Cyber Security and Trust - Tools for Multi-agency Cooperation between Public Authorities

Jyri Rajamäki, Juha Knuuttila

2015

Abstract

Functions vital to society, such as public protection and disaster relief (PPDR), are increasingly dependent on networks, electricity and data processing infrastructure. Incidents such as natural hazards and organized crime do not respect national boundaries. As a consequence, there is a need for European collaboration and information sharing related to public safety communications, and information exchange environments, technologies and procedures. This multiple case study analysis collects together research results from four earlier research projects. The main research question is: How can cyber security and trust-building be understood and designed as being tools for multi-agency cooperation between PPDR agencies? The results show that ‘trust’ could be seen as the main issue with regard to multi-agency cooperation. Cyber security should be seen as a key enabler for the development and maintenance of trust in the digital world. It is important to complement the currently dominating ‘cyber security as a barrier’ perspective by emphasizing the role of ‘cyber security as an enabler’ of new interactions and services - and recognizing that trust is a positive driver for growth. Safety and security issues are increasingly dependent on unpredictable cyber risks. Everywhere present computing means that PPDR agencies do not know when they are using dependable devices or services and there are chain reactions of unpredictable risks. If cyber security risks are not made ready, PPDR agencies will face severe disasters over time. Investing in systems that improve confidence and trust can significantly reduce costs and improve the speed of interaction. From this perspective, cyber security should be seen as a key enabler for the development and maintenance of trust in the digital world.

References

  1. Aanestad, M., Jensen, T. B., 2011. Building nation-wide information infrastructures in healthcare through modular implementation strategies. The Journal of Strategic Information Systems, 20(2), 161-176.
  2. Abdelzaher, T., Kott, A., 2013. Resiliency and robustness of complex systems and networks. Adaptive, dynamic and resilient systems. Auerbach Publications, Florida Akella, R., Tang, H., McMillin, B. M., 2010. Analysis of information flow security in cyber-physical systems. International Journal of Critical Infrastructure Protection, 3(3), 157-173.
  3. Akhgar, B., Fortune, D., Hayes, R. E., Guerra, B., Manso, M., 2013. Social media in crisis events: Open networks and collaboration supporting disaster response and recovery, IEEE International Conference on Technologies for Homeland Security, pp. 760-765.
  4. Alberts, D., 2002. Information age transformation, getting to a 21st century military. DOD Command and Control Research Program. http://www.dtic.mil/get-trdoc/pdf?AD=ADA457904.
  5. Baldini, G., 2010. Report of the workshop on “Interoperable communications for safety and security”. Publications Office of the European Union, Brunet-Jailly, E., 2005. Theorizing Borders: An Interdisciplinary Perspective. Geopolitics, 10, 633-649.
  6. Edwards, P. N., Bowker, G. C., Jackson, S. J., Williams, R., 2009. Introduction: An agenda for infrastructure studies. Journal of the Association for Information Systems, 10(5), 364-374.
  7. Hanseth, O., Lyytinen, K., 2010. Design theory for dynamic complexity in information infrastructures: The case of building internet. Journal of Information Technology, 25(1), 1-19.
  8. Happonen, M., Kokkonen, P., Viitanen, J., Ojala, J., Rajamäki, J., 2009. Jamming Detection in the Future Navigation and Tracking Systems. 16th Saint Petersburg International Conference on Integrated Navigation Systems. Saint Petersburg, Russia.
  9. Henningsson, S., Gal, U., Bjørn-Andersen, N., Yao-Hua, T., 2011. The Next Generation Information Infrastructure for International Trade, Journal of theoretical and applied electronic commerce research, Vol. 6, No. 1.
  10. Hevner, A., Chatterjee, S., 2010. Design science research in information systems, Springer.
  11. Hofstede, G., 1991. Cultures and Organizations. London: McGraw-Hill.
  12. Ilander, T., Toivonen, H., Meriheinä, U., Garlacz, J., 2010. Indoor Positioning for Nuclear Security. Third European IRPA Congress.
  13. Jarvenpaa, S. L., Majchrzak, A., 2008. Knowledge collaboration among professionals protecting national security: Role of transactive memories in ego-centered knowledge networks. Organization Science, vol. 19, 260-276.
  14. Kantarci, B., Mouftah, H. T., 2014. Trustworthy Sensing for Public Safety in Cloud-Centric Internet of Things. Internet of Things Journal, IEEE, vol. 1, 360-368.
  15. Kämppi, P., Rajamäki, J., Tiainen, S., Leppänen, R. (Eds.), 2014. MACICO - multi-agent co-operation in crossborder operations. Vantaa: Laurea.
  16. Linkov,I., Eisenberg, D., Plourde, K., Seager, T., Allen, J., Kott, A., 2013. Resilience metrics for cyber systems. Environ Syst Decis. DOI: 10.1007/s10669-013-9485-y.
  17. Luis, FL, Derrick DC, Langhals B, Nunamaker JF., 2013. Collaborative cross-border security infrastructure and systems: Identifying policy, managerial and technological challenges. International Journal of EPolitics (IJEP). 4(2), 21-38.
  18. Monteiro, E., Hanseth, O., 1996. Social shaping of information infrastructure: On being specific about the technology. Information Technology and Changes in Organizational Work, 325-343.
  19. National Academy of Sciences, 2012. Disaster resilience: a national imperative. Washington DC, United States. http://www.nap.edu/catalog.php?record_id=13457.
  20. Navarrete, A.C., Mellouli, S., Pardo. T.A., Gil-Garcia, J.R., 2009. Information sharing at national borders: Extending the utility of border theory. 42nd Hawaii International Conference on System Sciences, 1-10.
  21. Ojasalo, J., Turunen, T., & Sihvonen, H., 2009. Responsibility and decision making transfer in public safety and security emergencies - A case study of school shootings. IEEE Conference on Technologies for Homeland Security, 358-365.
  22. Pirinen, R., Rajamäki, J. (Eds.), 2010. Integrative studentcentred research and development work: Rescuing of Intelligence and Electronic Security Core Applications (RIESCA). Vantaa: Laurea publications.
  23. Pirinen, R., Rajamäki, J., 2015. Mechanism of Critical and Resilient Digital Services for Design Theory,” 2nd International Conference on Computer Science, Computer Engineering & Social Media, IEEE, 90-95.
  24. Rajamäki, J., 2013. The MOBI Project: Designing the Future Emergency Service Vehicle, IEEE Vehicular Technology Magazine, Vol. 8, No. 2, 92-99.
  25. Rajamäki, J., 2014. Software Intensive GNSS-Based Tracking Systems for Improving Law Enforcement, WSEAS Transactions on Systems and Control, Vol. 9, 629-639.
  26. Rajamäki, J., 2015. Cyber Security Education as a Tool for Trust-building in Cross-Border Public Protection and Disaster Relief Operations,” IEEE EDUCON Global Engineering Education Conference, 378-385.
  27. Rajamäki, J., Knuuttila, J., 2013. Law Enforcement Authorities' Legal Digital Evidence Gathering: Legal, Integrity and Chain-on-custody Requirement, European Intelligence and Security Informatics Conference, 198-203.
  28. Rajamäki, J., Knuuttila, J., Ruoslahti, H., Patama, P., Viitanen, J., 2015. Building Trust between Citizens and Their Governments: A Concept for Transparent Surveillance of Suspects, 2nd International Conference on Computer Science, Computer Engineering & Social Media, IEEE, 128-133.
  29. Rajamäki, J., Pirinen, R., 2015. Critical Infrastructure Protection: Towards a Design Theory for Resilient Software-Intensive Systems," European Intelligence and Security Informatics Conference (EISIC), IEEE [In Press].
  30. Rajamäki, J., Pirinen, R., Knuuttila, J. (Eds.), 2012. SATERISK - Risks of Satellite-Based Tracking: Sample of Evidence Series. Vantaa: Laurea-University of Applied Sciences.
  31. Reivo, J., Vuoripuro, J., Pelkonen, N., 2010. Communication and security man-agement cooperation in large events - Case: IAAF World Chanpionships 2005 in Helsinki. In R. Pirinen & J. Rajamäki (Eds.) Integrative student-centred research and development work: Rescuing of Intelligence and Electronic Security Core Applications (RIESCA). Vantaa: Laurea Publications, 119-136.
  32. Tikanmäki, I., Rajamäki, J., Pirinen, R. (Eds.), 2014. Mobile Object Bus Interaction: Designing of Future Emergency Vehicles. Sample of Evidence Series: Volume (3), Vantaa: Laurea publications.
  33. Tourish, G., Hargie, O., 2004. Key Issues in Organizational Communication. Psychology Press.
  34. Yin, R. K., 2009. Case Study Research Design and Methods. Thousand Oaks: Sage Publications.
Download


Paper Citation


in Harvard Style

Rajamäki J. and Knuuttila J. (2015). Cyber Security and Trust - Tools for Multi-agency Cooperation between Public Authorities . In Proceedings of the 7th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management - Volume 3: ISE, (IC3K 2015) ISBN 978-989-758-158-8, pages 397-404. DOI: 10.5220/0005628803970404


in Bibtex Style

@conference{ise15,
author={Jyri Rajamäki and Juha Knuuttila},
title={Cyber Security and Trust - Tools for Multi-agency Cooperation between Public Authorities},
booktitle={Proceedings of the 7th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management - Volume 3: ISE, (IC3K 2015)},
year={2015},
pages={397-404},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005628803970404},
isbn={978-989-758-158-8},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 7th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management - Volume 3: ISE, (IC3K 2015)
TI - Cyber Security and Trust - Tools for Multi-agency Cooperation between Public Authorities
SN - 978-989-758-158-8
AU - Rajamäki J.
AU - Knuuttila J.
PY - 2015
SP - 397
EP - 404
DO - 10.5220/0005628803970404