SlideShare a Scribd company logo
1 of 2
Download to read offline
Addressing Information Security (InfoSec) Policy Gaps
                      through Participatory Design (PD) Approach.
                                    (Position Paper)

                                       Muhammad Imran Suid∗

                                           15th April 2010



Abstract

This research is a study of attitudes and behaviors towards Information Security (InfoSec) pol-
icy. The computing.co.uk report in 2008 highlights the data loss incidents happening in UK public
sector organization including the 25 million child benefits record lost in HM Revenue and Custom
(HMRC) and 17,000 data file lost in UK Border Agency (UKBA) records [3; 1; 2], clearly establishes
the facts that there are gaps between information security policy and practice. The research aims
to identify the gaps between information security policy formulation and security practice and un-
derstanding what influences the occurrences of such gaps. This research explores the gap between
information security policy and practice using the lenses of Participatory Design (PD) approach;
and also evaluates aspects and principles of public policy decision making in order to assess their
contribution to the process information security policy making.
Security policies alone do not constitute a successful security practice effort; and (Kearney, 1994)
[4] argues from participatory design perspective, that successful participation in a decision making
program might address information security policy gaps. Further, (Miller, 2006) [5] emphasizes
that public engagement initiatives are frequently met with questions about ‘impact’; which enables
policy makers design better policies by focusing on areas such contexts, alternatives and concerns
of the public. Following the line of arguments present in [4; 5], this research explores whether
there are elements of the public policy design that support the participatory design approach and
whether this combined approach might help to address the gap between information security pol-
icy and practice; and with this understanding, develop a novel approaches to information security
policy design and implementation that better influences information security practice.
My problem space is as follows:

• Different factors which influence an organization’s information security policy interpretation.
• Differences in interpretation of a successful information security policy implementations between
  policy makers and policy practitioners.

My research objectives are as follows:
   ∗
     Information Security Group, Royal Holloway University of London, Egham, Surrey TW20 0EX, UK. EMail:
m.suid@rhul.ac.uk
                                                   1
• To explore the different types of gap between information security policy and practice.
• To understand the kind of security perceptions which influence policy makers when designing
  information security policies.
• To identify which elements of public policy design might complement the participatory design
  approach in order to address information security policy practice gap.

My research questions are as follows:

•   What kinds of policy gaps can be found in information security?
•   What kinds of perception guides the information security policy makers’ decision making?
•   What influences the emergence of information security policy gap?
•   How might public policy design combined with Participatory Design (PD) approach help to close
    this information security policy gaps?

Information Security Policy Gap Taxonomy

What are the information security policy gaps?

       Information security policy formulation ⇔ Gap ⇔ Information security policy in practice

How might Participatory Design(PD) approach address these gaps?

       Public policy design in Participatory Design (PD) approach ⇔ Gap ⇔ Information secu-
       rity policy formulation & Information security policy in practice

References

1. Computing Staff.           The Top 10 Public Sector Data Losses–So Far:                       Feel-
   ing Left Out?             Don’t Worry,       You’re Bound to be Affected Soon,               2008.
   http://www.computing.co.uk/computing/analysis/2225625/top-public-sector-losses-far.
2. Contractor UK Limited.          Immigration Officials Admit 17,000 Files Are Lost, 2009.
   http://www.contractoruk.com/news/004181.html.
3. Glyn Wintle.      HMRC ”Datagate” Verdict: Further Data Loss ”A Distinct Possibility”, 2008.
   http://www.openrightsgroup.org/blog/2008/hmrc-datagate-verdict-further-data-loss-a-distinct-possibil
4. R. C. Kearney and S. W. Hays. Labor-Management Relations and Participative Decision Making: Toward
   a New Paradigm. Public Administration Review, 54(1):44–51, 1994.
5. P. Miller. Better Humans?: The Politics of Human Enhancement and Life Extension. Demos Medical
   Publishing, 2006.




                                                 2

More Related Content

What's hot

Secure channels inc. basic rules for data protection compliance
Secure channels inc.  basic rules for data protection complianceSecure channels inc.  basic rules for data protection compliance
Secure channels inc. basic rules for data protection complianceSecure Channels Inc.
 
Information policy sunil sir
Information policy sunil sirInformation policy sunil sir
Information policy sunil sirbgshalini
 
ICEGOV - Tutorial 1 - Information Policy Concepts and Principles
ICEGOV - Tutorial 1 - Information Policy Concepts and PrinciplesICEGOV - Tutorial 1 - Information Policy Concepts and Principles
ICEGOV - Tutorial 1 - Information Policy Concepts and PrinciplesICEGOV
 
Privacy by design for startups: legal and technology
Privacy by design for startups: legal and technologyPrivacy by design for startups: legal and technology
Privacy by design for startups: legal and technologyIshay Tentser
 
New opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulationsNew opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulationsUlf Mattsson
 
Governance and Information Technology
Governance and Information TechnologyGovernance and Information Technology
Governance and Information Technologykatieingersoll
 
Multi-Dimensional Privacy Protection for Digital Collaborations.
Multi-Dimensional Privacy Protection for Digital Collaborations.Multi-Dimensional Privacy Protection for Digital Collaborations.
Multi-Dimensional Privacy Protection for Digital Collaborations.CSCJournals
 
Privacy in the digital space
Privacy in the digital spacePrivacy in the digital space
Privacy in the digital spaceYves Sinka
 
The right to delete
The right to deleteThe right to delete
The right to deletePaul Bernal
 
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...IDC4EU
 
Do You Have a Roadmap for EU GDPR Compliance?
Do You Have a Roadmap for EU GDPR Compliance?Do You Have a Roadmap for EU GDPR Compliance?
Do You Have a Roadmap for EU GDPR Compliance?Ulf Mattsson
 
Cybersecurity and Data Privacy
Cybersecurity and Data PrivacyCybersecurity and Data Privacy
Cybersecurity and Data PrivacyWilmerHale
 
What is GDPR?
What is GDPR?What is GDPR?
What is GDPR?Faidepro
 
Getting Started with GDPR Compliance
Getting Started with GDPR ComplianceGetting Started with GDPR Compliance
Getting Started with GDPR ComplianceDATAVERSITY
 
Privacy issues in data analytics
Privacy issues in data analyticsPrivacy issues in data analytics
Privacy issues in data analyticsshekharkanodia
 

What's hot (20)

Secure channels inc. basic rules for data protection compliance
Secure channels inc.  basic rules for data protection complianceSecure channels inc.  basic rules for data protection compliance
Secure channels inc. basic rules for data protection compliance
 
Information policy sunil sir
Information policy sunil sirInformation policy sunil sir
Information policy sunil sir
 
Data Portability and Interoperability – OECD DIGITAL ECONOMY POLICY DIVISION ...
Data Portability and Interoperability – OECD DIGITAL ECONOMY POLICY DIVISION ...Data Portability and Interoperability – OECD DIGITAL ECONOMY POLICY DIVISION ...
Data Portability and Interoperability – OECD DIGITAL ECONOMY POLICY DIVISION ...
 
ICEGOV - Tutorial 1 - Information Policy Concepts and Principles
ICEGOV - Tutorial 1 - Information Policy Concepts and PrinciplesICEGOV - Tutorial 1 - Information Policy Concepts and Principles
ICEGOV - Tutorial 1 - Information Policy Concepts and Principles
 
Privacy by design for startups: legal and technology
Privacy by design for startups: legal and technologyPrivacy by design for startups: legal and technology
Privacy by design for startups: legal and technology
 
New opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulationsNew opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulations
 
Privacy_Trends
Privacy_TrendsPrivacy_Trends
Privacy_Trends
 
Non-Price Effects of Mergers – LYNSKEY – June 2018 OECD discussion
Non-Price Effects of Mergers – LYNSKEY – June 2018 OECD discussionNon-Price Effects of Mergers – LYNSKEY – June 2018 OECD discussion
Non-Price Effects of Mergers – LYNSKEY – June 2018 OECD discussion
 
Governance and Information Technology
Governance and Information TechnologyGovernance and Information Technology
Governance and Information Technology
 
Multi-Dimensional Privacy Protection for Digital Collaborations.
Multi-Dimensional Privacy Protection for Digital Collaborations.Multi-Dimensional Privacy Protection for Digital Collaborations.
Multi-Dimensional Privacy Protection for Digital Collaborations.
 
Privacy in the digital space
Privacy in the digital spacePrivacy in the digital space
Privacy in the digital space
 
The right to delete
The right to deleteThe right to delete
The right to delete
 
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
 
GDPR - 5 Months On!
GDPR - 5 Months On!GDPR - 5 Months On!
GDPR - 5 Months On!
 
Do You Have a Roadmap for EU GDPR Compliance?
Do You Have a Roadmap for EU GDPR Compliance?Do You Have a Roadmap for EU GDPR Compliance?
Do You Have a Roadmap for EU GDPR Compliance?
 
GNKS May 2016
GNKS May 2016GNKS May 2016
GNKS May 2016
 
Cybersecurity and Data Privacy
Cybersecurity and Data PrivacyCybersecurity and Data Privacy
Cybersecurity and Data Privacy
 
What is GDPR?
What is GDPR?What is GDPR?
What is GDPR?
 
Getting Started with GDPR Compliance
Getting Started with GDPR ComplianceGetting Started with GDPR Compliance
Getting Started with GDPR Compliance
 
Privacy issues in data analytics
Privacy issues in data analyticsPrivacy issues in data analytics
Privacy issues in data analytics
 

Similar to Imran research abstract 15042010

The top trends changing the landscape of Information Management
The top trends changing the landscape of Information ManagementThe top trends changing the landscape of Information Management
The top trends changing the landscape of Information ManagementVelrada
 
Running head GOVERNANCE AND ETHICS 1GOVERNANCE AND ETHICS5.docx
Running head GOVERNANCE AND ETHICS 1GOVERNANCE AND ETHICS5.docxRunning head GOVERNANCE AND ETHICS 1GOVERNANCE AND ETHICS5.docx
Running head GOVERNANCE AND ETHICS 1GOVERNANCE AND ETHICS5.docxjeanettehully
 
Module 10 Open Government and Data
Module 10 Open Government and DataModule 10 Open Government and Data
Module 10 Open Government and DataIPAC-IAPC
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxjeanettehully
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxglendar3
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxtodd581
 
IRJET- Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
IRJET-  	  Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...IRJET-  	  Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
IRJET- Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...IRJET Journal
 
Review of national cyber security policy 2013 by chintan pathak
Review of national cyber security policy 2013   by chintan pathakReview of national cyber security policy 2013   by chintan pathak
Review of national cyber security policy 2013 by chintan pathakChintan Pathak
 
Data Privacy and Protection in the Digital Age - pdf.pdf
Data Privacy and Protection in the Digital Age - pdf.pdfData Privacy and Protection in the Digital Age - pdf.pdf
Data Privacy and Protection in the Digital Age - pdf.pdfKarpagam Institute
 
1Ethical issues arising from use of ICT technologiesStud.docx
1Ethical issues arising from use of ICT technologiesStud.docx1Ethical issues arising from use of ICT technologiesStud.docx
1Ethical issues arising from use of ICT technologiesStud.docxdrennanmicah
 
Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...
Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...
Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...Arab Federation for Digital Economy
 
Running head CYBER SECURITY .docx
Running head CYBER SECURITY                                  .docxRunning head CYBER SECURITY                                  .docx
Running head CYBER SECURITY .docxsusanschei
 
ico-future-tech-report-20221214.pdf
ico-future-tech-report-20221214.pdfico-future-tech-report-20221214.pdf
ico-future-tech-report-20221214.pdfyashapnt
 
Introduction to Information Policy
Introduction to Information PolicyIntroduction to Information Policy
Introduction to Information PolicyNiamh Walker-Headon
 
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global ContextWCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global ContextWCIT 2014
 
CILIP Round-table on the National Data Strategy consultation
CILIP Round-table on the National Data Strategy consultationCILIP Round-table on the National Data Strategy consultation
CILIP Round-table on the National Data Strategy consultationNicholas Poole
 
WEF_IT_UnlockingValuePersonalData_CollectionUsage_Report_2013
WEF_IT_UnlockingValuePersonalData_CollectionUsage_Report_2013WEF_IT_UnlockingValuePersonalData_CollectionUsage_Report_2013
WEF_IT_UnlockingValuePersonalData_CollectionUsage_Report_2013Bill Brindley
 
Target Data Security Breach Case Study
Target Data Security Breach Case StudyTarget Data Security Breach Case Study
Target Data Security Breach Case StudyAngilina Jones
 

Similar to Imran research abstract 15042010 (20)

The top trends changing the landscape of Information Management
The top trends changing the landscape of Information ManagementThe top trends changing the landscape of Information Management
The top trends changing the landscape of Information Management
 
Running head GOVERNANCE AND ETHICS 1GOVERNANCE AND ETHICS5.docx
Running head GOVERNANCE AND ETHICS 1GOVERNANCE AND ETHICS5.docxRunning head GOVERNANCE AND ETHICS 1GOVERNANCE AND ETHICS5.docx
Running head GOVERNANCE AND ETHICS 1GOVERNANCE AND ETHICS5.docx
 
Module 10 Open Government and Data
Module 10 Open Government and DataModule 10 Open Government and Data
Module 10 Open Government and Data
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
IRJET- Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
IRJET-  	  Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...IRJET-  	  Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
IRJET- Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
 
Review questions
Review questionsReview questions
Review questions
 
Review of national cyber security policy 2013 by chintan pathak
Review of national cyber security policy 2013   by chintan pathakReview of national cyber security policy 2013   by chintan pathak
Review of national cyber security policy 2013 by chintan pathak
 
Data Privacy and Protection in the Digital Age - pdf.pdf
Data Privacy and Protection in the Digital Age - pdf.pdfData Privacy and Protection in the Digital Age - pdf.pdf
Data Privacy and Protection in the Digital Age - pdf.pdf
 
1Ethical issues arising from use of ICT technologiesStud.docx
1Ethical issues arising from use of ICT technologiesStud.docx1Ethical issues arising from use of ICT technologiesStud.docx
1Ethical issues arising from use of ICT technologiesStud.docx
 
Journal #1
Journal #1 Journal #1
Journal #1
 
Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...
Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...
Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...
 
Running head CYBER SECURITY .docx
Running head CYBER SECURITY                                  .docxRunning head CYBER SECURITY                                  .docx
Running head CYBER SECURITY .docx
 
ico-future-tech-report-20221214.pdf
ico-future-tech-report-20221214.pdfico-future-tech-report-20221214.pdf
ico-future-tech-report-20221214.pdf
 
Introduction to Information Policy
Introduction to Information PolicyIntroduction to Information Policy
Introduction to Information Policy
 
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global ContextWCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
 
CILIP Round-table on the National Data Strategy consultation
CILIP Round-table on the National Data Strategy consultationCILIP Round-table on the National Data Strategy consultation
CILIP Round-table on the National Data Strategy consultation
 
WEF_IT_UnlockingValuePersonalData_CollectionUsage_Report_2013
WEF_IT_UnlockingValuePersonalData_CollectionUsage_Report_2013WEF_IT_UnlockingValuePersonalData_CollectionUsage_Report_2013
WEF_IT_UnlockingValuePersonalData_CollectionUsage_Report_2013
 
Target Data Security Breach Case Study
Target Data Security Breach Case StudyTarget Data Security Breach Case Study
Target Data Security Breach Case Study
 

Imran research abstract 15042010

  • 1. Addressing Information Security (InfoSec) Policy Gaps through Participatory Design (PD) Approach. (Position Paper) Muhammad Imran Suid∗ 15th April 2010 Abstract This research is a study of attitudes and behaviors towards Information Security (InfoSec) pol- icy. The computing.co.uk report in 2008 highlights the data loss incidents happening in UK public sector organization including the 25 million child benefits record lost in HM Revenue and Custom (HMRC) and 17,000 data file lost in UK Border Agency (UKBA) records [3; 1; 2], clearly establishes the facts that there are gaps between information security policy and practice. The research aims to identify the gaps between information security policy formulation and security practice and un- derstanding what influences the occurrences of such gaps. This research explores the gap between information security policy and practice using the lenses of Participatory Design (PD) approach; and also evaluates aspects and principles of public policy decision making in order to assess their contribution to the process information security policy making. Security policies alone do not constitute a successful security practice effort; and (Kearney, 1994) [4] argues from participatory design perspective, that successful participation in a decision making program might address information security policy gaps. Further, (Miller, 2006) [5] emphasizes that public engagement initiatives are frequently met with questions about ‘impact’; which enables policy makers design better policies by focusing on areas such contexts, alternatives and concerns of the public. Following the line of arguments present in [4; 5], this research explores whether there are elements of the public policy design that support the participatory design approach and whether this combined approach might help to address the gap between information security pol- icy and practice; and with this understanding, develop a novel approaches to information security policy design and implementation that better influences information security practice. My problem space is as follows: • Different factors which influence an organization’s information security policy interpretation. • Differences in interpretation of a successful information security policy implementations between policy makers and policy practitioners. My research objectives are as follows: ∗ Information Security Group, Royal Holloway University of London, Egham, Surrey TW20 0EX, UK. EMail: m.suid@rhul.ac.uk 1
  • 2. • To explore the different types of gap between information security policy and practice. • To understand the kind of security perceptions which influence policy makers when designing information security policies. • To identify which elements of public policy design might complement the participatory design approach in order to address information security policy practice gap. My research questions are as follows: • What kinds of policy gaps can be found in information security? • What kinds of perception guides the information security policy makers’ decision making? • What influences the emergence of information security policy gap? • How might public policy design combined with Participatory Design (PD) approach help to close this information security policy gaps? Information Security Policy Gap Taxonomy What are the information security policy gaps? Information security policy formulation ⇔ Gap ⇔ Information security policy in practice How might Participatory Design(PD) approach address these gaps? Public policy design in Participatory Design (PD) approach ⇔ Gap ⇔ Information secu- rity policy formulation & Information security policy in practice References 1. Computing Staff. The Top 10 Public Sector Data Losses–So Far: Feel- ing Left Out? Don’t Worry, You’re Bound to be Affected Soon, 2008. http://www.computing.co.uk/computing/analysis/2225625/top-public-sector-losses-far. 2. Contractor UK Limited. Immigration Officials Admit 17,000 Files Are Lost, 2009. http://www.contractoruk.com/news/004181.html. 3. Glyn Wintle. HMRC ”Datagate” Verdict: Further Data Loss ”A Distinct Possibility”, 2008. http://www.openrightsgroup.org/blog/2008/hmrc-datagate-verdict-further-data-loss-a-distinct-possibil 4. R. C. Kearney and S. W. Hays. Labor-Management Relations and Participative Decision Making: Toward a New Paradigm. Public Administration Review, 54(1):44–51, 1994. 5. P. Miller. Better Humans?: The Politics of Human Enhancement and Life Extension. Demos Medical Publishing, 2006. 2