Tag Archives: Security

Looking for a theory to explain the impact of security on technology adoption decisions

Looking at the gaps in information security is dealt with in a framework called Technology, Organisation and Environment (TOE). It claims to provide a mechanism for explaining an organisation’s response to a new technology by assessing internal and external factors that influence adoption of new technological innovations. The challenge is that it doesn’t seem to have a very good account of the importance of information security Continue reading

Posted in Methodologies, research, Security | Tagged , , , , | 2 Comments

Cloud Security Alliance EMEA preconference seminar

The Cloud Security Alliance held its 2013 Congress here in Edinburgh – and I had the privilege of attending the pre-conference symposium on 24 September which focussed on the specific risks that exist within the public and private sectors in the UK. … Continue reading

Posted in Audit, Daily Links, Europe, Security, UK | Tagged , , , , | 2 Comments

PEP-NET Summit: My ECI/petitioning presentation

Here’s a copy of the presentation I gave in my corner at the PEP-NET summit today, and a PDF of the flowchart I draw from the draft ECI Regulation. I spoke about EuroPetition and the ECI as systems for supporting … Continue reading

Posted in e-participation, Europe, thoughts | Tagged , , , , | Leave a comment

Security for signatures: petitions and the European Citizens’ Initiative

The European Citizens’ Initiative (ECI) is a potentially significant change coming out of the Lisbon Treaty: here, I try to see how general security principles could be applied to the process from signing up (online) to validating an entire ECI … Continue reading

Posted in Daily Links, e-democracy, e-participation, Europe, Security | Tagged , , , , , , | 5 Comments

Identity, authentication and authorisation

It’s Me, and Here’s My Proof: Why Identity and Authentication Must Remain Distinct | Steve Reilly, Microsoft In brief: Identity = “who are you” – a public assertion Authentication = “OK, how can you prove it?” – by secret response … Continue reading

Posted in Daily Links, Security | Tagged , | Leave a comment