IT Interdependence and the Economic Fairness of Cybersecurity Regulations for Civil Aviation

@article{Gramatica2015ITIA,
  title={IT Interdependence and the Economic Fairness of Cybersecurity Regulations for Civil Aviation},
  author={Martina de Gramatica and Fabio Massacci and Woohyun Shim and Alessandra Tedeschi and Julian M. Williams},
  journal={IEEE Security \& Privacy},
  year={2015},
  volume={13},
  pages={52-61}
}
Interviews about emerging cybersecurity threats and a cybersecurity public policy economic model for civil aviation illustrate stakeholders' concerns: interdependency issues can lead to aviation regulations that put smaller airports at a disadvantage. 

Figures and Tables from this paper

Governance Challenges for European Cybersecurity Policies: Stakeholder Views

We outline possible approaches to cybersecurity governance and compare them against the proposed European Union network of competence centers. We survey stakeholders for their opinions about the

Governance Challenges for European CyberSecurity Policy : Stakeholders Views First draft

This paper outlines possible approaches to cybersecurity governance and compares them against the recent cybersecurity policy initiative proposed by the European Union to establish a European Center and Network of Competence Centers which should be responsible to funnel all European cybersecurity funding in the next decade.

Who Should Pay for Interdependent Risk? Policy Implications for Cyber-Physical Security Interdependence in Aviation

This study addresses various issues in the study of interdependent cyber security, and sheds light on the economic and policy implications of increasing security interdependence. We investigate the

Cybersecurity in Aviation : An Intrinsic Review

The paper discusses the recent need of cyber-security in aviation due to attacks which could cripple the airline as well as cause significant loss of life and presents solutions on how to tackle the issues present to make the aviation industry safe from cyber-attacks.

INVESTIGATING CRITICAL POINTS OF CYBER SECURITY: PREVENTION TERROR ATTACKS IN AIRPORTS*

A system which is aimed to be used in Atatürk Airport for scaling and taking considerable proactive actions have been identified and on the purpose of improvement of system some recommendations have been made.

Agency Problems and Airport Security: Quantitative and Qualitative Evidence on the Impact of Security Training

The results indicate that the effectiveness of additional training depends on the mix of "transferable skills" and "emotional" buy-in of the security agents, and that Principals need to identify on which side of a critical tipping point their agents are.

The Open University ’ s repository of research publications and other research outputs Live Blackboxes : Requirements for Tracking and Verifying Aircraft in Motion Conference Item

The paper focuses on a particular problem in air traffic management, and proposes five requirements for the continuous monitoring of critical systems that share some similar accuracy concerns around safety and security.

Live Blackboxes: Requirements for tracking and verifying aircraft in motion

Five requirements are proposed for addressing a class of monitoring problems that share some similar accuracy concerns around safety and security and similar requirements for the continuous monitoring of critical systems are speculated.

Security Investment

References

SHOWING 1-10 OF 32 REFERENCES

Request for Information — Developing a Framework to Improve Critical Infrastructure

A well implemented framework of this nature should enable a diverse community of governments and businesses to more confidently push forward in attaining ambitious business goals and protecting infrastructure from potentially damaging cyber events.

Next Generation of Terrorism: Ubiquitous Cyber Terrorism with the Accumulation of all Intangible Fears

The cyber terrorism, the next generation of terrorism, is presented to be a forthcoming and unavoidable threat to the global community as well as providing a potential rational cyber terrorist scenario, which could be the global cyber terror- ism phenomena.

Heathrow Terminal 5 : an IT infrastructure success story

A conference titled the Future for Aviation in the UK considered the new British Government's philosophy, as Roy Allen reports.

SUSTAINABILITY IN INFORMATION STEWARDSHIP:

The information steward is defined as the agent/institution who enhances the system’s resilience and sustainability, by maintaining and extending the life of its nominal operational capacity, in the presence of unanticipated shocks that degrade nominal operating conditions.

Knowledge Management, Terrorism, and Cyber Terrorism

This chapter applies the conceptual framework of knowledge management (and vehicles familiar from that discipline) to analyze various aspects of knowledge as a resource for terrorist-organizations,

Fear in a handful of dust: aviation and the Icelandic volcano

The eruption of Eyjafjallajökull in April 2010 closed airports throughout Europe, stranded thousands of passengers, and enraged airlines and cost them millions. Was the grounding justified? Peter

Cost allocation and airport problems

We consider the problem of dividing the cost of a facility when agents can be ordered in terms of the need they have for it, and accommodating an agent with a certain need allows accommodating all

Handbook of Applied Social Research Methods

Introduction - Leonard Bickman and Debra J Rog Why a Handbook of Applied Social Research? PART ONE: PLANNING APPLIED RESEARCH Applied Research Design - Leonard Bickman, Debra J Rog and Terry E

Designing a qualitative study.

T raditionally, works on research design (most of which focus on quantitative research) have understood " design " in one of two ways. Some take designs to be fixed, standard arrangements of research