Towards a complex systems approach to legal and economic impact analysis of critical infrastructures |
|
Author: | Schaberreiter, Thomas1,2; Quirchmayr, Gerald1,3; Juuso, Anna-Maija4; |
Organizations: |
1University of Vienna; Faculty of Computer Science Währinger Straße 29, A-1090 Vienna 2University of Oulu; Faculty of Information Technology and Electrical Engineering P.O.Box 4500, FI-90014 University of Oulu 3Ferdinand Porsche FernFH Zulingergasse 4, A-2700 Wr. Neustadt
4University of Oulu; Oulu Business Scool Pentti Kaiteran katu 1, FI-90014 University of Oulu
5Luxembourg Institute of Science and Technology; IT for Innovative Services 5, avenue des Hauts-Fourneaux, L-4362 Esch-sur-Alzette |
Format: | article |
Version: | accepted version |
Access: | open |
Online Access: | PDF Full Text (PDF, 0.6 MB) |
Persistent link: | http://urn.fi/urn:nbn:fi-fe202003208615 |
Language: | English |
Published: |
Institute of Electrical and Electronics Engineers,
2016
|
Publish Date: | 2020-03-20 |
Description: |
AbstractInformation security has become interdependent, global and critical — it has become cybersecurity. In this complex environment, legal consideration and economic incentives are as integral to ensuring the security of information systems as the technological realization. In this paper, we argue that comprehensive cybersecurity requires that these three disciplines are considered together. To this end, we propose a legal analysis framework, which can can be used to study legal and economic requirements for cybersecurity in relation to technological realities. The framework yields concrete recommendations, which complex system and critical infrastructure stakeholders can utilize to improve security within their networks. The analysis framework aims to offer key stakeholders a better understanding of the legal and economic requirements for cybersecurity and provide them with recommendations that are in line with modern cybersecurity strategies, including the enhancement of cooperation and collaboration capabilities and the implementation of other state-of-the-art security mechanisms. see all
|
ISBN Print: | 978-1-5090-0990-9 |
Pages: | 668 - 676 |
DOI: | 10.1109/ARES.2016.65 |
OADOI: | https://oadoi.org/10.1109/ARES.2016.65 |
Host publication: |
Proceedings of 2016 11th international conference on availability, reliability and security |
Conference: |
International Conference on Availability, Reliability and Security |
Type of Publication: |
A4 Article in conference proceedings |
Field of Science: |
213 Electronic, automation and communications engineering, electronics |
Subjects: | |
Copyright information: |
© 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. |