{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,25]],"date-time":"2024-05-25T20:10:02Z","timestamp":1716667802518},"reference-count":43,"publisher":"IGI Global","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10,1]]},"abstract":"<p>Contemporary organisations in any industry are increasingly dependent on information systems. Today most organisations are online all the time, and their internal systems are used in environments that are already or easily connected to the internet. The paper analyses cyber threats and their potential effect on the operations of different organisations with the use of scenario analysis. The scenarios are built based on a literature review. One outcome of the analysis is that to an organisation it is irrelevant where a cyber threat originates from and who it is targeted for. If the threat is specifically targeted to the organisation or if the threat is collateral in nature is not important; preparing for the threat is important in both cases. The paper discusses the pressures that the cyber threats pose to information security policies, and what the role of the information security policy could be in preparing for the threats.<\/p>","DOI":"10.4018\/ijcwt.2013100103","type":"journal-article","created":{"date-parts":[[2014,4,9]],"date-time":"2014-04-09T14:26:13Z","timestamp":1397053573000},"page":"22-31","source":"Crossref","is-referenced-by-count":0,"title":["Preparing for Cyber Threats with Information Security Policies"],"prefix":"10.4018","volume":"3","author":[{"given":"Ilona","family":"Ilvonen","sequence":"first","affiliation":[{"name":"Tampere University of Technology, Tampere, Finland"}]},{"given":"Pasi","family":"Virtanen","sequence":"additional","affiliation":[{"name":"Tampere University of Technology, Tampere, Finland"}]}],"member":"2432","reference":[{"key":"ijcwt.2013100103-0","doi-asserted-by":"publisher","DOI":"10.1145\/1721654.1721672"},{"key":"ijcwt.2013100103-1","author":"S.Barman","year":"2001","journal-title":"Writing information security policies"},{"key":"ijcwt.2013100103-2","doi-asserted-by":"publisher","DOI":"10.1108\/09576050210447019"},{"key":"ijcwt.2013100103-3","doi-asserted-by":"crossref","unstructured":"Boss, S. R., Kirsch, L. J., Angermeier, I., Shingler, R. A., & Boss, R. W. (2009). If someone is watching, I'll do what I'm asked: mandatoriness, control, and information security. European Journal of Information Systems, 18(2, Special Issue: Behavioral and Policy Issues in Information), 151-164.","DOI":"10.1057\/ejis.2009.8"},{"issue":"3","key":"ijcwt.2013100103-4","doi-asserted-by":"crossref","first-page":"523","DOI":"10.2307\/25750690","article-title":"Information security policy compliance: An empirical study of rationality-based beliefs an information security awareness.","volume":"34","author":"B.Bulcuru","year":"2010","journal-title":"Management Information Systems Quarterly"},{"key":"ijcwt.2013100103-5","doi-asserted-by":"crossref","DOI":"10.52922\/ti275639","author":"K.-K. R.Choo","year":"2011","journal-title":"Cyber threat landscape faced by financial and insurance industry"},{"key":"ijcwt.2013100103-6","doi-asserted-by":"publisher","DOI":"10.4018\/ijcwt.2011010103"},{"key":"ijcwt.2013100103-7","author":"N. F.Doherty","year":"2005","journal-title":"Do information security policies reduce the incidence of security breaches: An exploratory analysis"},{"key":"ijcwt.2013100103-8","author":"K.Dunham","year":"2009","journal-title":"Mobile malware attacks and defense"},{"key":"ijcwt.2013100103-9","unstructured":"Evans, B. (2012). Big data set to explode as 40 billion new devices connect to the internet. Retrieved December 20, 2012, from http:\/\/www.forbes.com\/sites\/oracle\/2012\/11\/06\/big-data-set-to-explode-as-40-billion-new-devices-connect-to-internet\/"},{"key":"ijcwt.2013100103-10","first-page":"31","article-title":"Transnation cyber crime, differences between national laws and development of european legislation: By repression.","volume":"2","author":"N.Foggetti","year":"2008","journal-title":"Masaryk UJL & Tech."},{"key":"ijcwt.2013100103-11","doi-asserted-by":"crossref","unstructured":"Herath, T., & Rao, H. R. (2009) Protection motivation and deterrence: a framework for security policy compliance in organisations. European Journal of Information Systems, 18(2, Special Issue: Behavioral and Policy Issues in Information), 106-125.","DOI":"10.1057\/ejis.2009.6"},{"key":"ijcwt.2013100103-12","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(02)00504-7"},{"key":"ijcwt.2013100103-13","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican1106-70"},{"key":"ijcwt.2013100103-14","unstructured":"Ilvonen, I. (2009, July 6-7). Information security policies in small Finnish companies. In Proceedings of the 8th European Conference on Information Warfare and Security, Lisbon, Portugal."},{"key":"ijcwt.2013100103-15","unstructured":"Information Services and Technology (IST). (2013). Viruses, spyware, and malware. Massachusetts Institute of Technology. Retrieved February 20, 2013, from http:\/\/ist.mit.edu\/security\/malware"},{"key":"ijcwt.2013100103-16","doi-asserted-by":"publisher","DOI":"10.1504\/IJESDF.2007.013588"},{"key":"ijcwt.2013100103-17","unstructured":"James, J. (2012) How much data is created every minute? A DOMO infographic. Retrieved February 20, 2012, from http:\/\/www.domo.com\/blog\/2012\/06\/how-much-data-is-created-every-minute\/?dkw=socf3"},{"key":"ijcwt.2013100103-18","unstructured":"Jie-miao, C. (2008) China\u2019s legislation on criminal jurisdiction over cyber crimes. Modern Law Science, 3, 012."},{"key":"ijcwt.2013100103-19","unstructured":"Keizer, G. (2011). Ransomware squeezes users with bogus Windows activation demand but F-secure sniffed out unlock code to stymie extortion scheme. ComputerWorld, Apr 11th, 2011. Retrieved February 20, 2013, from http:\/\/www.computerworld.com\/s\/article\/9215711\/Ransomware_squeezes_users_with_bogus_Windows_activation_demand"},{"key":"ijcwt.2013100103-20","doi-asserted-by":"publisher","DOI":"10.1016\/j.intman.2005.09.009"},{"key":"ijcwt.2013100103-21","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.212"},{"key":"ijcwt.2013100103-22","doi-asserted-by":"publisher","DOI":"10.1108\/09685221011035223"},{"key":"ijcwt.2013100103-23","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2002.1008533"},{"key":"ijcwt.2013100103-24","unstructured":"Lopes, I., & S\u00e1-Soares, F. (2012). Information security policies: A content analysis. In Proceedings of the Pacific Asia Conference on Information Systems (PACIS), Hochiminh, Vietnam."},{"key":"ijcwt.2013100103-25","doi-asserted-by":"crossref","unstructured":"Malgeri, J. (2009). Cyber security: A national effort to improve. In Proceedings of the 2009 Information Security Curriculum Development Conference (pp. 107\u2013113).","DOI":"10.1145\/1940976.1940998"},{"issue":"1&2","key":"ijcwt.2013100103-26","article-title":"The council of Europe\u2019s cyber crime treaty: An exercise in symbolic legislation.","volume":"4","author":"N. E.Marion","year":"2010","journal-title":"International Journal of Cyber Criminology"},{"key":"ijcwt.2013100103-27","unstructured":"Meehan, P. (2013). Cyber threats hit close to home. Philly.com, the Inquirerer, Feb. 4th, 2013. Retrieved February 6, 2013, from http:\/\/www.philly.com\/philly\/opinion\/inquirer\/20130204_Cyber_threats_hit_close_to_home.html"},{"key":"ijcwt.2013100103-28","unstructured":"MOT Oxford dictionary of English. (2013)."},{"key":"ijcwt.2013100103-29","unstructured":"Ottis, R. (2008). Analysis of the 2007 cyber attacks against Estonia from the information warfare perspective. In Proceedings of the 7th European Conference on Information Warfare and Security."},{"key":"ijcwt.2013100103-30","doi-asserted-by":"crossref","unstructured":"Pearson, S. (2009). Taking account of privacy when designing cloud computing services. In Proceedings of the ICSE Workshop on Software Engineering Challenges of Cloud Computing (CLOUD\u201909) (pp. 44\u201352).","DOI":"10.1109\/CLOUD.2009.5071532"},{"key":"ijcwt.2013100103-31","doi-asserted-by":"crossref","unstructured":"Pearson, S., & Benameur, A. (2010). Privacy, security and trust issues arising from cloud computing. In Proceedings of the 2010 IEEE Second International Conference on Cloud Computing Technology and Science (CloudCom) (pp. 693\u2013702).","DOI":"10.1109\/CloudCom.2010.66"},{"key":"ijcwt.2013100103-32","author":"T. R.Peltier","year":"2005","journal-title":"Information security fundamentals"},{"key":"ijcwt.2013100103-33","doi-asserted-by":"publisher","DOI":"10.1080\/03071847.2012.664354"},{"key":"ijcwt.2013100103-34","unstructured":"The Centre for Critical Infrastructure Protection. (CCIP). (2013). What are the cyber threats? New Zealand\u2019s government communications security bureau (GCSB). Retrieved February 20, 2013, from http:\/\/www.ccip.govt.nz\/"},{"key":"ijcwt.2013100103-35","unstructured":"The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT). (2013). Cyber threat source descriptions. Department of Homeland Security. Retrieved February 20, 2013, from http:\/\/ics-cert.us-cert.gov\/csthreats.html"},{"key":"ijcwt.2013100103-36","author":"H.Tipton","year":"2004","journal-title":"Information security management handbook"},{"key":"ijcwt.2013100103-37","doi-asserted-by":"publisher","DOI":"10.4018\/ijcwt.2012070102"},{"key":"ijcwt.2013100103-38","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.10.005"},{"key":"ijcwt.2013100103-39","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.05.002"},{"key":"ijcwt.2013100103-40","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.01.013"},{"key":"ijcwt.2013100103-41","doi-asserted-by":"publisher","DOI":"10.4018\/ijcwt.2011040102"},{"key":"ijcwt.2013100103-42","unstructured":"Waters, J. (2012). The new year's biggest cyberthreats. The Wall Street Journal (Europe ed.), Dec. 29th 2012. Retrieved February 20, 2013, from http:\/\/online.wsj.com\/article\/SB10001424127887323277504578193833434470690.html"}],"container-title":["International Journal of Cyber Warfare and Terrorism"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=105189","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,25]],"date-time":"2024-05-25T19:52:37Z","timestamp":1716666757000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/ijcwt.2013100103"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2013,10,1]]},"references-count":43,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2013,10]]}},"URL":"https:\/\/doi.org\/10.4018\/ijcwt.2013100103","relation":{},"ISSN":["1947-3435","1947-3443"],"issn-type":[{"value":"1947-3435","type":"print"},{"value":"1947-3443","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,10,1]]}}}