The Role of Trust and Co-partnership in the Societal Digital Security Culture Approach

Information and communication technology systems have become indispensable parts of our lives up to become the main strategic dimension to be protected by the State. Nonetheless, we have seen so far that the technical security is not enough for protecting the global cyberspace. A valid complement (usable) to technical solutions has been found in a Societal Digital Security Culture (SDSC) as a set of collective knowledge, common practices, and intuitive common behavior about digital security that the members of a Society share.The idea is that members of the Society need to gain knowledge and experience sufficient to avoid the consequences of the limitations of technical solutions. Under this prospective, this paper's aim is to draw the attention on trust and co-partnership like two main components of the SDSC approach that can boost the security of Information Systems.

[1]  Sheila Rosenblum,et al.  Stability and Change , 1981, Environment, Development, and Public Policy.

[2]  Chun Wie Choo Information management for the intelligent organization (2nd ed.): the art of scanning the environment , 1999 .

[3]  Albert L. Lederer,et al.  Key predictors of the implementation of strategic information systems plans , 2003, DATB.

[4]  Eugene Schultz Security training and awareness - fitting a square peg in a round hole , 2004, Comput. Secur..

[5]  Giuseppe Cattaneo,et al.  FeelTrust: Providing Trustworthy Communications in Ubiquitous Mobile Environment , 2013, 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA).

[6]  Kregg Aytes,et al.  Computer Security and Risky Computing Practices: A Rational Choice Perspective , 2004, J. Organ. End User Comput..

[7]  David A. Mundie,et al.  Insider Threat Defined: Discovering the Prototypical Case , 2014, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..

[8]  Effy Oz,et al.  Organizational Commitment and Ethical Behavior: An Empirical Study of Information System Professionals , 2001 .

[9]  S. Rosenblum,et al.  Stability and Change: Innovation in an Educational Context , 1981 .

[10]  S. Wiedenbeck,et al.  Human Factors and Information Security , 2004 .

[11]  Blaise Cronin,et al.  Information Management for the Intelligent Organization: the Art of Scanning the Environment , 1997, Inf. Process. Manag..

[12]  Yang-Im Lee Strategic transformational management in the context of inter-organizational and intra-organizational partnership development , 2009 .

[13]  Antonio Colella,et al.  Security Paradigm in Ubiquitous Computing , 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[14]  Yang-Im Lee,et al.  A security framework for protecting business, government and society from cyber attacks , 2010, 2010 5th International Conference on System of Systems Engineering.

[15]  Ken Doughty Implementing enterprise security: a case study , 2003, Comput. Secur..

[16]  Mahadev Satyanarayanan,et al.  Pervasive computing: vision and challenges , 2001, IEEE Wirel. Commun..

[17]  Bharat K. Bhargava,et al.  A Case for Societal Digital Security Culture , 2013, SEC.

[18]  Dieter Gollmann,et al.  From Insider Threats to Business Processes that are Secure-by-Design , 2011, 2011 Third International Conference on Intelligent Networking and Collaborative Systems.

[19]  Aniello Castiglione,et al.  Network Profiling: Content Analysis of Users Behavior in Digital Communication Channel , 2012, CD-ARES.

[21]  Dieter Gollmann,et al.  Guest Editorial: Emerging Trends in Research for Insider Threat Detection , 2014, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..