In the last decade, organizations have re-engineered their business processes and started using standard software solutions. Integration of structured data in relational databases has improved documentation of business transactions and increased data quality. But almost 90% of the information cannot be integrated in relational data bases. This amount of ‘unstructured’ information is exploding within the Enterprise 2.0. The use of social media tools to enhance collaboration, creates corporate blogs, wikis, forums, and other types of unstructured information. Structured and unstructured information are records, meant and used as evidence for policies, decisions, products, actions and transactions. Most stakeholders are making increasing demands for the trustworthiness of records for accountability reasons. In this age of evolving social media use, organizational chains, inter-organizational data warehouses and cloud computing, it is crucial for the Enterprise 2.0. that its policies, decisions, products, actions and transactions can be reliably reconstructed in context. Digital Archiving is a necessity for the Enterprise 2.0.: the reconstruction of the past depends on records and their meta data. Blogs, wikis, forums, etc., used for collaboration within the business processes of the organization, need to be documented for reconstruction in the future. Digital Archiving is a combination of three mechanisms: enterprise records management, organizational memory and records auditing. These mechanisms ensure that a digitized organization as the Enterprise 2.0. has a documented understanding of its past. In that way, it improves organizational accountability.
Prior research on network attacks is predominantly technical, yet little is known about behavioral patterns of attackers inside computer systems. This study adopts a criminological perspective to examine these patterns, with a particular focus on data thieves targeting organizational networks. By conducting interviews with cybersecurity experts and applying crime script analysis, we developed a comprehensive script that describes the typical progression of attackers through organizational systems and networks in order to eventually steal data. This script integrates phases identified in previous academic literature and expert-defined phases that resemble phases from industry threat models. However, in contrast to prior cybercrime scripts and industry threat models, we did not only identify sequential phases, but also illustrate the circular nature of network attacks. This finding challenges traditional perceptions of crime as a linear process. In addition, our findings underscore the importance of considering both successful and failed attacks in cybercrime research to develop more effective cybersecurity strategies.
MULTIFILE
Recente studies gebruiken een sterk variërende terminologie voor het benoemen van de opbrengsten van interventies met buurtverhalenwebsites. Onze literatuurstudie ordent deze terminologie tot drie meer eenduidige analyseniveaus, die naadloos aansluiten op het empowerment model: concepten op microniveau voor individuele opbrengsten, op mesoniveau voor groepsvoordelen en op macroniveau voor versterking van de gemeenschap. Op het macroniveau onderscheiden we drie concepten: collectief geheugen, cultureel burgerschap en gemeenschapskracht. Met betrekking tot alle niveaus zijn de beweringen in de huidige literatuur voornamelijk gebaseerd op offline data en bevatten zelden een analyse van online participatie. Deze eenzijdigheid wordt veroorzaakt door de focus op institutionele interventies, die vaak onbedoeld online participatie verhinderen. Desondanks, presenteert de literatuur het open en online karakter van buurtverhalenwebsites als de drijvende kracht voor empowerment, in het bijzonder op het meso- en macroniveau. Om de bestaande kennis op het gebied van buurtverhalenwebsites uit te breiden stellen we onderzoek voor dat de daadwerkelijke samenstelling van dit veld in kaart brengt en meer autonome initiatieven bestudeert.