Framework for critical information infrastructure protection in smart government: a case study in Indonesia

被引:3
作者
Putro, Prasetyo Adi Wibowo [1 ]
Sensuse, Dana Indra [1 ]
Wibowo, Wahyu Setiawan Setiawan [1 ]
机构
[1] Univ Indonesia, Fac Comp Sci, Depok, Indonesia
关键词
Smart government; Critical information infrastructure; Protection; Framework; STS; PreMiSTS; MANAGEMENT MODEL; SECURITY; GOVERNANCE; IOT;
D O I
10.1108/ICS-03-2023-0031
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
PurposeThis paper aims to develop a framework for critical information infrastructure (CII) protection in smart government, an alternative measure for common cybersecurity frameworks such as NIST Cybersecurity Framework and ISO 27001. Smart government is defined as the government administration sector of CII due to its similarity as a core of smart technology.Design/methodology/approachTo ensure the validity of the data, the research methodology used in this paper follows the predicting malfunctions in socio-technical systems (PreMiSTS) approach, a variation of the socio-technical system (STS) approach specifically designed to predict potential issues in the STS. In this study, PreMiSTS was enriched with observation and systematic literature review as its main data collection method, thematic analysis and validation by experts using fuzzy Delphi method (FDM).FindingsThe proposed CII protection framework comprises several dimensions: objectives, interdependency, functions, risk management, resources and governance. For all those dimensions, there are 20 elements and 41 variables.Practical implicationsThis framework can be an alternative guideline for CII protection in smart government, particularly in government administration services.Originality/valueThe author uses PreMiSTS, a socio-technical approach combined with thematic analysis and FDM, to design a security framework for CII protection. This combination was designed as a mixed-method approach to improve the likelihood of success in an IT project.
引用
收藏
页码:112 / 129
页数:18
相关论文
共 66 条
[1]  
Abdulova E., 2021, 14 INT C MAN LARG SC, P1, DOI [10.1109/MLSD52249.2021.9600202, DOI 10.1109/MLSD52249.2021.9600202]
[2]  
Ada S., 2009, Handbook of research on social and organizational liabilities in information security, DOI DOI 10.4018/978-1-60566-132-2
[3]   Integrated protection of industrial control systems from cyber-attacks: the ATENA approach [J].
Adamsky, F. ;
Aubigny, M. ;
Battisti, F. ;
Carli, M. ;
Cimorelli, F. ;
Cruz, T. ;
Di Giorgio, A. ;
Foglietta, C. ;
Galli, A. ;
Giuseppi, A. ;
Liberati, F. ;
Neri, A. ;
Panzieri, S. ;
Pascucci, F. ;
Proenca, J. ;
Pucci, P. ;
Rosa, L. ;
Soua, R. .
INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2018, 21 :72-82
[4]  
[Anonymous], 2022, 270012022 ISOIEC, V3
[5]  
[Anonymous], 2013, ISO/IEC 27001:2013
[6]  
Anthopoulos Leonidas G., 2016, Information Polity, V21, P99, DOI 10.3233/IP-150371
[7]   Smart City and Smart Government: Synonymous or Complementary? [J].
Anthopoulos, Leonidas ;
Reddick, Christopher G. .
PROCEEDINGS OF THE 25TH INTERNATIONAL CONFERENCE ON WORLD WIDE WEB (WWW'16 COMPANION), 2016, :351-355
[8]  
Arief A, 2018, INT C ADV COMP SCI I, P93, DOI 10.1109/ICACSIS.2018.8618239
[9]  
Bailes A.J. K., 2004, Business and security: public- private sector interface and independence at the turn of the 21st century, POUND
[10]  
k5