Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Issue title: The Third IEEE International Symposium on Security in Networks and Distributed Systems
Article type: Research Article
Authors: Hagen, Janne Meretea; * | Sivertsen, Tormod Kalbergb | Rong, Chunmingc
Affiliations: [a] Gjøvik University College, Norway | [b] Norwegian Defence Research Establishment (FFI), Norway. E-mail: tks@ffi.no | [c] University of Stavanger (UiS), University of Oslo/UNIK, Norway. E-mail: chunming.rong@uis.no
Correspondence: [*] Corresponding author: J.M. Hagen, Gjøvik University College, Postboks 191, Teknologivn. 22, N-2802 Gjøvik, Norway. Tel.: +47 61 13 51 00; Fax: +47 61 13 51 70; E-mail: janne.hagen@hig.no.
Abstract: Computer Crime Surveys are important inputs to management and authorities, providing information on the national IT security status. Such measurement instruments are increasingly valuable as more and more enterprises become critically dependent on IT and the Internet. The article presents a selection of findings from the Norwegian Computer Crime and Security Survey 2006 and discusses strengths and weaknesses of the survey. The survey reveals that next to malware infection and theft of IT equipment, hacking is the most commonly reported computer crime incident. The findings also document that there are large differences in security practices between large and small enterprises, even when it comes to measures one would have thought that all enterprises independent of size would have implemented. This practice may put small enterprises in a position of high risk. This is also worrying in a national context as small enterprises make up the majority of the total number of enterprises. Similar to previous surveys, the 2006 survey shows that the number of reported computer crime incidents is low because of weak detection mechanisms. Finally, a SWOT analysis of the 2006 survey is conducted to review improvements of the survey as a measurement tool.
Keywords: Access control, computer crime, information security, best practice
DOI: 10.3233/JCS-2008-16305
Journal: Journal of Computer Security, vol. 16, no. 3, pp. 341-366, 2008
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
sales@iospress.com
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
info@iospress.nl
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office info@iospress.nl
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
china@iospress.cn
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
如果您在出版方面需要帮助或有任何建, 件至: editorial@iospress.nl