LockChain Technology as One Source of Truth for Cyber, Information Security and Privacy

1Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Implementing and maintaining Information Security (IS) in a digitized ecosystem is cumbersome. Multiple complex frameworks and models are used to implement IS, but these are perceived as hard to implement and maintain in digitized dynamic value chains and platforms. Most companies still use spreadsheets to design, direct and monitor their information security function and demonstrate their compliance. Regulators too use spreadsheets for supervision. This paper reflects on longitudinal Design Science Research (DSR) on IS and describes the design and engineering of an artefact architecture, coined as LockChain, which can emancipate boards from silo-based spreadsheet management and improve their visibility, control and assurance via integrated dash-boarding and a reporting tool. LockChain is not a traditional Information Security Management System (ISMS) but is used for the design and specification of information security requirements and measures and privacy requirements. We elaborate “Why” we used Design Science Research into valorisation of the concept of LockChain, we explain “What” we have established in terms of the technology of LockChain and “How” it is applied and the added value LockChain brings for companies on cost savings, Security and Privacy by Design engineering culture and Digital Assurance.

Cite

CITATION STYLE

APA

Bobbert, Y., & Ozkanli, N. (2020). LockChain Technology as One Source of Truth for Cyber, Information Security and Privacy. In Advances in Intelligent Systems and Computing (Vol. 1230 AISC, pp. 336–347). Springer. https://doi.org/10.1007/978-3-030-52243-8_24

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free