Identifying Security Risks of Digital Transformation - An Engineering Perspective

被引:8
作者
Anh Nguyen Duc [1 ]
Chirumamilla, Aparna [2 ]
机构
[1] Univ South Eastern Norway, Business Sch, Bo I Telemark, Norway
[2] Norwegian Univ Sci & Technol, IDI, Trondheim, Norway
来源
DIGITAL TRANSFORMATION FOR A SUSTAINABLE SOCIETY IN THE 21ST CENTURY | 2019年 / 11701卷
关键词
Digital transformation; Cybersecurity; Software vulnerability; Internet-of-Things; Cloud computing; Big data; Artificial intelligence;
D O I
10.1007/978-3-030-29374-1_55
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Technological advancements continue to disrupt how organizations compete and create value in almost every industry and society. The recent digital transformation movement has expanded the reliance of companies and organizations in software technologies, such as cloud computing, big data, artificial intelligence, internet-of-things, and also increase the risk associated with software usage. This work aims at identifying security risks associated with these technologies from an engineering management perspective. We conducted two focused groups and a literature review to gather and discuss the list of security risks. The findings have implications for both practitioners to manage software security risks and future research work.
引用
收藏
页码:677 / 688
页数:12
相关论文
共 39 条
[1]  
[Anonymous], 2013, 2013 International Conference on Collaboration Technologies and Systems (CTS), DOI [10.1109/cts.2013.6567202, DOI 10.1109/CTS.2013.6567202]
[2]  
[Anonymous], 2018, PON COST DAT BREACH
[3]  
[Anonymous], 2008, DIGITAL LITERACIES C
[4]  
Behl A, 2012, PROCEEDINGS OF THE 2012 WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES, P109, DOI 10.1109/WICT.2012.6409059
[5]  
Creswell J., 2009, Research Design, DOI DOI 10.2307/1523157
[6]  
Duc A. N., 2017, P XP2017 SCI WORKSH, P1
[7]   Security Testing: A Survey [J].
Felderer, Michael ;
Buechler, Matthias ;
Johns, Martin ;
Brucker, Achim D. ;
Breu, Ruth ;
Pretschner, Alexander .
ADVANCES IN COMPUTERS, VOL 101, 2016, 101 :1-51
[8]  
Fitzgerald M, 2013, MIT SLOAN MANAGE REV, V54, P15
[9]  
Furnell S, 2005, COMPUT FRAUD SECUR, P4, DOI 10.1016/S1361-3723(05)70210-4
[10]   Beyond the hype: Big data concepts, methods, and analytics [J].
Gandomi, Amir ;
Haider, Murtaza .
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2015, 35 (02) :137-144