Skip to main content

Interpreting the Development of Information Security Industry from Standards

  • Conference paper
  • First Online:
Distributed, Ambient and Pervasive Interactions. Smart Environments, Ecosystems, and Cities (HCII 2022)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13325))

Included in the following conference series:

  • 1059 Accesses

Abstract

Information security has been a significant concern in personal life, enterprise development, city construction, and national competitiveness. Information security standards, as an important regulatory and guiding tool, reflects the consensus reached by the industry and therefore are important references to understand an industry. This study explores a new angle to understand the development of the information security industry by analyzing the external and content features of related standards. Based on the available metadata and the possible dimensions, a standards’ features index system and a roadmap of analysis are constructed. The Chinese and ISO information security standards are selected to verify the method. The result shows the evolution of the industry, the status quo, and the future trend of the information security industry.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Zhang, H.: Research on information security problems and countermeasures in modern information technology environment. Inf. Syst. Eng. 8, 81 (2018)

    Google Scholar 

  2. Escobedo, J.: Top 15 most common security issues and how to fix them. https://www.liquidweb.com/blog/five-common-web-security-problems/. Accessed 2 Jan 2022

  3. Deng, X., Yan, M.: Research on the Legal Protection of Personal Information in the Big Data Era. CIBDA 2021, IOP (2021)

    Google Scholar 

  4. Hoy, M.B., Cortana, A.S., et al.: An introduction to voice assistants. Med. Ref. Serv. Quar. 37(1), 81–88 (2018)

    Google Scholar 

  5. Pal, D., Arpnikanondt, C., Razzaque, M.A.: Personal information disclosure via voice assistants: the personalization–privacy paradox. SN Comput. Sci. 1(5) (2020)

    Google Scholar 

  6. Nikkhah, H.R., Sabherwal, R., Sarabadani, J.: Mobile cloud computing apps and information disclosure: the moderating roles of dispositional and behaviour-based traits. Beh. Inf. Technol. 1–17 (2021)

    Google Scholar 

  7. ENISA, ENISA Threat Landscape. https://d-russia.ru/wp-content/uploads/2020/10/etl2020-a_year_in_review_ebook_en.pdf. Accessed 2 Jan 2022

  8. Zuo, J., Yang, J.M.: On information assets. Reform. Strat. 05, 27–30 (2000)

    Article  Google Scholar 

  9. Von Solms, B., von Solms, R.: From information security to…business security? Comput. Secur. 24(4), 271–273 (2005)

    Article  Google Scholar 

  10. VERIZON: 2021 data breach investigations report. https://www.verizon.com/business/resources/reports/dbir/2021/masters-guide/introduction/. Accessed 2 Jan 2022

  11. VERIZON: 2019 data breach investigation report. https://enterprise.verizon.com/resources/reports/dbir/2019/introduction/. Accessed 2 Jan 2022

  12. Leng, X.Y: Research on information security strategy in big data era. Inf. Sci. 37(12), 105–109 (2019)

    Google Scholar 

  13. ITU. Global Cybersecurity Index. https://www.itu.int/en/ITU-D/Cybersecurity/Pages/global-cybersecurity-index.aspx. Accessed 2 Jan 2022

  14. e-Estonia. The National Cyber Security Index ranks 160 countries’ cyber security status. https://e-estonia.com/the-national-cyber-security-index-ranks-160-countries-cyber-security-status/. Accessed 2 Jan 2022

  15. Abdi, H., Shahbazitabar, M.: Smart city: a review on concepts, definitions, standards, experiments, and challenges. J. Energy Manage. Technol. 4(3), 1–6 (2020)

    Google Scholar 

  16. Lai, C.S., Jia, Y., Dong, Z., Wang, D., et al.: A review of technical standards for smart cities. Clean Technol. 2(3), 290–310 (2020)

    Google Scholar 

  17. Pishva, D.: Internet of things: security and privacy issues and possible solution. In: Proceedings of the 19th International Conference on Advanced Communication Technology (ICACT). IEEE (2017)

    Google Scholar 

  18. Wu, Z.: Preliminary study on information security standard system. Inf. Network Secur. 03, 37 (2005)

    Google Scholar 

  19. Zhao, W., Su, H., Hu, Y.: Analysis of the relationship between information security standards. Inf. Network Secur. 11, 48–50 (2009)

    Google Scholar 

  20. Chen, X.H., Liu, C.Y., Yang, S.F.: Research on industrial information security standard system. Conf. Sci. Technol. 07, 25–28 (2019)

    Google Scholar 

  21. Guan, H.P., Li, L., Li, X., et al.: Research on information security standard system of industrial. Internet Autom. Expo. 03, 50–53 (2018)

    Google Scholar 

  22. Roy, P.P.: A high-level comparison between the NIST cyber security framework and the ISO 27001 information security standard, NCETSTEA, IEEE: Durgapur, India (2020)

    Google Scholar 

  23. Xie, Z., Kunxiang, D.: ICT supply chain information security standard ISO/IEC 27036–3 and system analysis. China Stand. Rev. 03, 16–21 (2016)

    Google Scholar 

  24. Chen, T., Zhang, Y., Zhao, S.: Research on the status quo of international information security standards and thoughts on the construction of standard system in china. Inf. Secur. Commun. Confident. 11, 41–47 (2016)

    Google Scholar 

  25. Sun, H., Hanguang, X., Zhao, W.: Construction of information security standard system of intelligent networked vehicle and research on industrial policies. Chin. Autom. 12, 38–43 (2018)

    Google Scholar 

  26. Susanto, H., Almunawar, M.N., Tuan, Y.C.: Information security challenge and breaches: novelty approach on measuring ISO 27001 readiness level. Int. J. Eng. Technol. 1(1) (2012)

    Google Scholar 

  27. Chang, S.E., Ho, C.B.: Organizational factors to the effectiveness of implementing information security management. Indust. Manage. Data Syst. 106(3), 345–361 (2006)

    Google Scholar 

  28. Fenz, S., Plieschnegger, S., Hobel, H.: Mapping information security standard ISO 27002 to an ontological structure. Inf. Comput. Secur. 24(5), 452–473 (2016)

    Article  Google Scholar 

  29. Qiu, J.: Definition of bibliometrics and its research object. Lib. Sci. Commun. 02 71 (1986)

    Google Scholar 

  30. Wang, Y., Dan, X., Shusong, M.: A bibliometrics analysis of standardization for traditional Chinese medicine from 2010 to 2014. Introd. Trad. Chin. Med. 22(13), 60–63 (2016)

    Google Scholar 

  31. Wu, K.: Bibliometric analysis of standard documents of scientific and technological archives in china. Electromech. Warship Arch. 01, 66–70 (2018)

    Google Scholar 

  32. Wang, P., Wei, X.: Research on standardization of publishing industry based on standard literatures’ bibliometrics. Technol. Publish. 10, 116–124 (2019)

    Google Scholar 

  33. Liu, T., Yang, L., Qiuhong, Z.: Analysis of the application of occupational health standards based on bibliometrics. Chin. J. Labor Health Occup. Dis. 01, 49–52 (2019)

    Google Scholar 

  34. Liu, H.: Comparisons of information and documentation standards between china and developed countries based on bibliometrics. Lib. Inf. Serv. 55(12), 51–55 (2011)

    Google Scholar 

  35. Li, J., Liu, Y.: Literature metrology analysis on domain distribution and hotspots of Chinese agricultural standard--taking national library of standards’ holdings from 2006 to 2008 for examples. Lib. Inf. Serv. 53(18), 44–47+78 (2009)

    Google Scholar 

  36. Li, X., Qiu, J.: An informetric analysis on public culture service standards. J. Chongqing Univ. (Soc. Sci. Ed.). 21(06), 132–139 (2015)

    Google Scholar 

  37. Braun, V., Clarke, V.: Using thematic analysis in psychology. Qual. Res. Psychol. 3(2), 77–101 (2006)

    Article  Google Scholar 

  38. GB/T 20000.2.: Guidelines for Standardization—Part 2: Adoption of International Standards (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guochao Peng .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Liu, J., Kong, Y., Peng, G. (2022). Interpreting the Development of Information Security Industry from Standards. In: Streitz, N.A., Konomi, S. (eds) Distributed, Ambient and Pervasive Interactions. Smart Environments, Ecosystems, and Cities. HCII 2022. Lecture Notes in Computer Science, vol 13325. Springer, Cham. https://doi.org/10.1007/978-3-031-05463-1_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-05463-1_26

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-05462-4

  • Online ISBN: 978-3-031-05463-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics