Weak signals in information security management

  • Authors:
  • Jorma Kajava;Reijo Savola;Rauno Varonen

  • Affiliations:
  • University of Oulu, Oulu, Finland;VTT Technical Research Centre of Finland, Oulu, Finland;University of Oulu, Oulu, Finland

  • Venue:
  • CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

Usually, information security management practices do not explicitly take account of weak signals, factors that lie below the detection surface, which may, however, constitute a huge security threat. This study analyses what kinds of weak signals are present in information security, followed by a discussion on their detection. Responses to weak signals are also considered as well as certain privacy concerns related to the issue. These issues are of great urgency not only for government officials responsible of public security and dealing with the current wave of terrorism, but also to corporate information security and top managers running the day to day business of their companies.