{"title":"Information Governance and Cybersecurity: Framework for Securing and Managing Information Effectively and Ethically","authors":"Elizabeth Lomas","doi":"10.1201/9781003042235-6","DOIUrl":"https://doi.org/10.1201/9781003042235-6","url":null,"abstract":"Over the last 30 years new technologies have enabled many new uses and possibilities for information/data widening the stakeholder pool. As such it has become increasingly commoditized with greater recognition of a range of information value(s). In tandem with the growing potential, value and social significance of information, the online management of a wide range of data has opened up information/data to new forms of theft and attack including information subversion, cybercrime and cyber warfare. To deal with these complex information world dynamics, it is the field of information governance (IG) which has emerged as the solution for individuals, organizations and nations to manage information. Cybersecurity is a subcomponent of IG. IG provides the holistic solution to dealing with information challenges in terms of both opportunities and dangers that are implicit within information creation. It deals with the management of information assets legally and ethically as well as providing guarantees around information confidentiality, integrity and availability through time. This chapter sets out IG considerations, tools and frameworks for securing and managing information effectively and ethically.","PeriodicalId":287216,"journal":{"name":"Cybersecurity for Information Professionals","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126167504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. Thuraisingham, Satyen Abrol, R. Heatherly, Murat Kantarcioglu, V. Khadilkar, L. Khan
{"title":"Data Security and Privacy","authors":"B. Thuraisingham, Satyen Abrol, R. Heatherly, Murat Kantarcioglu, V. Khadilkar, L. Khan","doi":"10.1201/9781315119458-3","DOIUrl":"https://doi.org/10.1201/9781315119458-3","url":null,"abstract":"","PeriodicalId":287216,"journal":{"name":"Cybersecurity for Information Professionals","volume":"64 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123309167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}