Skip to main content

Governance and Risk Management of Network and Information Security: The Role of Public Private Partnerships in Managing the Existing and Emerging Risks

  • Conference paper

Part of the Communications in Computer and Information Science book series (CCIS,volume 92)

Abstract

Globalisation and new technology has opened the gates to more security risks. As the strategic importance of communication networks and information increased, threats to the security and safety of communication infrastructures, as well as information stored in and/or transmitted increased significantly. The development of the self replicating programmes has become a nightmare for Internet users. Leading companies, strategic organisations were not immune to attacks; they were also “hacked” and overtaken by intruders. Incidents of recent years have also shown that national/regional crisis may also trigger cyber attacks at large scale. Experts forecast that cyber wars are likely to take the stage as tension mounts between developed societies. New risks such as cyber-attacks, network terrorism and disintegration of traditional infrastructures has somewhat blurred the boundaries of operation and control. This paper seeks to consider the risk management and governance and looking more specifically at implications for emerging economies.

Keywords

  • Risk Management
  • Information Security
  • Network Security
  • Public Private Partnership
  • Security Investment

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • DOI: 10.1007/978-3-642-15717-2_19
  • Chapter length: 8 pages
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
eBook
USD   109.00
Price excludes VAT (USA)
  • ISBN: 978-3-642-15717-2
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD   139.00
Price excludes VAT (USA)

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. http://www.symantec.com/content/en/us/about/presskits/SES_report_Feb2010.pdf (last accessed on 12/04/2010)

  2. Allaz, B., Vila, J.-L.: Cournot Competition, Forward Markets and Effciency. Journal of Economic Theory 59, 1–16 (1993)

    MATH  CrossRef  Google Scholar 

  3. Anderson, R.: Why information security is hard: An economic perspective. In: Proc. 17th Annual Comput. Security Appl. Conf. (December 2001)

    Google Scholar 

  4. Braynov, S., Sandholm, T.: Incentive compatible mechanism for trust revelation. In: Proceedings of the First International Joint Conference on Autonomous Agents and Multi-Agent Systems, Bologna, Italy (July 2002)

    Google Scholar 

  5. Cohen, E.: The CIA and the declassification of history. International Journal of Intelligence and Counterintelligence 12, 338–345 (1999)

    CrossRef  Google Scholar 

  6. Gal-Or, Ghose: The Economic Incentives for Sharing Security Information. Information Systems Research 16(2), 186–208 (2005)

    CrossRef  Google Scholar 

  7. Godard, O., Henry, C., Lagadec, P., Michel-Kerjan, E.: Traité des nouveaux risques: Précaution, Crise, Assurance, Gallimard, Folio Actuel, Paris (2002)

    Google Scholar 

  8. Gordon, L.A., Loeb, M.: The economics of information security investment. ACM Trans. Inform. System Security 5(4), 438–457 (2002)

    CrossRef  Google Scholar 

  9. Gordon, L.A., Loeb, M., Lucyshyn, W.: Sharing information on computer systems security: An economic analysis. J. Accounting Public Policy 22(6), 461–485 (2003)

    CrossRef  Google Scholar 

  10. Mickhail, G.: National Security and the Misology-Misanthropy Paradox of Technology. Australia and the New Technologies: Evidence Based Policy in Public Administration, July 22, pp. 80–86. University of Wollongong Press, Wollongong (2008)

    Google Scholar 

  11. Rios, M.J., de Magalgaes, S.T., Santos, L., Jahankhani, H.: The Georgia’s Cyberwar. In: Proceedings of the 5th International Conference on Global Security, Safety, and Sustainability (ICGS3), pp. 35–42 (2009)

    Google Scholar 

  12. Rios, J.M., de Magalgaes, S.T., Santos, L., Jahankhani, H.: The People’s Republic of China – The Emerging Cyberpower. In: Proceedings of the 5th International Conference on Global Security, Safety, and Sustainability (ICGS3), pp. 138–144 (2009)

    Google Scholar 

  13. INSA (2009)

    Google Scholar 

  14. Handley Schachler, M., Navare, J.: Port risk management and Public Private Partnerships: factors relating to risk allocation and risk sustainability. World Review of Intermodal Transportation Research 3(1-2) (2010)

    Google Scholar 

  15. Seligman, A.: The Problem of Trust. Princeton University Press, Princeton (2000)

    Google Scholar 

  16. Ungoed-Thomas, J., Sheehan, M.: Hackershold city banks to ransom. The Sunday Times, p. 30 (September 19, 1999)

    Google Scholar 

  17. Vogel, D.J.: The study of business and politics. California Management Review 38, 146–165 (1996)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Navare, J., Gemikonakli, O. (2010). Governance and Risk Management of Network and Information Security: The Role of Public Private Partnerships in Managing the Existing and Emerging Risks. In: Tenreiro de Magalhães, S., Jahankhani, H., Hessami, A.G. (eds) Global Security, Safety, and Sustainability. ICGS3 2010. Communications in Computer and Information Science, vol 92. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15717-2_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-15717-2_19

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-15716-5

  • Online ISBN: 978-3-642-15717-2

  • eBook Packages: Computer ScienceComputer Science (R0)