Value of data meets IT security - assessing IT security risks in data-driven value chains

被引:4
|
作者
Bitomsky, Laura [1 ]
Buerger, Olga [2 ,4 ]
Haeckel, Bjoern [3 ,4 ]
Toeppel, Jannick [3 ,4 ]
机构
[1] Univ Augsburg, FIM Res Ctr, Univ Str 12, D-86159 Augsburg, Germany
[2] Univ Bayreuth, FIM Res Ctr, Univ Str 30, D-95447 Bayreuth, Germany
[3] Univ Appl Sci Augsburg, FIM Res Ctr, Friedberger Str 2a, D-86161 Augsburg, Germany
[4] Project Grp Business & Informat Syst Engn Fraunho, Univ Str 12, D-86159 Augsburg, Germany
关键词
Data-driven value creation; Value of data; IT security; Data security; Risk assessment; BIG DATA ANALYTICS; VALUE CREATION; INFORMATION-TECHNOLOGY; MARKET REACTIONS; FRAMEWORK; INTERNET; MODEL;
D O I
10.1007/s12525-019-00383-6
中图分类号
F [经济];
学科分类号
02 ;
摘要
Digitalization forces manufacturing companies to shift towards customer-oriented, highly data-driven forms of value creation. This results in a changing IT security risk landscape as data becomes an attractive target for adversaries leading to an increasing number of attacks. In order to successfully protect data, it is essential that it is assessed in an integrated manner. Although IT security and data-based value creation have been studied by large research bodies, the existing literature fails to provide guidance on IT security risk analysis in data-based value chains. To contribute to the closure of this research gap, we propose a modeling approach which allocates different data types to value activities and analyses the data types in relation to the properties of relevant IT security risks. The evaluation, conducted with industry experts, reveals that it is not only a company's primary assets that are of concern but also less important data types subject to significant levels of exposure that bear considerable IT security risks.
引用
收藏
页码:589 / 605
页数:17
相关论文
共 50 条
  • [1] Value of data meets IT security – assessing IT security risks in data-driven value chains
    Laura Bitomsky
    Olga Bürger
    Björn Häckel
    Jannick Töppel
    [J]. Electronic Markets, 2020, 30 : 589 - 605
  • [2] Quantifying Security Risks in Cloud Infrastructures: A Data-driven Approach
    Tarahomi, Sousan
    Holz, Ralph
    Sperotto, Anna
    [J]. 2023 IEEE 9TH INTERNATIONAL CONFERENCE ON NETWORK SOFTWARIZATION, NETSOFT, 2023, : 346 - 349
  • [3] IoT Network Security: Threats, Risks, and a Data-Driven Defense Framework
    Wheelus, Charles
    Zhu, Xingquan
    [J]. IOT, 2020, 1 (02): : 259 - 285
  • [4] Differentiated management strategies on cloud computing data security driven by data value
    Wang, Zhiying
    Wang, Nianxin
    Su, Xiang
    Ge, Shilun
    [J]. INFORMATION SECURITY JOURNAL, 2016, 25 (4-6): : 280 - 294
  • [5] A data-driven approach for embedded security
    Saputra, H
    Ozturk, O
    Vijaykrishnan, N
    Kandemir, M
    Brooks, R
    [J]. IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI, PROCEEDINGS: NEW FRONTIERS IN VLSI DESIGN, 2005, : 104 - 109
  • [6] Data-driven public health security
    Li, Cuiping
    Wu, Linhuan
    Shu, Chang
    Bao, Yiming
    Ma, Juncai
    Song, Shuhui
    [J]. CHINESE SCIENCE BULLETIN-CHINESE, 2024, 69 (09): : 1156 - 1163
  • [7] Data-driven multimedia forensics and security
    Rocha, Anderson
    Li, Shujun
    Kuo, C. -C. Jay
    Piva, Alessandro
    Huang, Jiwu
    [J]. JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2018, 55 : 447 - 448
  • [8] A Data-Driven Approach to Security Science
    Iyer, Ravishankar K.
    [J]. 7TH ACM SYMPOSIUM ON INFORMATION, COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS 2012), 2012,
  • [9] A Data-driven Security Game to Facilitate Information Security Education
    Lovgren, Dag Erik Homdrum
    Li, Jingyue
    Oyetoyan, Tosin Daniel
    [J]. 2019 IEEE/ACM 41ST INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: COMPANION PROCEEDINGS (ICSE-COMPANION 2019), 2019, : 256 - 257
  • [10] Research on Security Risks and Defense Methods of Data-driven Algorithms in Power Systems
    Liu, Zengji
    Wang, Qi
    Xue, Tong
    Tang, Yi
    [J]. Zhongguo Dianji Gongcheng Xuebao/Proceedings of the Chinese Society of Electrical Engineering, 2023, 43 (12): : 4538 - 4553