Show simple item record

Wege zu einer systemischen IT-Sicherheit: Einführung eines ganzheitlichen konzeptionellen Rahmens für eine gesellschaftsorientierte Perspektive, die IT- und Cybersicherheit miteinander verbindet
[conference paper]

dc.contributor.authorRehak, Rainerde
dc.date.accessioned2025-09-23T10:16:59Z
dc.date.available2025-09-23T10:16:59Z
dc.date.issued2025de
dc.identifier.isbn979-8-3315-2469-2de
dc.identifier.urihttps://www.ssoar.info/ssoar/handle/document/105004
dc.description.abstractDigital systems are everywhere and we rely so much on those ubiquitous and interconnected systems that "the networked digital" could be called a hyper-infrastructure. But given the ongoing grave IT security incidents it still is a defective one. To approach this societal IT security problem I build on IT security theory and cyber security research to suggest a new paradigm called systemic IT security extending traditional individualistic understandings. Firstly, I map out the academic consensus on how the current state of IT security is not sufficient given the role IT plays in digitally networked societies. I then illustrate the societal consequences of IT insecurity using two major real-world incidents, the Mirai botnet and the WannaCry ransomware. Based on those characteristic examples, I flesh out how the current individualistic paradigm of IT security theory can not sufficiently grasp the increasingly interconnected nature of the issue. For furthering the fruitful academic discourse, I propose the holistic concept of systemic IT security. With it I define a criteria framework for extending current IT security approaches with the seven dimensions: problem scope, impact, timing, fairness, effective responsibility, resilience and complication. This framework can be used to extend IT security theory, assess concrete IT security measures in a structured manner, and even analyze policies regarding their contribution to systemic IT security. Flanking the framework I propose the new IT security protection goal of intention and expectation alignment and two new actor categories for threat modeling: systems manufacturers and service operators. Finally, the argument is summarized and the scientific merits of the new perspective are explicated: a more contextualized society-aware understanding of IT security.de
dc.languageende
dc.subject.ddcSoziologie, Anthropologiede
dc.subject.ddcSociology & anthropologyen
dc.subject.otherinformation security; IT security; cyber security; society; politics of cyber security; resilience; ethics; interdependence; theory; threat modelingde
dc.titleTowards Systemic IT Security: Introducing a Holistic Conceptual Framework for a Society-centered Perspective Connecting IT and Cyber Securityde
dc.title.alternativeWege zu einer systemischen IT-Sicherheit: Einführung eines ganzheitlichen konzeptionellen Rahmens für eine gesellschaftsorientierte Perspektive, die IT- und Cybersicherheit miteinander verbindetde
dc.description.reviewbegutachtet (peer reviewed)de
dc.description.reviewpeer revieweden
dc.source.collection2025 IEEE 9th International Conference on Cryptography, Security and Privacy (CSP)de
dc.publisher.countryJPNde
dc.publisher.cityOkinawa
dc.subject.classozWissenschaftssoziologie, Wissenschaftsforschung, Technikforschung, Techniksoziologiede
dc.subject.classozSociology of Science, Sociology of Technology, Research on Science and Technologyen
dc.subject.thesozInformationstechnologiede
dc.subject.thesozinformation technologyen
dc.subject.thesozSicherheitde
dc.subject.thesozsecurityen
dc.subject.thesozBedrohungde
dc.subject.thesozthreaten
dc.subject.thesozneue Technologiede
dc.subject.thesoznew technologyen
dc.subject.thesozDigitalisierungde
dc.subject.thesozdigitalizationen
dc.subject.thesozVernetzungde
dc.subject.thesoznetworkingen
dc.subject.thesozTechnikfolgende
dc.subject.thesozeffects of technologyen
dc.identifier.urnurn:nbn:de:0168-ssoar-105004-3
dc.rights.licenceDeposit Licence - Keine Weiterverbreitung, keine Bearbeitungde
dc.rights.licenceDeposit Licence - No Redistribution, No Modificationsen
ssoar.contributor.institutionWeizenbaum-Institut für die vernetzte Gesellschaftde
internal.statusformal und inhaltlich fertig erschlossende
internal.identifier.thesoz10047425
internal.identifier.thesoz10036566
internal.identifier.thesoz10037879
internal.identifier.thesoz10053171
internal.identifier.thesoz10063943
internal.identifier.thesoz10053144
internal.identifier.thesoz10043853
dc.type.stockincollectionde
dc.type.documentKonferenzbeitragde
dc.type.documentconference paperen
dc.source.pageinfo144-155de
internal.identifier.classoz10220
internal.identifier.document16
dc.contributor.corporateeditorIEEE Conference Publishing Services
dc.source.conferenceInternational Conference on Cryptography, Security and Privacy (CSP)de
dc.event.cityOkinawa, Japande
internal.identifier.corporateeditor1502
internal.identifier.ddc301
dc.identifier.doihttps://doi.org/10.1109/CSP66295.2025.00032de
dc.date.conference2025de
dc.source.conferencenumber9de
dc.description.pubstatusPostprintde
dc.description.pubstatusPostprinten
internal.identifier.licence3
internal.identifier.pubstatus2
internal.identifier.review1
dc.subject.classhort50200de
internal.pdf.validtrue
internal.pdf.wellformedtrue
internal.pdf.encryptedfalse


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record