SSOAR Logo
    • Deutsch
    • English
  • Deutsch 
    • Deutsch
    • English
  • Einloggen
SSOAR ▼
  • Home
  • Über SSOAR
  • Leitlinien
  • Veröffentlichen auf SSOAR
  • Kooperieren mit SSOAR
    • Kooperationsmodelle
    • Ablieferungswege und Formate
    • Projekte
  • Kooperationspartner
    • Informationen zu Kooperationspartnern
  • Informationen
    • Möglichkeiten für den Grünen Weg
    • Vergabe von Nutzungslizenzen
    • Informationsmaterial zum Download
  • Betriebskonzept
Browsen und suchen Dokument hinzufügen OAI-PMH-Schnittstelle
JavaScript is disabled for your browser. Some features of this site may not work without it.

Download PDF
Volltext herunterladen

(438.9 KB)

Zitationshinweis

Bitte beziehen Sie sich beim Zitieren dieses Dokumentes immer auf folgenden Persistent Identifier (PID):
https://nbn-resolving.org/urn:nbn:de:0168-ssoar-105004-3

Export für Ihre Literaturverwaltung

Bibtex-Export
Endnote-Export

Statistiken anzeigen
Weiterempfehlen
  • Share via E-Mail E-Mail
  • Share via Facebook Facebook
  • Share via Bluesky Bluesky
  • Share via Reddit reddit
  • Share via Linkedin LinkedIn
  • Share via XING XING

Towards Systemic IT Security: Introducing a Holistic Conceptual Framework for a Society-centered Perspective Connecting IT and Cyber Security

Wege zu einer systemischen IT-Sicherheit: Einführung eines ganzheitlichen konzeptionellen Rahmens für eine gesellschaftsorientierte Perspektive, die IT- und Cybersicherheit miteinander verbindet
[Konferenzbeitrag]

Rehak, Rainer

Körperschaftlicher Herausgeber
IEEE Conference Publishing Services

Abstract

Digital systems are everywhere and we rely so much on those ubiquitous and interconnected systems that "the networked digital" could be called a hyper-infrastructure. But given the ongoing grave IT security incidents it still is a defective one. To approach this societal IT security problem I build ... mehr

Digital systems are everywhere and we rely so much on those ubiquitous and interconnected systems that "the networked digital" could be called a hyper-infrastructure. But given the ongoing grave IT security incidents it still is a defective one. To approach this societal IT security problem I build on IT security theory and cyber security research to suggest a new paradigm called systemic IT security extending traditional individualistic understandings. Firstly, I map out the academic consensus on how the current state of IT security is not sufficient given the role IT plays in digitally networked societies. I then illustrate the societal consequences of IT insecurity using two major real-world incidents, the Mirai botnet and the WannaCry ransomware. Based on those characteristic examples, I flesh out how the current individualistic paradigm of IT security theory can not sufficiently grasp the increasingly interconnected nature of the issue. For furthering the fruitful academic discourse, I propose the holistic concept of systemic IT security. With it I define a criteria framework for extending current IT security approaches with the seven dimensions: problem scope, impact, timing, fairness, effective responsibility, resilience and complication. This framework can be used to extend IT security theory, assess concrete IT security measures in a structured manner, and even analyze policies regarding their contribution to systemic IT security. Flanking the framework I propose the new IT security protection goal of intention and expectation alignment and two new actor categories for threat modeling: systems manufacturers and service operators. Finally, the argument is summarized and the scientific merits of the new perspective are explicated: a more contextualized society-aware understanding of IT security.... weniger

Thesaurusschlagwörter
Informationstechnologie; Sicherheit; Bedrohung; neue Technologie; Digitalisierung; Vernetzung; Technikfolgen

Klassifikation
Wissenschaftssoziologie, Wissenschaftsforschung, Technikforschung, Techniksoziologie

Freie Schlagwörter
information security; IT security; cyber security; society; politics of cyber security; resilience; ethics; interdependence; theory; threat modeling

Titel Sammelwerk, Herausgeber- oder Konferenzband
2025 IEEE 9th International Conference on Cryptography, Security and Privacy (CSP)

Konferenz
9. International Conference on Cryptography, Security and Privacy (CSP). Okinawa, Japan, 2025

Sprache Dokument
Englisch

Publikationsjahr
2025

Erscheinungsort
Okinawa

Seitenangabe
S. 144-155

DOI
https://doi.org/10.1109/CSP66295.2025.00032

ISBN
979-8-3315-2469-2

Status
Postprint; begutachtet (peer reviewed)

Lizenz
Deposit Licence - Keine Weiterverbreitung, keine Bearbeitung


GESIS LogoDFG LogoOpen Access Logo
Home  |  Impressum  |  Betriebskonzept  |  Datenschutzerklärung
© 2007 - 2025 Social Science Open Access Repository (SSOAR).
Based on DSpace, Copyright (c) 2002-2022, DuraSpace. All rights reserved.
 

 


GESIS LogoDFG LogoOpen Access Logo
Home  |  Impressum  |  Betriebskonzept  |  Datenschutzerklärung
© 2007 - 2025 Social Science Open Access Repository (SSOAR).
Based on DSpace, Copyright (c) 2002-2022, DuraSpace. All rights reserved.