Security in the Irish Information Technology Sector

被引:0
|
作者
Falk, Courtney [1 ]
机构
[1] Purdue Univ, Informat Secur, W Lafayette, IN 47907 USA
关键词
Ireland; information technology; information security; policy; governance;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper analyzes the mechanisms that the Irish governments uses to protect the information security sector of its economy. The goal of the analysis is to determine if the Irish government is adequately defending its information security resources, and if not, what measures might improve the situation. These conclusions have applications beyond Ireland to other countries that look to develop a native information security industry. Nations, especially small nation states, looking to develop an indigenous information technology component to their economy can take note of the policies and actions of the Irish government and make better informed decisions about how they themselves might go about incentivizing and maintaining an information technology sector.
引用
收藏
页码:52 / 60
页数:9
相关论文
共 50 条
  • [1] Enterprise risk management and information technology security in the financial sector
    Kwateng, Kwame Owusu
    Amanor, Christopher
    Tetteh, Francis Kamewor
    [J]. INFORMATION AND COMPUTER SECURITY, 2022, 30 (03) : 422 - 451
  • [2] Information technology security
    Elliott, AT
    [J]. NUCLEAR MEDICINE COMMUNICATIONS, 2003, 24 (12) : 1205 - 1205
  • [3] INFORMATION TECHNOLOGY FOR INDUSTRIAL SECTOR
    BENDEICH, E
    SCHULTZ, H
    [J]. WERKSTATTSTECHNIK ZEITSCHRIFT FUR INDUSTRIELLE FERTIGUNG, 1975, 65 (08): : 524 - 527
  • [4] Performance information in the Irish public sector: a comparison with the UK
    McGeough, Francis
    [J]. PUBLIC MONEY & MANAGEMENT, 2014, 34 (03) : 197 - 204
  • [5] Information security: Technology and the law
    Marvin, CR
    Levinson, CK
    [J]. TOWARD AN ELECTRONIC PATIENT RECORD '98 CONFERENCE AND EXPOSITION, PROCEEDINGS - VOLS 1-3, 1998, : A123 - A126
  • [6] Confidentiality and security in information technology
    Lefton, AB
    [J]. GENERATIONS-JOURNAL OF THE AMERICAN SOCIETY ON AGING, 1997, 21 (03): : 50 - 52
  • [7] PERSPECTIVES IN INFORMATION TECHNOLOGY SECURITY
    HIGHLAND, HJ
    [J]. IFIP TRANSACTIONS A-COMPUTER SCIENCE AND TECHNOLOGY, 1992, 13 : 440 - 446
  • [8] Standardization in Information Technology Security
    Fal’ O.M.
    [J]. Cybernetics and Systems Analysis, 2017, 53 (1) : 78 - 82
  • [9] National Information and Communication Technology Policy in Yemen: The Response of Security Sector for Decision-Making
    Nasr, Fuad Mohsen Mohammed
    Zhen, Tang
    Abdelgader, Abdeldime Mohamed Salih
    [J]. WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE, WCECS 2015, VOL II, 2015, : 738 - 742
  • [10] Need of Private and Public Sector Information Security
    Mishra, Menaka
    Upadhyay, A. K.
    [J]. 2019 9TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE & ENGINEERING (CONFLUENCE 2019), 2019, : 168 - 173