov. The purpose of this chapter is to discuss how cloud computing can be incorporated in an e-government implementation to improve its efficiency without compromising information security. As such, the government needs to take special care in ensuring security, privacy, and confidentiality of information stored in the cloud.


2019 ◽  
pp. 1869-1897
Author(s):  
Heru Susanto ◽  
Mohammad Nabil Almunawar

Cloud computing services have grown rapidly over the years. Government agencies are also interested in cloud-based provision for their E-government processes. Despite the advantages of cloud-related technologies, there are many security issues as well that fall into several categories of breaches with serious impacts. All these breaches have serious legal and reputational implications. Therefore, governments need to ensure that inherent security threats can be neutralized to ensure that data or information stored in the cloud are well protected. It is imperative for cloud-based e-government (CB-eGov) to use an information security management system (ISMS) to effectively manage CB-eGov. The purpose of this chapter is to discuss how cloud computing can be incorporated in an e-government implementation to improve its efficiency without compromising information security. As such, the government needs to take special care in ensuring security, privacy, and confidentiality of information stored in the cloud.


2020 ◽  
Vol 0 (0) ◽  
Author(s):  
Neil Gandal ◽  
Nadav Kunievsky ◽  
Lee Branstetter

AbstractA large literature has used patent data to measure knowledge spillovers across inventions but few papers have explicitly measured the impact of the collaboration networks formed by inventors on the quality of invention. This paper develops a method to measure the impact of collaboration networks of inventors on invention quality. We apply this methodology to the information and communication technology (ICT) and information security sectors in Israel and find that the quality of Israeli inventions are systematically linked to the structure of the collaborative network in these sectors. We are very grateful to the editor Lukasz Grzybowski and an anonymous referee for very helpful comments and suggestions that significantly improved the paper. We thank the Maurice Falk Institute for Economic Research in Israel, Start-Up Nation Central, the U. S. National Science Foundation (SciSIP grants 1360165 and 1360170), and Portugal’s Foundation for Science and Technology for financial support of this research. Lee Branstetter’s work on this project was supported by the National Science Foundation and we thank Britta Glennon for excellent research assistance. We are also grateful to Tim Bresnahan, Eugene Kandel, Imke Reimers, and seminar/conference participants at the 19th CEPR IO conference, the 10th Paris conference on Digital Economics, Collegio Carlo Alberto, Hebrew University, Stanford University, Tel Aviv University, ad UC-Berkeley and for helpful comments and suggestions. © 2020 by Neil Gandal, Nadav Kunievsky, and Lee Branstetter. All rights reserved. Short sections of text, not to exceed two paragraphs, may be quoted without explicit permission provided that full credit, including the © notice, is given to the source.


2017 ◽  
Vol 2017 ◽  
pp. 1-11 ◽  
Author(s):  
Chalee Vorakulpipat ◽  
Soontorn Sirapaisan ◽  
Ekkachan Rattanalerdnusorn ◽  
Visut Savangsuk

Today, many organizations allow their employees to bring their own smartphones or tablets to work and to access the corporate network, which is known as a bring your own device (BYOD). However, many such companies overlook potential security risks concerning privacy and confidentiality. This paper provides a review of existing literature concerning the preservation of privacy and confidentiality, with a focus on recent trends in the use of BYOD. This review spans a large spectrum of information security research, ranging from management (risk and policy) to technical aspects of privacy and confidentiality in BYOD. Furthermore, this study proposes a policy-based framework for preserving data confidentiality in BYOD. This framework considers a number of aspects of information security and corresponding techniques, such as policy, location privacy, centralized control, cryptography, and operating system level security, which have been omitted in previous studies. The main contribution is to investigate recent trends concerning the preservation of confidentiality in BYOD from the perspective of information security and to analyze the critical and comprehensive factors needed to strengthen data privacy in BYOD. Finally, this paper provides a foundation for developing the concept of preserving confidentiality in BYOD and describes the key technical and organizational challenges faced by BYOD-friendly organizations.


2021 ◽  
Author(s):  
◽  
Brendan Feary

<p>Research Problem Maintaining privacy and confidentiality of data in an age of e-government and electronic recordkeeping is one of the key challenges for records management staff today. In New Zealand this issue has attracted negative attention through several recent public sector privacy and security breaches, raising questions about systemic issues, accountability, and a disconnect between strategy and implementation. How government responds will depend in large measure on the advice received regarding solutions to information security. A bibliographic gap on the relationship between records management and information security has been identified in the academic literature.  Methodology Using targeted search strategies this annotated bibliography draws together articles from a range of journals with the aim of developing a consolidated resource for practitioners to become acquainted with the multifaceted and multidisciplinary nature of information security. The outcome is a resource directly relevant to the New Zealand context, which identifies key perspectives, relationships, technical issues, and shortcomings in research.  Results Key findings relate to publishing trends, divided disciplines, and shortcomings in research pertaining to records management relationships with IT groups and engagement in e-government.  Implications Includes the development of more comprehensive e-government information and security strategies, the re-examination and utilisation of existing relationships, and the strengthening of records management's position as a contributor to research and leadership in the array of possible responses to information security.</p>


2021 ◽  
Author(s):  
◽  
Brendan Feary

<p>Research Problem Maintaining privacy and confidentiality of data in an age of e-government and electronic recordkeeping is one of the key challenges for records management staff today. In New Zealand this issue has attracted negative attention through several recent public sector privacy and security breaches, raising questions about systemic issues, accountability, and a disconnect between strategy and implementation. How government responds will depend in large measure on the advice received regarding solutions to information security. A bibliographic gap on the relationship between records management and information security has been identified in the academic literature.  Methodology Using targeted search strategies this annotated bibliography draws together articles from a range of journals with the aim of developing a consolidated resource for practitioners to become acquainted with the multifaceted and multidisciplinary nature of information security. The outcome is a resource directly relevant to the New Zealand context, which identifies key perspectives, relationships, technical issues, and shortcomings in research.  Results Key findings relate to publishing trends, divided disciplines, and shortcomings in research pertaining to records management relationships with IT groups and engagement in e-government.  Implications Includes the development of more comprehensive e-government information and security strategies, the re-examination and utilisation of existing relationships, and the strengthening of records management's position as a contributor to research and leadership in the array of possible responses to information security.</p>


Sign in / Sign up

Export Citation Format

Share Document