1,314 research outputs found
Recommended from our members
Cyber insurance of information systems: Security and privacy cyber insurance contracts for ICT and helathcare organizations
Nowadays, more-and-more aspects of our daily activities are digitalized. Data and assets in the cyber-space, both for individuals and organizations, must be safeguarded. Thus, the insurance sector must face the challenge of digital transformation in the 5G era with the right set of tools. In this paper, we present CyberSure-an insurance framework for information systems. CyberSure investigates the interplay between certification, risk management, and insurance of cyber processes. It promotes continuous monitoring as the new building block for cyber insurance in order to overcome the current obstacles of identifying in real-time contractual violations by the insured party and receiving early warning notifications prior the violation. Lightweight monitoring modules capture the status of the operating components and send data to the CyberSure backend system which performs the core decision making. Therefore, an insured system is certified dynamically, with the risk and insurance perspectives being evaluated at runtime as the system operation evolves. As new data become available, the risk management and the insurance policies are adjusted and fine-tuned. When an incident occurs, the insurance company possesses adequate information to assess the situation fast, estimate accurately the level of a potential loss, and decrease the required period for compensating the insured customer. The framework is applied in the ICT and healthcare domains, assessing the system of medium-size organizations. GDPR implications are also considered with the overall setting being effective and scalable
Technology ethics
Abstract. Technology ethics is a topic at the frontier of the modern day development. Mostly because due to the fact that our our reliance on technology increases as we become more accustomed to the pace of technological development. Hence, it is important for us understand the ethical implications that arise with these advances. Therefore, this article provides an introduction and foundation for technology ethics, data protection and artificial intelligence.Keywords. IT ethics, Data protection, AI, GDPR.JEL. H20, E40, M15
Cybersecurity in healthcare: A narrative review of trends, threats and ways forward
Electronic healthcare technology is prevalent around the world and creates huge potential to improve clinical outcomes and transform care delivery. However, there are increasing concerns relating to the security of healthcare data and devices. Increased connectivity to existing computer networks has exposed medical devices to new cybersecurity vulnerabilities. Healthcare is an attractive target for cybercrime for two fundamental reasons: it is a rich source of valuable data and its defences are weak. Cybersecurity breaches include stealing health information and ransomware attacks on hospitals, and could include attacks on implanted medical devices. Breaches can reduce patient trust, cripple health systems and threaten human life. Ultimately, cybersecurity is critical to patient safety, yet has historically been lax. New legislation and regulations are in place to facilitate change. This requires cybersecurity to become an integral part of patient safety. Changes are required to human behaviour, technology and processes as part of a holistic solution
Reducing Ransomware Crime: Analysis of Victims' Payment Decisions
In this paper, the decision-making processes of victims during ransomware attacks were analysed. Forty-one ransomware attacks using qualitative data collected from organisations and police officers from cybercrime units in the UK were examined. The hypothesis tested in this paper is that victims carefully analyse the situation before deciding whether to pay a ransom. This research confirms that victims often weigh the costs and benefits of interventions before making final decisions, and that their decisions are based on a range of reasons. As ransomware attacks become more prevalent globally, the findings should be highly relevant to those developing guidance and policies to prevent or minimise ransom payments
Remote Workers, Ever-Present Risk: Employer Liability for Data Breaches in the Era of Hybrid Workplaces
The years since the onset of the COVID-19 pandemic have seen explosive growth in the number of remote workers, and companies have struggled to cope with a perceived loss of productivity and establish reliable methods of remote access to cope with this influx. At the same time, the last few years have seen a continued rise in the threat of data breaches, as sophisticated groups of malicious actors have targeted businesses and governments, locking systems with ransomware and exposing sensitive company data and employees\u27 personal information. This article aims to examine the intersection between these two trends, examining how an employer’s policies for enabling remote work and monitoring remote employees can significantly impact the employer’s potential liability in the event of a data breach. After surveying the current state of remote work and data breach law, this article examines the potential interplay between remote work and a data breach in a private company through a series of linked hypotheticals, closing with proposals for legislative reform to ensure greater data security and practical recommendations for employers seeking to mitigate the risks created by a remote workforce
Recommended from our members
Developing a usable security approach for user awareness against ransomware
This thesis was submitted for the award of Doctor of Philosophy and was awarded by Brunel University LondonThe main purpose of the research presented in this thesis is to design and develop
a game prototype for improving user awareness against ransomware, which has been
reported as the most significant cyber security threat to the United Kingdom by the
National Cyber Security Centre. Digital transformation is helping individuals, organisations,
governments and Industrial control systems to modernise and improve
their effectiveness. At the same time, cyber crimes are evolving and targeting essential
services. A successful cyber attack can compromise users’ privacy, bring bad
publicity and financial damage to organisations and target national security.
A literature review was conducted to understand threats to the cyber social
system. Literature in this thesis reports attackers exploit humans as the weakest
link to execute successful security breaches. Therefore to address this challenge, a
significant gap has been identified as an opportunity to contribute to user awareness
of the ransomware cyber security threat.
The current thesis proposes RansomAware a novel game prototype to improve
user awareness. The game is based on Technology Threat Avoidance Theory (TTAT)
model. In this thesis two studies are carried out, study 1 empirically validates the
elements of TTAT to be embedded in the RansomAware prototype and reports a
significant change in users’ motivation to avoid ransomware cyber security threat
55% and avoidance behaviour 29%, whereas study 2 evaluates game usability and
report significant results of SUS average score of 87.58 and statistical results of p <
0.01 indicate user’s satisfaction of the RansomAware. Finally, the research provides
guidelines on how the proposed RansomAware game can be adopted by practitioners
and individuals to improve their awareness against the ransomware cyber security
threat
Protection of Data in Armed Conflict
This article presents a novel way to conceptualize the protection of data in situations of armed conflict. Although the question of the targeting of data through adversarial military cyber operations and its implications for the qualification of such conduct under International Humanitarian Law has been on scholars’ and states’ radar for the last few years, there remain a number of misunderstandings as to how to think about the notion of “data.” Based on a number of fictional scenarios, the article clarifies the pertinent terminology and makes some expedient distinctions between various types of data. It then analyzes how existing international humanitarian and international human rights law applies to cyber operations whose effects have an impact on data. The authors argue that given the persisting ambiguities of traditional concepts such as “object” and “attack” under international humanitarian law, the targeting of content data continues to fall into a legal grey zone, which potentially has wide-ranging ramifications both for the rights of individual civilians and the functioning of civilian societies during situations of conflict. At the same time, much legal uncertainty surrounds the application of human rights law to these contexts, and existing data protection frameworks explicitly exclude taking effect in relation to issues of security. Acknowledging these gaps, the article attempts to advance the debate by proposing a paradigm shift: Instead of taking existing rules on armed conflict and applying them to “data,” we should contemplate applying the principles of data protection, data security, and privacy frameworks to military cyber operations in armed conflict
- …