Crying for the Moon? - Current Challenges in Corporate Information Security Management

  title={Crying for the Moon? - Current Challenges in Corporate Information Security Management},
  author={Ulrike Hugl},
  • U. Hugl
  • Published in KDIR/KMIS 11 August 2018
  • Computer Science
The ability to respond to the evolving challenges in corporate information security management is not a destination but rather a journey. To contest the race means to accept the dare, but being aware of the fact that offenders are normally one step ahead. Understanding threats and attackers’ methods and strategies is a crucial issue towards protecting corporate assets. This work aims on presenting an overview of current information security-related trends, it explains possible internal and… 


Social Engineering: Hacking the Wetware!
Mitigation of social engineering begins with good policy and awareness training, but there are a number of other approaches an organization can take to defend against this type of an attack.
An analysis of security issues for cloud computing
This work identifies the main vulnerabilities in this kind of systems and the most important threats found in the literature related to Cloud Computing and its environment as well as to identify and relate vulnerabilities and threats with possible solutions.
Business Intelligence and Analytics: From Big Data to Big Impact
This introduction to the MIS Quarterly Special Issue on Business Intelligence Research first provides a framework that identifies the evolution, applications, and emerging research areas of BI&A, and introduces and characterized the six articles that comprise this special issue in terms of the proposed BI &A research framework.
The era of Big Data has begun. Computer scientists, physicists, economists, mathematicians, political scientists, bio-informaticists, sociologists, and other scholars are clamoring for access to the
"Big Data" : big gaps of knowledge in the field of internet science
This work proposes to follow in addition a different strategy that leads to knowledge about micro-processes that match with actual online behavior that can be used for the selection of mathematically-tractable models of online network formation and evolution.
Blurring the lines.
  • M. Bullimore
  • Medicine
    Optometry and vision science : official publication of the American Academy of Optometry
  • 2000
This story of Jorah Mormont and Daenerys Targaryen's relationship is told through the eyes of a seven-year-old boy through the lens of a young girl.
Changing the game.
GameCloud Studios leverages best practices in production, project management, design, art leadership, and engineering oversight from North America and cost structure and scalability from China to rapidly and efficiently develop new game titles for online gaming audiences.
Understanding individual human mobility patterns
The trajectory of 100,000 anonymized mobile phone users whose position is tracked for a six-month period is studied, finding that, in contrast with the random trajectories predicted by the prevailing Lévy flight and random walk models, human trajectories show a high degree of temporal and spatial regularity.
Enisa Threat Landscape
  • In: Marinos, L. & Sfakianakis, A. (Eds.). Heraklion: European Network And Information Security Agency (Enisa).
  • 2012
Idc-Studie: Deutsche Unternehmen Verlassen Sich Auf It Service Management Für Die Cloud
  • Frankfurt: IDC Central Europe.
  • 2013