Download full text
(438.9Kb)
Citation Suggestion
Please use the following Persistent Identifier (PID) to cite this document:
https://nbn-resolving.org/urn:nbn:de:0168-ssoar-105004-3
Exports for your reference manager
Towards Systemic IT Security: Introducing a Holistic Conceptual Framework for a Society-centered Perspective Connecting IT and Cyber Security
Wege zu einer systemischen IT-Sicherheit: Einführung eines ganzheitlichen konzeptionellen Rahmens für eine gesellschaftsorientierte Perspektive, die IT- und Cybersicherheit miteinander verbindet
[conference paper]
Corporate Editor
IEEE Conference Publishing Services
Abstract Digital systems are everywhere and we rely so much on those ubiquitous and interconnected systems that "the networked digital" could be called a hyper-infrastructure. But given the ongoing grave IT security incidents it still is a defective one. To approach this societal IT security problem I build ... view more
Digital systems are everywhere and we rely so much on those ubiquitous and interconnected systems that "the networked digital" could be called a hyper-infrastructure. But given the ongoing grave IT security incidents it still is a defective one. To approach this societal IT security problem I build on IT security theory and cyber security research to suggest a new paradigm called systemic IT security extending traditional individualistic understandings. Firstly, I map out the academic consensus on how the current state of IT security is not sufficient given the role IT plays in digitally networked societies. I then illustrate the societal consequences of IT insecurity using two major real-world incidents, the Mirai botnet and the WannaCry ransomware. Based on those characteristic examples, I flesh out how the current individualistic paradigm of IT security theory can not sufficiently grasp the increasingly interconnected nature of the issue. For furthering the fruitful academic discourse, I propose the holistic concept of systemic IT security. With it I define a criteria framework for extending current IT security approaches with the seven dimensions: problem scope, impact, timing, fairness, effective responsibility, resilience and complication. This framework can be used to extend IT security theory, assess concrete IT security measures in a structured manner, and even analyze policies regarding their contribution to systemic IT security. Flanking the framework I propose the new IT security protection goal of intention and expectation alignment and two new actor categories for threat modeling: systems manufacturers and service operators. Finally, the argument is summarized and the scientific merits of the new perspective are explicated: a more contextualized society-aware understanding of IT security.... view less
Keywords
information technology; security; threat; new technology; digitalization; networking; effects of technology
Classification
Sociology of Science, Sociology of Technology, Research on Science and Technology
Free Keywords
information security; IT security; cyber security; society; politics of cyber security; resilience; ethics; interdependence; theory; threat modeling
Collection Title
2025 IEEE 9th International Conference on Cryptography, Security and Privacy (CSP)
Conference
9. International Conference on Cryptography, Security and Privacy (CSP). Okinawa, Japan, 2025
Document language
English
Publication Year
2025
City
Okinawa
Page/Pages
p. 144-155
DOI
https://doi.org/10.1109/CSP66295.2025.00032
ISBN
979-8-3315-2469-2
Status
Postprint; peer reviewed
Licence
Deposit Licence - No Redistribution, No Modifications