REAL

E-safety, privacy and information security: Requirements in Public Administration

Krasznay, Csaba and Törley, Gábor (2015) E-safety, privacy and information security: Requirements in Public Administration. In: Time for a European Internet? Austrian Computer Society, Vienna, pp. 431-441. ISBN 978-3-85403-308-0

[img] Text
Krasznay_Torley_E_safety_privacy_and_information_security_Requirements_in_public_administration_u.pdf
Restricted to Repository staff only

Download (3MB) | Request a copy

Abstract

According to the results of a representative survey by ESET Hungary Ltd. and statistics by Eurostat, more than one million users in Hungary visit infected webpages despite of warnings of their antivirus program and almost every second an individual caught a virus or other computer infection (worm, Trojan horse, etc.). These data are similar to those in Slovenia, in Croatia, in Slovakia and in Bulgaria. This may be caused by low levels of security awareness and independent from any typical statistical distribution (e.g. age, sex, geographic location, etc.). Therefore this security unpreparedness appears in all work places, including Public Administration. Those who work in Public Administration manage other people’s personal data, but how could they manage them securely if they cannot be vigilant with their own personal data? We believe that security awareness is a way of thinking which is teachable and learnable, and should be developed as a basic knowledge in primary and secondary education and later upgraded as a special knowledge at public administration schools. We discuss three topics: (1) a comparison of what pupils are taught on e-safety, privacy and information security in Hungary and England to understand the level of basic knowledge; (2) an international overview about governmental requirements from an average employee in Public Administration on e-safety, privacy and information security to understand what special knowledge is required on this field; (3) some best practices how we can give the special security knowledge for these people at university level in order to meet the requirements of Public Administration. We use U.S. and U.K. examples, because these countries have the most mature cybersecurity system and best-described use cases in all areas examined by this study. We also examine EU’s special requirements because Hungary, as a member state should follow these rules and guidances.

Item Type: Book Section
Subjects: Z Bibliography. Library Science. Information Resources / könyvtártudomány > ZA Information resources / információforrások > ZA4050 Electronic information resources / elektronikus információforrások
SWORD Depositor: MTMT SWORD
Depositing User: MTMT SWORD
Date Deposited: 28 Dec 2015 10:48
Last Modified: 28 Dec 2015 10:49
URI: http://real.mtak.hu/id/eprint/31526

Actions (login required)

Edit Item Edit Item