Weak signals in information security management

Jorma Kajava, Reijo Savola, Rauno Varonen

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    3 Citations (Scopus)

    Abstract

    Usually, information security management practices do not explicitly take account of weak signals, factors that lie below the detection surface, which may, however, constitute a huge security threat. This study analyses what kinds of weak signals are present in information security, followed by a discussion on their detection. Responses to weak signals are also considered as well as certain privacy concerns related to the issue. These issues are of great urgency not only for government officials responsible of public security and dealing with the current wave of terrorism, but also to corporate information security and top managers running the day to day business of their companies.
    Original languageEnglish
    Title of host publicationComputational Intelligence and Security CIS 2005
    EditorsYue Hao, Jiming Liu, Yu-Ping Wang, Yiu-ming Cheung, Hujun Yin, Licheng Jiao, Jianfeng Ma, Yong-Chang Jiao
    PublisherSpringer
    Pages508-517
    VolumePart II
    ISBN (Electronic)978-3-540-31598-8
    ISBN (Print)978-3-540-30819-5
    DOIs
    Publication statusPublished - 2005
    MoE publication typeA4 Article in a conference publication
    EventInternational Conference on Computational Intelligence and Security, CIS 2005 - Xi’an, China
    Duration: 15 Dec 200519 Dec 2005

    Publication series

    SeriesLecture Notes in Computer Science
    Volume3802
    ISSN0302-9743

    Conference

    ConferenceInternational Conference on Computational Intelligence and Security, CIS 2005
    CountryChina
    CityXi’an
    Period15/12/0519/12/05

    Keywords

    • information security

    Fingerprint Dive into the research topics of 'Weak signals in information security management'. Together they form a unique fingerprint.

  • Cite this

    Kajava, J., Savola, R., & Varonen, R. (2005). Weak signals in information security management. In Y. Hao, J. Liu, Y-P. Wang, Y. Cheung, H. Yin, L. Jiao, J. Ma, & Y-C. Jiao (Eds.), Computational Intelligence and Security CIS 2005 (Vol. Part II, pp. 508-517). Springer. Lecture Notes in Computer Science, Vol.. 3802 https://doi.org/10.1007/11596981_75