Humanitarian perspective of cybersecurity and cybersecurity governance

Rossouw De Bruin, S. H. Von Solms

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

4 Citations (Scopus)

Abstract

The state of national security is an evolving concern, as entities and organizations may be aware of the security of their information and their asset - the same can unfortunately not be said about the risks they may face. These risks are not only limited to the non-existence of security procedures. Existing security can be severely flawed, especially if there is non-conformance towards policies, practices and procedures. When looking at humanitarian actions, we can easily identify these flaws. Unfortunately, humanitarian aid has to compete with factors from within the states, countries and continents they are working in. As our research indicates, humanitarian agencies are some of the agencies that do not always take security into consideration. The purpose of this paper will be to introduce the importance of cybersecurity and cybersecurity governance with respect to humanitarian work. We will also introduce and briefly discuss a model that can be used by humanitarian agencies to assess, manage and maintain their cybersecurity and cybersecurity governance efforts.

Original languageEnglish
Title of host publication2017 IST-Africa Week Conference, IST-Africa 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781905824571
DOIs
Publication statusPublished - 8 Nov 2017
Event2017 IST-Africa Week Conference, IST-Africa 2017 - Windhoek, Namibia
Duration: 31 May 20172 Jun 2017

Publication series

Name2017 IST-Africa Week Conference, IST-Africa 2017

Conference

Conference2017 IST-Africa Week Conference, IST-Africa 2017
Country/TerritoryNamibia
CityWindhoek
Period31/05/172/06/17

Keywords

  • Cybersecurity
  • Cybersecurity governance
  • Cybersecurity maturity
  • Humanities
  • Maturity
  • Maturity model

ASJC Scopus subject areas

  • Conservation
  • Computer Networks and Communications
  • Computer Science Applications
  • Information Systems and Management
  • Development
  • Education
  • Geography, Planning and Development
  • Cultural Studies

Fingerprint

Dive into the research topics of 'Humanitarian perspective of cybersecurity and cybersecurity governance'. Together they form a unique fingerprint.

Cite this