SECURITY AND DIGITAL TRANSFORMATION IN ROMANIA- SECURITY STRATEGIES IN PRIVATE ORGANIZATIONS IN THE ERA OF DIGITAL TRANSFORMATION
Corresponding author:
[email protected]
Received
29 August 2022
Revised
16 September 2022
Accepted
09 November 2022
Available Online
15 November 2022
Abstract
IN THE CURRENT CONTEXT, THE IMPACT OF THE CRISIS CAUSED BY THE NEW CORONAVIRUS HAS PROMPTED O RGANIZATIONS TO RETHINK HOW THEY NEED TO WORK WITH CUSTOMERS AND EMPLOYEES, ACCELERATING THE DIGITIZATION OF ACTIVITIES IN THE FORM OF IMPROVED CONNECTIVITY, ADOPTING ONLINE BUSINESS MODELS, IMPLEMENTING NEW DIG ITAL SECURITY STRATEGIES, CHANGING THE CYBERS ECURITY CULTURE, PROMOTING ONLINE PAYMENTS, INCLUDING IMPROVING DIGITAL SKILLS TO SOME EXTENT. PRIVATE ORGANIZATIONS WERE FORCED TO INVEST QUICKLY IN SOFTWARE PLATFORMS THAT FACILITATE COMMUNICATION AND MEETING S (SUCH AS ZOOM AND MICROSOFT TEAMS), WHILE ALSO MAKING CHANGES TO SERVICE DELIVERY TO REDUCE FACE -TO-FACE INTERACTION. LOOKING AS A WHOLE, TECHNOLOGY HAS THE ROLE OF FACILITATING INTERACTIONS IN AND BETWEEN DIFFERENT HUMAN ACTIVITIES. AT THE SAME TIME, TE CHNOLOGY AND ESPECIALLY TECHNOLOGICAL PROGRES S STIMULATES THE ADAPTATION OF LIFE TO THE NEW REQUIREMENTS GENERATED BY TECHNOLOGICAL PROGRESS. IN RECENT YEARS, THE ADAPTATION AND ADOPTION OF DIGITAL RESOURCES IN VARIOUS PROCESSES HAS BEEN CONSIDERABLE AND C LOSELY RELATED TO THE HEALTH CRISIS. AS A RES ULT, THE DIGITAL TRANSFORMATION DEMONSTRATED ON THE ONE HAND THE ABILITY TO CONTRIBUTE TO MITIGATING AND COMBATING THE PANDEMIC AND ON THE OTHER HAND IT HIGHLIGHTED THE IMPORTANCE OF DIGITAL STRATEGIES WITHIN ORGANIZATIONS.
Keywords
DIGITALIZATION
SECURITY
SECURITY STRATEGIES
DIGITAL
Full Text
The body of this article is intentionally hidden on the public page. Please use the PDF reader or the PDF download for the complete text.
References
[1]
Bellany, Ian. “Towards a Theory of International Security.” Political Studies 29, no. 1 (March 1981).
[2]
Becker, Howard, and Blanche Geer . “Participant Observation and Inte rviewing: A Comparison.” Human Organization 16, no. 3 (September 1, 1957).
[3]
Beebe, Nicole L., and V. Srinivasan Rao . “Improving Organizationa l Information Security Strategy via Meso -Level Application of Situational Crime Prevention to the Risk Management Process.” Communications of the Association for Information Systems 26 (2010).
[4]
Buță Viorel; Emil Ion; Mihai Ştefan Dinu (coord.), Religie și securitate în Europa secolului XXI – Glosar de termeni, Ed. Universității de Apărare „Carol I ”, București, 2007.
[5]
Buzan, Barry, Ole Waever, and Jaap de Wilde . Security: A New Framework for Ana lysis. Nachdr. Boulder, Colo.: Rienner, 1998.
[6]
Buzan, Barry . “New Patterns of Global Security in the Twenty -First Century.” International Affairs 67, no. 3 (July 1991).
[7]
Data-Breach-Investigations-Report, 2021, avalilable at https://www.verizon.com/business/resources/reports/2021-data-breach-investigationsreport.pdfx
[8]
Deloitte Digital, Digital-Transformation: A PRIMER.
[9]
Deloitte Romania. “A patra revoluție industrială este aici.”, avalilable at https://www2.deloitte.com/ro/ro/pages/technology-media-and telecommunications/articles/the-fourth- industrial-revolution-is-here.html.
[10]
“Dexonline.”, avalilable at https://dexonline.ro/definitie/securitate.
[11]
European Union Agency for Network and Informatio n Security. Cyber Security Culture in Organisations. LU: Publications Office, 2017. avalilable at https://data.europa.eu/doi/10.2824/10543.
[12]
Gartner. “Definition of Digital Transformation - Gartner Information Technology Glossary.” avalilable at https://www.gartner.com/en/informationtechnology/glossary/digital-transformation.
[13]
Gartner. “Definition o f Digitalization - Gartner Information Technology Glossary.”, avalilable at https://www.gartner.com/en/informationtechnology/glossary/digitalization.
[14]
Gartner. “Definition of Digitization - Gartner Information Technology Glossary.”, avalilable at https://www.gartner.com/en/informationtechnology/glossary/digitization.
[15]
Gary R. Lomprey , Critical Elements of an Information Security Management Strat egy, University of Oregon Applied Information Management Program, July 2008,
[16]
“Ghid_SNApT_2015-2019_AP.Pdf.”, avalilable at https://www.presidency.ro/files/userfiles/Ghid_SNApT_2015-2019_AP.pdf.
[17]
Just Ask Thales EN. “What Is Digital Security?,”, avalilable at https://justaskthales.com/en/what-is-digital-security/.
[18]
Kroeber, A.I., and Kluckhohn , C., Culture: A critical review of concep ts, Vol. 47, No.1, (1952), Editura Museum, Cambridge, Massachusetts, U.S.A.
[19]
Louis, Meryl Reis. “A Cultural Perspective on Organizations: The Need for and Consequences of Viewing Organizations as Culture -Bearing Milieux.” Human Systems Management 2, no. 4 (December 1, 1981).
[20]
Martin, Laurence. “National Security in an Insecure Age” 35, no. 5 (1982).
[21]
Nepf - make organization change happen. “The Critical Role of Leadership in Accelerating Digital Transformation,” June 25, 2018 , a valilable at https://www.nepf.co/the-critical-role-of-leadership-in- accelerating-digitaltransformation/.
[22]
Park, Sangseo, and Tobias Ruighaver . “Strategic Approach to Information Security in Organizations.” In 2008 International Conference on Information Science and Security (ICISS 2008) , 26–31. Korea: IEEE, 2008.
[23]
Pessoa Jos, and Lydia Deloumeaux . The 2009 Unesco Framework for Cultural Statistics (FCS). , 2009.
[24]
Piwowarski, Juliusz. “Three Pillars of Security Culture.” Apeiron, 2015.
[25]
Proofpoint. “What Is Cybersecurity? - Network Security Meaning | Proofpoint US,” February 26, 2021, avalilable at https://www.proofpoint.com/us/threatreference/cybersecurity-network-security.
[26]
ReadWrite. “Overcoming Cybersecurity Assessment and Audit Confusion,” Janu ary 19, 2022 , avalilable at https://readwrite.com/overcoming-cybersecurityassessment-and-audit-confusion/.
[27]
Schallmo, Daniel R. A., and Christopher A. Williams. Digital Transformation Now! SpringerBriefs in Business. Cham: Springer International Publishing, 2018.
[28]
ScottMadden. “The Security Operating Model,” May 27, 2021 , avalilable at https://www.scottmadden.com/insight/security-operating-model-strategicapproach-building-secure- organization/.
[29]
Security Intelligence. “Your Sec urity Strategy Should Scale and Evolve Alongside Your Business,” December 20, 2019 , avalilable at https://securityintelligence.com/articles/your-security-strategy- should-scale-andevolve-alongside-your-business/.
[30]
The Global Risks Report, 2022, 17th edition, editura World Economic Forum.
[31]
Wolfers, Arnold. ‘National Security’ as an A mbiguous Symbol.” Political Science Quarterly 67, no. 4 (December 1952).
[32]
“What Is a Cybe r Resilience Strategy and How Is It Implemented?”, avalilable at https://www.issquaredinc.com/insights/resources/blogs/what-is-a-cyberresilience-strategy-and-how- %20to-implement-it.
[33]
“What Is Organization Development | The 5 Phases of OD Strategies | ATD.”, avalilable at https://www.td.org/talent-development-glossary-terms/whatis-organization-development.