@inproceedings{7378226c0fed4288a3e74e6ab3c8f627,
title = "Humanitarian perspective of cybersecurity and cybersecurity governance",
abstract = "The state of national security is an evolving concern, as entities and organizations may be aware of the security of their information and their asset - the same can unfortunately not be said about the risks they may face. These risks are not only limited to the non-existence of security procedures. Existing security can be severely flawed, especially if there is non-conformance towards policies, practices and procedures. When looking at humanitarian actions, we can easily identify these flaws. Unfortunately, humanitarian aid has to compete with factors from within the states, countries and continents they are working in. As our research indicates, humanitarian agencies are some of the agencies that do not always take security into consideration. The purpose of this paper will be to introduce the importance of cybersecurity and cybersecurity governance with respect to humanitarian work. We will also introduce and briefly discuss a model that can be used by humanitarian agencies to assess, manage and maintain their cybersecurity and cybersecurity governance efforts.",
keywords = "Cybersecurity, Cybersecurity governance, Cybersecurity maturity, Humanities, Maturity, Maturity model",
author = "{De Bruin}, Rossouw and {Von Solms}, {S. H.}",
note = "Publisher Copyright: {\textcopyright} 2017 IIMC / IST-Africa.; 2017 IST-Africa Week Conference, IST-Africa 2017 ; Conference date: 31-05-2017 Through 02-06-2017",
year = "2017",
month = nov,
day = "8",
doi = "10.23919/ISTAFRICA.2017.8102388",
language = "English",
series = "2017 IST-Africa Week Conference, IST-Africa 2017",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
booktitle = "2017 IST-Africa Week Conference, IST-Africa 2017",
address = "United States",
}