Abstract
The state of national security is an evolving concern, as entities and organizations may be aware of the security of their information and their asset - the same can unfortunately not be said about the risks they may face. These risks are not only limited to the non-existence of security procedures. Existing security can be severely flawed, especially if there is non-conformance towards policies, practices and procedures. When looking at humanitarian actions, we can easily identify these flaws. Unfortunately, humanitarian aid has to compete with factors from within the states, countries and continents they are working in. As our research indicates, humanitarian agencies are some of the agencies that do not always take security into consideration. The purpose of this paper will be to introduce the importance of cybersecurity and cybersecurity governance with respect to humanitarian work. We will also introduce and briefly discuss a model that can be used by humanitarian agencies to assess, manage and maintain their cybersecurity and cybersecurity governance efforts.
| Original language | English |
|---|---|
| Title of host publication | 2017 IST-Africa Week Conference, IST-Africa 2017 |
| Publisher | Institute of Electrical and Electronics Engineers Inc. |
| ISBN (Electronic) | 9781905824571 |
| DOIs | |
| Publication status | Published - 8 Nov 2017 |
| Event | 2017 IST-Africa Week Conference, IST-Africa 2017 - Windhoek, Namibia Duration: 31 May 2017 → 2 Jun 2017 |
Publication series
| Name | 2017 IST-Africa Week Conference, IST-Africa 2017 |
|---|
Conference
| Conference | 2017 IST-Africa Week Conference, IST-Africa 2017 |
|---|---|
| Country/Territory | Namibia |
| City | Windhoek |
| Period | 31/05/17 → 2/06/17 |
UN SDGs
This output contributes to the following UN Sustainable Development Goals (SDGs)
-
SDG 10 Reduced Inequalities
Keywords
- Cybersecurity
- Cybersecurity governance
- Cybersecurity maturity
- Humanities
- Maturity
- Maturity model
ASJC Scopus subject areas
- Conservation
- Computer Networks and Communications
- Computer Science Applications
- Information Systems and Management
- Development
- Education
- Geography, Planning and Development
- Cultural Studies
Fingerprint
Dive into the research topics of 'Humanitarian perspective of cybersecurity and cybersecurity governance'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver