Cybersecurity and Privacy in Government

Permanent URI for this collectionhttps://hdl.handle.net/10125/107464

Browse

Recent Submissions

Now showing 1 - 6 of 6
  • Item type: Item ,
    Academia Leadership in Improving the Cybersecurity Posture of Government and Local Communities
    (2024-01-03) White, Greg; Sjelin, Natalie; West, Jeremy; Boppana, Rajendra
    Cyberattacks on communities have been on the rise for more than a decade. The Center for Infrastructure Assurance and Security at The University of Texas at San Antonio has been working with states and communities for over two decades to address this issue. In the beginning, the efforts were centered around conducting cybersecurity exercises for states and communities but after conducting a number of these it became obvious that more was needed. A model was developed to follow to establish cybersecurity programs for states and communities a number of whom were then introduced to this model. It was then determined that what was lacking was a champion to be the catalyst for establishing a whole-community cybersecurity program. This paper will discuss what has been learned as to what entity within communities appears to have the best chance of success at being a successful community catalyst.
  • Item type: Item ,
    Uncovering Critical Resources and Factors Influencing the Use of Threat Intelligence Sharing Platforms
    (2024-01-03) Sauerwein, Clemens; Wenzl, Christina; Breu, Ruth
    Threat intelligence sharing is an effective security control to develop situational awareness of the rapidly growing number of new, increasingly sophisticated and targeted cyber threats. This collaborative practice involves the sharing of valuable data, information and knowledge about emerging threats, vulnerabilities and attack patterns between organisations and authorities to strengthen overall security. Although this is a promising solution, there has been limited research focused on understanding the critical resources and factors that influence the use of threat intelligence sharing platforms. To address this research gap, we conducted a systematic literature review by analysing 34 papers. In doing so, we identified 9 benefits and 14 challenges regarding the use of threat intelligence sharing platforms. Based on them we derived three critical resources and four influential factors on the use of threat intelligence sharing and discussed their relationships.
  • Item type: Item ,
    The Digital Empowerment Paradox: The Experience in Denmark
    (2024-01-03) Pries-Heje, Jan; Fleron, Benedicte; Baskerville, Richard
    Many paradoxes accompany the vast digitalization taking place in society today. There is a digitalization paradox; there are myriad cybersecurity paradoxes;and there are digital versions of other well-known paradoxes. This paper explains a paradox arising when nations (or organizations) seek to improve society (or operations) by empowering citizens (or clients) and governance (or processes) through digitalization. This empowerment paradox results from the use of digitalization to empower a class of digitalization beneficiaries that simultaneously disempowers a class of digitalization victims. The effects on these classes of people or organizations may be intended or unintended. This paper uses historical research methodology to examine the case of the digitalization of Denmark, one of the most digitalized nations in the World. Our study of the development of this national digitalization experience is a cycle of victory in achieving massive digitalization accompanied by defeat in helping to victimize its citizens and other stakeholders.
  • Item type: Item ,
    Privacy in UK Police Digital Forensics Investigations
    (2024-01-03) Van Schaik, Paul; Irons, Alastair; Renaud, Karen
    Background: Privacy is a human right, but what happens when a person’s privacy rights encounter legitimate police investigations? Is it even possible to carry out these investigations in a privacy-respecting way? If the person being investigated makes use of privacy-enhancing technologies (PETs), how does this impact digital forensics investigations? Aim: The aim of our study was to identify how privacy rights and the use of PETs influence police digital forensics practice. Methods: We carried out a study with 10 digital forensics investigators from UK police forces to explore how considerations of privacy and citizens’ PET use inform or affect digital forensics investigations. Results: We identified specific uses of privacy-related principles that ought to apply in digital forensics investigation, and issues for digital forensics investigation from citizens’ use of PETs. Conclusions: We concluded with potential implications for practice and ideas for future research to reconcile the law enforcement activities with individual citizens’ inalienable privacy rights.
  • Item type: Item ,
    A worldwide overview on the information security posture of online public services
    (2024-01-03) Silva, João Marco; Ribeiro, Diogo; Ramos, Luis Felipe; Fonte, Vítor
    The availability of public services through online platforms has improved the coverage and efficiency of essential services provided to citizens worldwide. These services also promote transparency and foster citizen participation in government processes. However, the increased online presence also exposes sensitive data exchanged between citizens and providers to a wider range of security threats. Therefore, ensuring the security and trustworthiness of online services is crucial to Electronic Government (EGOV) initiatives' success. Hence, this work assesses the security posture of 3068 governmental domains across all UN Member States in three dimensions: support for secure communication protocols, the trustworthiness of their digital certificate chains, and services' exposure to known vulnerabilities. The results indicate that despite the rapid development, the public sector still falls short in adopting international standards and best security practices in services and infrastructure management. This reality poses significant risks to citizens and services across all regions and income levels.
  • Item type: Item ,
    Introduction to the Minitrack on Cybersecurity and Privacy in Government
    (2024-01-03) Harrison, Keith; White, Greg; Conklin, Wm. Arthur