Critical infrastructure information security: Impacts of identity and related crimes

Rodger Jamieson, Lesley Land, Greg Stephens, Stephen Smith, Donald Winchester

Research output: Contribution to conferenceConference paper

Abstract

The physical and digital security of a nation's critical infrastructure is necessary for its citizens, commerce and their public and private owners' to conduct successful business transactions. A complicating factor towards this security is the multi-jurisdictional nature of some critical infrastructure assets e.g., telecommunications or financial systems. Information systems (IS) and information technology are playing an ever more important role in the security of a nation's (state, territory, or province's) critical infrastructure. This longitudinal study investigates public sector critical infrastructure incidents across nine sectors in an Australia state - New South Wales. The New South Wales State Government is the largest by full-time employees in Australia. An action research methodology was employed. Data was collected by online survey, complemented by interviews and secondary data searches. Results were reinforced from independent sources. Our main finding is that NSW State Government IS security incidents against critical infrastructure assets are decreasing in both nominal and relative terms over time as prevention techniques and solutions are increasingly becoming available. However, we must be cautious in making causal inferences or generalising to other organisational situations without further study investigating other exogenous determinants.
Original languageEnglish
Publication statusPublished - 1 Dec 2009
Externally publishedYes
EventPACIS 2009 - 13th Pacific Asia Conference on Information Systems: IT Services in a Global Environment -
Duration: 1 Dec 2009 → …

Conference

ConferencePACIS 2009 - 13th Pacific Asia Conference on Information Systems: IT Services in a Global Environment
Period1/12/09 → …

Keywords

  • Critical infrastructure
  • Cyber crime
  • IS security incidents
  • Identity crime

Fingerprint

Dive into the research topics of 'Critical infrastructure information security: Impacts of identity and related crimes'. Together they form a unique fingerprint.

Cite this