Cyber security readiness in the South Australian Government

被引:8
|
作者
Borgman, Brenton [1 ,2 ]
Mubarak, Sameera [1 ]
Choo, Kim-Kwang Raymond [1 ]
机构
[1] Univ S Australia, Informat Assurance Res Grp, Adelaide, SA 5001, Australia
[2] South Australian Govt, Auditor Gen Dept, Adelaide, SA 5000, Australia
关键词
Cyber security; Information security management framework (ISMF); Information security management system (ISMS); South Australian Government; Whole of government approach; INFORMATION SECURITY; ORGANIZATIONS; GOVERNANCE; THREAT;
D O I
10.1016/j.csi.2014.06.002
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we conducted a series of face-to-face interviews with 17 participants from 11 SA government entities, with the aim of validating whether existing processes and strategic direction were sufficient to satisfactorily achieve the implementation of an ISMS and classification of data for the respective SA government entities. Based on our interviews and review of ISMS associated reviews conducted within other Australian State and Territory jurisdictions, we identify key areas that the SA Government may need to consider as part of the progressive roll-out of the other phases of ISMF version 3 implementation up and to June 2017. (C) 2014 Elsevier B.V. All rights reserved.
引用
收藏
页码:1 / 8
页数:8
相关论文
共 50 条
  • [1] Organization Benefit as an Outcome of Organizational Security Adoption: The Role of Cyber Security Readiness and Technology Readiness
    Berlilana
    Noparumpa, Tim
    Ruangkanjanases, Athapol
    Hariguna, Taqwa
    Sarmini
    [J]. SUSTAINABILITY, 2021, 13 (24)
  • [2] The Government of Canada and Cyber Security: Security Begins at Home
    Adams, John
    [J]. JOURNAL OF MILITARY AND STRATEGIC STUDIES, 2012, 14 (02):
  • [3] National Cyber Security in South Africa: A Letter to the Minister of Cyber Security
    von Solms, Rossouw
    von Solms, Basie
    [J]. PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2015), 2015, : 369 - 374
  • [4] The Influence of Governmental Support on Cyber-Security Adoption and Performance: The Mediation of Cyber Security and Technological Readiness
    Al-Sharhan, Aleyah
    Alsaber, Ahmad
    Al Khasham, Yousef
    Al Kandari, Anwaar
    Nafea, Rania
    Setiya, Parul
    [J]. INTERNATIONAL JOURNAL OF BUSINESS DATA COMMUNICATIONS AND NETWORKING, 2024, 19 (01)
  • [5] Information Security Readiness of Government Institution in Indonesia
    Kautsarina
    Gautama, Hasyim
    [J]. 2014 2ND INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICOICT), 2014,
  • [6] Survey of Cyber Security Awareness in Health, Social Services and Regional Government in South Ostrobothnia, Finland
    Haukilehto, Tero
    Hautamaki, Jari
    [J]. INTERNET OF THINGS, SMART SPACES, AND NEXT GENERATION NETWORKS AND SYSTEMS, NEW2AN 2019, RUSMART 2019, 2019, 11660 : 455 - 466
  • [7] A Cyber-Security Culture Framework for Assessing Organization Readiness
    Georgiadou, Anna
    Mouzakitis, Spiros
    Bounas, Kanaris
    Askounis, Dimitrios
    [J]. JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2022, 62 (03) : 452 - 462
  • [8] Assessing Cyber-Security Readiness of Nigeria to Industry 4.0
    Ukwandu, Elochukwu
    Okafor, Ephraim N. C.
    Ikerionwu, Charles
    Olebara, Comfort
    Ugwu, Celestine
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CYBERSECURITY, SITUATIONAL AWARENESS AND SOCIAL MEDIA, CYBER SCIENCE 2022, 2023, : 355 - 374
  • [9] A Readiness Model for Measuring the Maturity of Cyber Security Incident Management
    Rieger, David
    Tjoa, Simon
    [J]. ADVANCES IN INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS, 2019, 23 : 283 - 293
  • [10] Cyber Security Readiness in Iraq: Role of the Human Rights Activists
    AbdulAmeer, Sabah Auda
    Saleh, Waad Raad
    Hussam, Ragheed
    Al-Hareeri, Hanen
    Alghazali, Tawfeeq
    Mezaal, Yaqeen S.
    Saeed, Ikbal Naji
    [J]. INTERNATIONAL JOURNAL OF CYBER CRIMINOLOGY, 2022, 16 (02): : 1 - 14