This paper explores the nexus between digital transformation and cybersecurity, examining professional perceptions of these intertwined concepts As Industry 4.0 reshapes organizations and society, digital technologies and connectivity become pivotal. Businesses adopting e-business and cloud computing encounter challenges like information security and disruptive innovations, propelling digital transformation. However, this shift introduces new risks, particularly in cybersecurity, altering risk distribution and security requirements. The widespread integration of interconnected devices across business functions makes them vulnerable to cyber-attacks, necessitating robust cybersecurity measures. This study scrutinizes factors preventing unintentional and intentional security incidents and maps cyber risk perceptions. Through a survey of 124 professionals in collaboration with BUSIBER, we elucidate risk perception and implemented controls, essential for organizations to navigate the digital landscape securely and safeguard their market reputation. Understanding the impacts of digitalization and cybersecurity on diverse business functions is crucial for devising effective strategies to mitigate risks and ensure sustainable development.
DOCUMENT
In May 2018, the new Dutch Intelligence and Security Services Act 2017 (Wet op de Inlichtingen- en veiligheidsdiensten, Wiv) will enter into force. It replaces the previous 2002 Act and incorporates many reforms to the information gathering powers of the two intelligence and security services as well as to the accountability and oversight mechanisms. Due to the technologyneutral approach, both the civil and the military intelligence services are now authorized to, for example, intercept communications in bulk, hack third parties, decrypt files, store DNA or use any other future innovative technology. Also, the national security legislation extends the possibilities for the indiscriminate collection of data, and for the processing, storage and analysis thereof. The process leading to the law includes substantial criticism from the various stakeholders involved. Upon publication of this report, an official consultative referendum is being organized on the new act. The aim of this policy brief is to provide an international audience with a comprehensive overview of the most relevant aspects of the act and its context. In addition, there is considerable focus on the checks and balances as well as the bottlenecks of the Dutch intelligence gathering reform. The selection of topics is based on the core issues addressed during the parliamentary debate and on the authors’ insights.
DOCUMENT
Worldwide there is a lack of well-educated and experienced information security specialists. The first step to address this issue is arranging enough people with a well-known and acceptable basic level of information security competences. However, there might be a lot of information security education and training, but there is anything but a well-defined outflow level with a known and acceptable basic level of information security competences. There exists a chaotic situation in respect of the qualification of information security professionals, with the emergence of a large number of difficult to compare certificates and job titles. Apparently the information security field requires uniform qualifications that are internationally recognized. Such qualifications could be an excellent way of unambiguously clarifying the knowledge and skills of information security professionals. Furthermore it gives educational institutions a framework which facilitates the development of appropriate information security education and training.
DOCUMENT
In this paper we research the following question: What motivational factors relate, in which degree, to intentions on compliance to ISP and how could these insights be utilized to promote endusers compliance within a given organization? The goal of this research is to provide more insight in the motivational factors applicable to ISP and their influence on end-user behavior, thereby broadening knowledge regarding information systems security behaviors in organizations from the viewpoint of non-malicious abuse and offer a theoretical explanation and empirical support. The outcomes are also useful for practitioners to complement their security training and awareness programs, in the end helping enterprises better effectuate their information security policies. In this study an instrument is developed that can be used in practice to measure an organizational context on the effects of six motivational factors recognized. These applicable motivational factors are determined from literature and subsequently evaluated and refined by subject matter experts. A survey is developed, tested in a pilot, refined and conducted within four organizations. From the statistical analysis, findings are reported and conclusions on the hypothesis are drawn. Recommended Citation Straver, Peter and Ravesteyn, Pascal (2018) "End-users Compliance to the Information Security Policy: A Comparison of Motivational Factors," Communications of the IIMA: Vol. 16 : Iss. 4 , Article 1. Available at: https://scholarworks.lib.csusb.edu/ciima/vol16/iss4/1
MULTIFILE
The sense of safety and security of older people is a widely acknowledged action domain for policy and practice in age-friendly cities. Despite an extensive body of knowledge on the matter, the theory is fragmented, and a classification is lacking. Therefore, this study investigated how older people experience the sense of safety and security in an age-friendly city. A total of four focus group sessions were organised in The Hague comprising 38 older people. Based on the outcomes of the sessions, the sense of safety and security was classified into two main domains: a sense of safety and security impacted by intentional acts and negligence (for instance, burglary and violence), and a sense of safety and security impacted by non-intentional acts (for instance, incidents, making mistakes online). Both domains manifest into three separate contexts, namely the home environment, the outdoor environment and traffic and the digital environment. In the discussions with older people on these derived domains, ideas for potential improvements and priorities were also explored, which included access to information on what older people can do themselves to improve their sense of safety and security, the enforcement of rules, and continuous efforts to develop digital skills to improve safety online. Original article at MDPI; DOI: https://doi.org/10.3390/ijerph19073960
MULTIFILE
The Internet and computers increasingly determine our daily lives. This goes for almost everyone in the Netherlands. Still, it is mostly teenagers who are well informed on how to use all the possibilities of new technologies. They are building a digital world of their own that parents usually know very little about. This booklet intends to inform teachers, parents and other interested parties on what teenagers are actually doing online and how important it is to keep abreast of the new developments that the Internet and computers bring into their world. On the basis of research into these issues in the Netherlands and abroad we attempt to indicate what the digital world of teenagers looks like and how it differs from that of grown-ups. What do they do, exactly, and why? We also look into teenagers’ ICT behaviour and into dangers and abuse of the Internet. Moreover we provide tips for parents and teachers on how to handle certain phenomena. This book does not pretend to provide an exhaustive overview of the digital world of teenagers. It is focused on some important characteristics and parts of that world. It reports on research of the INHOLLAND Centre for eLearning into various aspects of ICT behaviour among teenagers. The research was undertaken in the spring of 2006, focusing mainly on texting, networking, gaming, dangers and abuse on the Internet and the digital relation between school and the home. Ultimately we are especially concerned with the question of what teenagers really learn in their digital world, and how education can profit. This book also addresses that issue.
DOCUMENT
This essay explores the notion of resilience by providing a theoretical context and subsequently linking it to the management of safety and security. The distinct worlds of international security, industrial safety and public security have distinct risks as well as distinct ‘core purposes and integrities’ as understood by resilience scholars. In dealing with risks one could argue there are three broad approaches: cost-benefit analysis, precaution and resilience. In order to distinguish the more recent approach of resilience, the idea of adaptation will be contrasted to mitigation. First, a general outline is provided of what resilience implies as a way to survive and thrive in the face of adversity. After that, a translation of resilience for the management of safety and security is described. LinkedIn: https://www.linkedin.com/in/juul-gooren-phd-cpp-a1180622/
DOCUMENT
Technological developments go fast and are interrelated and multi-interpretable. As consumer needs change, the technological possibilities to meet those needs are constantly evolving and new technology providers introduce new disruptive business models. This makes it difficult to predict what the world of tomorrow will look like for an organization and that makes the risks for organizations substantial. In this context, it is difficult for organizations to determine what constitutes a good strategy to adopt digital developments. This paper describes a first step of a study with the objective to design a method for organizations to formulate a future-proof strategy in a rapidly changing, complex and ambiguous context. More specifically, this paper describes the results of a sequence of three focus groups that were held with a group of eight experts, with extensive experience as members of the decision making unit in organizations. The objectives of these sessions were to determine possible solutions for the outlined challenge in order to provide direction for continuation and scoping of the following research phases.
MULTIFILE
1e alinea column: Op 3 december j.l. berichtte Nu.nl naar aanleiding van een gehouden onderzoek dat cyberaanvallen binnen twee jaar van nu als het grootste bedrijfsrisico in Nederland gezien moeten worden en als een groter risico dan economische onzekerheid.
LINK
This article focuses on the recent judgment of the Court of Justice, Aranyosi and Caldararu. After conducting a legal analysis on this case, three issues are identified and they are separately discussed in three sections. The aim of this paper is to show the impact of this judgment on public order and public security in Europe on the one hand and on the individual’s fundamental rights, on the other hand. It is going to be argued that even though there are limits to the principle of mutual recognition, this new exception based on fundamental rights establishes a new procedure for non-surrender. Therefore, the Court of Justice creates a non-execution ground which the EU legislator did not intend to include in the Framework Decision on the European arrest warrant. This is explained by looking at the three interconnected notions of Freedom, Security and Justice.
DOCUMENT