Abstract
Modern administrative action is no longer conceivable without electronic communication and IT. The complexity of IT, the increasing degree of networking and the dependence of the administration on IT-supported procedures has led to the fact that security of IT and associated processes must be given high priority and a corresponding cybersecurity strategy must be substantiated. Existing approaches either fall short or cannot be applied to the context of local government without adaptation. This article aims at contrasting the published state-of-the-art in information security management and the state-of-practice in governmental organizations. Empirical basis for our work are (1) audit reports of certification audits in the municipal sector, (2) expert interviews on the status quo of information security in German local government and (3) a review of scientific literature. Results of the paper include current challenges in increasing the resilience of the municipal administration and open issues for future research.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Solms, R. von, van Niekerk, J.: From information security to cyber security. Comput. Secur. 38, 97–102 (2013)
Helbig, N., Gil-Garcia, J.R., Ferro, E.: Understanding the complexity of electronic government: implications from the digital divide literature. Gov. Inf. Q. 26, 89–97 (2009)
Calder, A.: EU GDPR: A Pocket Guide. IT Governance Ltd (2018)
EgovG: Gesetz zur Förderung der elektronischen Verwaltung. https://www.gesetze-im-internet.de/egovg/BJNR274910013.html
Kweon, E., Lee, H., Chai, S., Yoo, K.: The utility of information security training and education on cybersecurity incidents: an empirical evidence. Inf. Syst. Front. 23, 361–373 (2021)
Watson, R.T., Webster, J.: Analysing the past to prepare for the future: writing a literature review a roadmap for release 2.0. J. Decis. Syst. 29, 129–147 (2020). https://doi.org/10.1080/12460125.2020.1798591
Weber, A., Heiser, G., Kuhlmann, D., Schallbruch, M., Chattopadhyay, A., Guilley, S., Kasper, M., Krauß, C., Krüger, P.S., Reith, S., et al.: Sichere IT ohne Schwachstellen und Hintertüren. TATuP - Zeitschrift für Technikfolgenabschätzung in Theorie und Praxis 29, 30–36 (2020). https://doi.org/10.14512/tatup.29.1.30
Weber, K., Christen, M., Herrmann, D.: Bedrohung, Verwundbarkeit, Werte und Schaden: Cyberattacken und Cybersicherheit als Thema der Technikfolgenabschätzung. TATuP - Zeitschrift für Technikfolgenabschätzung in Theorie und Praxis 29, 11–15 (2020). https://doi.org/10.14512/tatup.29.1.11
Aman, W., Shukaili, J.A.: A classification of essential factors for the development and implementation of cyber security strategy in public sector organizations. Int. J. Adv. Comput. Sci. Appl 12 (2021). https://doi.org/10.14569/IJACSA.2021.0120820
Ahmad, S.U., Kashyap, S., Shetty, S.D., Sood, N.: Cybersecurity during COVID-19. In: Joshi, A., Mahmud, M., Ragel, R.G., Thakur, N.V. (eds.) Information and Communication Technology for Competitive Strategies (ICTCS 2020), vol. 191, pp. 1045–1056. Springer Singapore, Singapore (2022). https://doi.org/10.1007/978-981-16-0739-4_96
Alagarsamy, S., Selvaraj, K., Govindaraj, V., Kumar, A.A., HariShankar, S., Narasimman, G.L.: Automated Data analytics approach for examining the background economy of Cybercrime. In: 2021 Third International Conference on Inventive Research in Computing Applications (ICIRCA), pp. 332–336. IEEE, Coimbatore, India (2021). https://doi.org/10.1109/ICIRCA51532.2021.9544845
Kesan, J.P., Zhang, L.: An empirical investigation of the relationship between local government budgets, IT expenditures, and cyber losses. IEEE Trans. Emerg. Top. Comput. 9, 582–596 (2021). https://doi.org/10.1109/TETC.2019.2915098
Bouzoubaa, K., Taher, Y., Nsiri, B.: Predicting DOS-DDOS attacks: review and evaluation study of feature selection methods based on wrapper process. Int. J. Adv. Comput. Sci. Appl. 12 (2021). https://doi.org/10.14569/IJACSA.2021.0120517
Müller, N.: Es muss nicht kompliziert sein. Technische Sicherheit 10, 16–18 (2020). https://doi.org/10.37544/2191-0073-2020-03-16
Alhashim, S.S., Rahman, M.M.H.: Cybersecurity threats in line with awareness in Saudi Arabia. In: 2021 International Conference on Information Technology (ICIT), pp. 314–319. IEEE, Amman, Jordan (2021). https://doi.org/10.1109/ICIT52682.2021.9491711
Andreasson, A., Artman, H., Brynielsson, J., Franke, U.: A census of Swedish public sector employee communication on cybersecurity during the COVID-19 pandemic. In: 2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), pp. 1–8. IEEE, Dublin, Ireland (2021). https://doi.org/10.1109/CyberSA52016.2021.9478241
Wirtz, B.W., Weyerer, J.C.: Cyberterrorism and cyber attacks in the public sector: how public administration copes with digital threats. Int. J. Public Adm. 40, 1085–1100 (2017). https://doi.org/10.1080/01900692.2016.1242614
Park, S.-K., Lee, S.-H., Kim, T.-Y., Jun, H.-J., Kim, T.-S.: A performance evaluation of information security training in public sector. J. Comput. Virol. Hacking Tech. 13, 289–296 (2017). https://doi.org/10.1007/s11416-017-0305-7
Alharbe, M.A.: Measuring the influence of methods to raise the E-awareness of cybersecurity for medina region employees. In: Saeed, F., Al-Hadhrami, T., Mohammed, F., Mohammed, E. (eds.) Advances on Smart and Soft Computing, vol. 1188, pp. 403–410. Springer Singapore, Singapore (2021). https://doi.org/10.1007/978-981-15-6048-4_35
Coppolino, L., D’Antonio, S., Mazzeo, G., Romano, L., Sgaglione, L.: How to protect public administration from cybersecurity threats: the COMPACT project. In: 2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp. 573–578. IEEE, Krakow (2018). https://doi.org/10.1109/WAINA.2018.00147
Drmola, J., Kasl, F., Loutocký, P., Mareš, M., Pitner, T., Vostoupal, J.: The matter of cybersecurity expert workforce scarcity in the Czech Republic and its alleviation through the proposed qualifications framework. In: The 16th International Conference on Availability, Reliability and Security, pp. 1–6. ACM, Vienna Austria (2021). https://doi.org/10.1145/3465481.3469186
Lehto, M.: ECCWS 2020 19th European Conference on Cyber Warfare: Warfare and Security (2020)
Phelps, M.: The role of the private sector in counter-terrorism: a scoping review of the literature on emergency responses to terrorism. Secur. J. 34, 599–620 (2021). https://doi.org/10.1057/s41284-020-00250-6
Choi, I., Lee, J., Kwon, T., Kim, K., Choi, Y., Song, J.: An easy-to-use framework to build and operate ai-based intrusion detection for in-situ monitoring. In: 2021 16th Asia Joint Conference on Information Security (AsiaJCIS), pp. 1–8. IEEE, Seoul, Korea, Republic of (2021). https://doi.org/10.1109/AsiaJCIS53848.2021.00011
Dreyling, R., Jackson, E., Pappel, I.: Cyber security risk analysis for a virtual assistant G2C digital service using FAIR model. In: 2021 Eighth International Conference on eDemocracy & eGovernment (ICEDEG), pp. 33–40. IEEE, Quito, Ecuador (2021). https://doi.org/10.1109/ICEDEG52154.2021.9530938
Mironeanu, C., Archip, A., Amarandei, C.-M., Craus, M.: Experimental cyber attack detection framework. Electronics 10, 1682 (2021). https://doi.org/10.3390/electronics10141682
Savold, R., Dagher, N., Frazier, P., McCallam, D.: Architecting cyber defense: a survey of the leading cyber reference architectures and frameworks. In: 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud), pp. 127–138. IEEE, New York, NY, USA (2017). https://doi.org/10.1109/CSCloud.2017.37
Maglaras, L., Drivas, G., Chouliaras, N., Boiten, E., Lambrinoudakis, C., Ioannidis, S.: Cybersecurity in the Era of digital transformation: the case of Greece. In: 2020 International Conference on Internet of Things and Intelligent Applications (ITIA), pp. 1–5. IEEE, Zhenjiang, China (2020). https://doi.org/10.1109/ITIA50152.2020.9312297
Bendiek, A., Schallbruch, M.: Stiftung Wissenschaft Und Politik: Europe’s third way in cyberspace: what part does the new EU Cybersecurity Act play? SWP Comment (2019). https://doi.org/10.18449/2019C52
Garba, A.A., Siraj, M.M., Othman, S.H.: An explanatory review on cybersecurity capability maturity models. Adv. Sci. Technol. Eng. Syst. J. 5, 762–769 (2020). https://doi.org/10.25046/aj050490
Zakaria, K.N., Zainal, A., Othman, S.H., Kassim, M.N.: Feature extraction and selection method of cyber-attack and threat profiling in cybersecurity audit. In: 2019 International Conference on Cybersecurity (ICoCSec), pp. 1–6. IEEE, Negeri Sembilan, Malaysia (2019). https://doi.org/10.1109/ICoCSec47621.2019.8970786
Yin, R.K.: The case study crisis: some answers. Admin. Sci. Quart 26, 58. https://doi.org/10.2307/2392599
Eisenhardt, K.M.: Building theories from case study research. Acad. Manag. Rev. 14, 532–550 (1989). https://doi.org/10.5465/amr.1989.4308385
BSI-Standard 200–1: Managementsysteme für Informationssicherheit (ISMS). Bundesamt für Sicherheit in der Informationstechnik. https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Grundschutz/BSI_Standards/standard_200_1.html?nn=128578
DIN ISO/IEC 27001. DIN (2018)
Mayring, P.: Qualitative content analysis. Companion Qual. Res. 1, 159–176 (2004)
Leeser, D.C.: Digitalisierung in KMU kompakt: Compliance und IT-Security. Springer Vieweg, Berlin [Heidelberg] (2020)
BSI-Standard 200–3: Risikomanagement. Bundesamt für Sicherheit in der Informationstechnik. https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Grundschutz/BSI_Standards/standard_200_3.html?nn=128620
CMMI Institute—Home. https://cmmiinstitute.com
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Moses, F., Sandkuhl, K., Kemmerich, T. (2022). Empirical Study on the State of Practice of Information Security Management in Local Government. In: Zimmermann, A., Howlett, R.J., Jain, L.C. (eds) Human Centred Intelligent Systems. Smart Innovation, Systems and Technologies, vol 310. Springer, Singapore. https://doi.org/10.1007/978-981-19-3455-1_2
Download citation
DOI: https://doi.org/10.1007/978-981-19-3455-1_2
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-3454-4
Online ISBN: 978-981-19-3455-1
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)