An Analysis of Cybersecurity Policies and Practices in Public Administration
DOI:
https://doi.org/10.55885/jprsp.v2i2.211Keywords:
Cybersecurity, Policies, Practices, Public AdministrationAbstract
In this research, the purpose is to assess the major strong and weak points of cybersecurity policies and strategies in the chosen public administration organisation. The type of research used is the qualitative case study and as such, focuses on interviews and policy documents in line with cybersecurity laws and related reports from the selected experts. There is used themes that are grounded in the data to look at patterns that recurred regularly. As a conclusion it can be stated that the situation in an organization is quite good as it has a clear security policy, controls and regular training for its employees, but there are some issues with an access control, vulnerability assessment and penetration testing. The advancement in these areas will assist the organisation to safeguard data and avoid cyber attacks in future and make sure the organization understands that cybersecurity is not a definite state and the organisational bureaucracy has to embrace change in practices continually due to the dynamic threat.References
Althunibat, A., Binsawad, M., Almaiah, M. A., Almomani, O., Alsaaidah, A., Al-Rahmi, W., & Seliaman, M. E. (2021). Sustainable applications of smart-government services: A model to understand smart-government adoption. Sustainability (Switzerland), 13(6). https://doi.org/10.3390/su13063028
Baena-Morales, S., Jerez-Mayorga, D., Delgado-Floody, P., & Martínez-Martínez, J. (2021). Sustainable development goals and physical education. A proposal for practice-based models. In International Journal of Environmental Research and Public Health (Vol. 18, Issue 4, pp. 1–18). MDPI AG. https://doi.org/10.3390/ijerph18042129
Bekkers, V. J., & Tummers, L. (Eds.). (2018). Innovation in the public sector. Sage. https://doi.org/10.1057/9780230307520
Bozkus Kahyaoglu, S., & Caliyurt, K. (2018). Cyber security assurance process from the internal audit perspective. Managerial auditing journal, 33(4), 360-376. https://doi.org/10.1108/MAJ-02-2018-1804
Chang, A. (Jasmine), El-Rayes, N., & Shi, J. (2022). Blockchain Technology for Supply Chain Management: A Comprehensive Review. FinTech, 1(2), 191–205. https://doi.org/10.3390/fintech1020015
Chowdhury, N., & Gkioulos, V. (2021). Cyber security training for critical infrastructure protection: A literature review. Computer Science Review, 40, 100361. https://doi.org/10.1016/j.cosrev.2021.100361
ElAlfy, A., Palaschuk, N., El-Bassiouny, D., Wilson, J., & Weber, O. (2020). Scoping the evolution of corporate social responsibility (CSR) research in the sustainable development goals (SDGS) era. In Sustainability (Switzerland) (Vol. 12, Issue 14). MDPI. https://doi.org/10.3390/su12145544
Georgiadou, A., Michalitsi-Psarrou, A., Gioulekas, F., Stamatiadis, E., Tzikas, A., Gounaris, K., Doukas, G., Ntanos, C., Ribeiro, L. L., & Askounis, D. (2021). Hospitals’ cybersecurity culture during the COVID-19 crisis. Healthcare (Switzerland), 9(10). https://doi.org/10.3390/healthcare9101335
Habibzadeh, H., Nussbaum, B. H., Anjomshoa, F., Kantarci, B., & Soyata, T. (2019). A survey on cybersecurity, data privacy, and policy issues in cyber-physical system deployments in smart cities. Sustainable Cities and Society, 50, 101660. https://doi.org/10.1016/j.scs.2019.101660
Hitchens, T., & Gallagher, N. W. (2019). Building confidence in the Cybersphere: a path to multilateral progress. Journal of Cyber Policy, 4(1), 4-21. https://doi.org/10.1080/23738871.2019.1599032
Jin, Q., Raza, S. H., Yousaf, M., Zaman, U., & Siang, J. M. L. D. (2021). Can communication strategies combat covid-19 vaccine hesitancy with trade-off between public service messages and public skepticism? Experimental evidence from Pakistan. Vaccines, 9(7). https://doi.org/10.3390/vaccines9070757
Johnson, G. A., & Vindrola-Padros, C. (2017). Rapid qualitative research methods during complex health emergencies: A systematic review of the literature. Social Science & Medicine, 189, 63-75. https://doi.org/10.1016/j.socscimed.2017.07.029
Kurniawan, R., Zailani, S. H., Iranmanesh, M., & Rajagopal, P. (2017). The effects of vulnerability mitigation strategies on supply chain effectiveness: risk culture as moderator. Supply Chain Management: An International Journal, 22(1), 1-15. https://doi.org/10.1108/SCM-12-2015-0482
Langheinrich, M. (2018). Privacy in Ubiquitous Computing. In Ubiquitous computing fundamentals (pp. 109-174). Chapman and Hall/CRC. https://doi.org/10.1201/9781420093612
Laurini, R. (2018). Information systems for urban planning: a hypermedia cooperative approach. Crc Press. https://doi.org/10.1201/9781315274713
Li, L., He, W., Xu, L., Ash, I., Anwar, M., & Yuan, X. (2019). Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity behavior. International Journal of Information Management, 45, 13-24. https://doi.org/10.1016/j.ijinfomgt.2018.10.017
Oliveira, J. B., Jin, M., Lima, R. S., Kobza, J. E., & Montevechi, J. A. B. (2019). The role of simulation and optimization methods in supply chain risk management: Performance and review standpoints. Simulation Modelling Practice and Theory, 92, 17-44. https://doi.org/10.1016/j.simpat.2018.11.007
Perera, S., Jin, X., Maurushat, A., & Opoku, D. G. J. (2022). Factors Affecting Reputational Damage to Organisations Due to Cyberattacks. Informatics, 9(1). https://doi.org/10.3390/informatics9010028
Redden, J. (2018). Democratic governance in an age of datafication: Lessons from mapping government discourses and practices. Big Data & Society, 5(2), 2053951718809145. https://doi.org/10.1177/2053951718809145
Saura, J. R., Ribeiro-Soriano, D., & Palacios-Marqués, D. (2022). Assessing behavioral data science privacy issues in government artificial intelligence deployment. Government Information Quarterly, 39(4), 101679. https://doi.org/10.1016/j.giq.2022.101679
Szczepaniuk, E. K., Szczepaniuk, H., Rokicki, T., & Klepacki, B. (2020). Information security assessment in public administration. Computers & Security, 90, 101709. https://doi.org/10.1016/j.cose.2019.101709
Vitunskaite, M., He, Y., Brandstetter, T., & Janicke, H. (2019). Smart cities and cyber security: Are we there yet? A comparative study on the role of standards, third party risk management and security ownership. Computers & Security, 83, 313-331. https://doi.org/10.1016/j.cose.2019.02.009
Wirtz, B. W., & Weyerer, J. C. (2017). Cyberterrorism and cyber attacks in the public sector: How public administration copes with digital threats. International Journal of Public Administration, 40(13), 1085-1100. https://doi.org/10.1080/01900692.2016.1242614
Wong, L. W., Lee, V. H., Tan, G. W. H., Ooi, K. B., & Sohal, A. (2022). The role of cybersecurity and policy awareness in shifting employee compliance attitudes: Building supply chain capabilities. International Journal of Information Management, 66, 102520. https://doi.org/10.1016/j.ijinfomgt.2022.102520
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 Journal of Public Representative and Society Provision

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.