lnu.sePublications
Operational message
There are currently operational disruptions. Troubleshooting is in progress.
Change search
Link to record
Permanent link

Direct link
Biography [eng]

Researching improved system management methods at the enterprise level. Today's organizations must be agiler than current support functions, like ITIL or COBIT, allows for. At the same time, regulations like EU GDPR or US SOX requires much better security adaptations and control of data. Thus, the management team needs more agile Enterprise IT management and tools to manage their IT environment.

Biography [swe]

Forskar rörande förbättrad systemförvaltning på överordnad verksamhetsnivå. Dagens verksamheter måste vara mer agila än stödfunktioner som ITIL eller COBIT tillåter. Samtidigt, som lagar som GDPR eller am. SOX kräver mycket högre säkerhet och kontroll av data. Därför behöver verksamhetsledningen bättre styr- och ledningsverktyg för att förvalta IT-miljön.

Publications (10 of 20) Show all publications
Magnusson, L., Iqbal, S., Elm, P. & Dalipi, F. (2025). Information security governance in the public sector: investigations, approaches, measures, and trends. International Journal of Information Security, 24, Article ID 177.
Open this publication in new window or tab >>Information security governance in the public sector: investigations, approaches, measures, and trends
2025 (English)In: International Journal of Information Security, ISSN 1615-5262, E-ISSN 1615-5270, Vol. 24, article id 177Article in journal (Refereed) Published
Abstract [en]

Information security governance in the public sector involves risk management, accountability frameworks, network security, e-government systems infrastructure, mitigation plans, and alignment with corporate strategy. It equips organizations with the ability to deal with the security of their vital information assets systematically. However, several recent hacking incidents reveal the fact that substandard governance processes are among the common causes of weak security measures in most organizations. This study has been conducted following the established protocol outlined in the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidelines. Systematic Mapping Review (SMR) initially identified 1496 papers, and this reviews and reports on 41 papers. The reviewed literature emphasizes the adherence to recognized governance standard frameworks such as ISO/IEC 27,001, EU General Data Protection Regulations (GDPR), and EU Network and Information Security Act (NIS) for providing effective information security guidance frameworks in the public sector. However, a general scarcity is found regarding the best practices followed in the area of information security compliance. There is a lack of employing key performance indicators, risk assessment measures, security maturity models in organizations, and compliance audits. Additionally, the study suggests that, to some extent, the adoption of appropriate information security governance procedures is linked with available budgeted resources for individual organizations. The study results can serve as a starting point for the research and practitioners’ community in the area of information security governance.

Place, publisher, year, edition, pages
Springer Nature, 2025
Keywords
e-Governance, Governance and Government, Principles and Models of Security, Public Management, Public Sector Studies, Science and Technology Governance, Information security, Security frameworks, Risks, Governance, Management, Public sector, Systematic mapping review
National Category
Information Systems
Research subject
Computer and Information Sciences Computer Science, Information Systems
Identifiers
urn:nbn:se:lnu:diva-140852 (URN)10.1007/s10207-025-01097-x (DOI)001529910900001 ()2-s2.0-105010963508 (Scopus ID)
Funder
Linnaeus University
Available from: 2025-07-22 Created: 2025-07-22 Last updated: 2026-01-21Bibliographically approved
Magnusson, L., Dalipi, F. & Elm, P. (2023). Cybersecurity Compliance in the Public Sector: Are the Best Security Practices Properly Addressed?. In: Stephanidis, C., Antona, M., Ntoa, S., Salvendy, G. (Ed.), HCI International 2023 Posters. HCII 2023: 25th International Conference on Human-Computer Interaction, HCII 2023, Copenhagen, Denmark, July 23–28, 2023, Proceedings, Part IV. Paper presented at 25th International Conference on Human-Computer Interaction, HCII 2023, Copenhagen, Denmark, July 23–28, 2023 (pp. 219-226). Switzerland: Springer
Open this publication in new window or tab >>Cybersecurity Compliance in the Public Sector: Are the Best Security Practices Properly Addressed?
2023 (English)In: HCI International 2023 Posters. HCII 2023: 25th International Conference on Human-Computer Interaction, HCII 2023, Copenhagen, Denmark, July 23–28, 2023, Proceedings, Part IV / [ed] Stephanidis, C., Antona, M., Ntoa, S., Salvendy, G., Switzerland: Springer, 2023, p. 219-226Conference paper, Published paper (Refereed)
Abstract [en]

Improving and strengthening cybersecurity in the public sector should represent a top priority for government agencies, including municipalities and regions. To be resilient against cyberattack surges, organizations should consider establishing a cybersecurity program based on international standards and best practices. In this paper we explore the cybersecurity compliance in the Swedish public sector in relation to the best practices and guidelines highlighted in the ISO/IEC 27001A framework. Our findings indicate that the overall security status among the municipalities and regions contained many flaws, with substantial holes and critical issues. ISO/IEC 27001A creates a standardized base, but it is somewhat theoretical and starts with a policy, not providing insights on how to govern information security. Also, most of these “ISO/IEC”-related gaps were found to have been compiled into a single “Technology” domain. Though compliance with standards, best practices, and regulatory requirements can help reduce cyber risks, it does not guarantee that an organization will have strong cybersecurity. To address this issue and assess how well organizations can protect, discern, react, and recover from cyberattacks, an effective method for measuring security performance must be developed.

Place, publisher, year, edition, pages
Switzerland: Springer, 2023
Series
Communications in Computer and Information Science, ISSN 1865-0929, E-ISSN 1865-0937 ; 1835
Keywords
ISO/IEC 27001, cybersecurity, risks, flawed governance, compliance, public sector.
National Category
Information Systems
Research subject
Computer and Information Sciences Computer Science
Identifiers
urn:nbn:se:lnu:diva-123242 (URN)10.1007/978-3-031-36001-5_28 (DOI)2-s2.0-85169448045 (Scopus ID)9783031360015 (ISBN)
Conference
25th International Conference on Human-Computer Interaction, HCII 2023, Copenhagen, Denmark, July 23–28, 2023
Available from: 2023-07-10 Created: 2023-07-10 Last updated: 2025-05-23Bibliographically approved
Magnusson, L. & Iqbal, S. (2023). Post-Mortem of Mega Hacks: Signifying the Need for a Systemic Enterprise View on Information Security. In: 2023 7th International Conference on Cryptography, Security and Privacy (CSP): Tianjin, China, 21-23 April. Paper presented at 2023 7th International Conference on Cryptography, Security and Privacy (CSP), Tianjin, China, 21-23 April (pp. 41-46). IEEE
Open this publication in new window or tab >>Post-Mortem of Mega Hacks: Signifying the Need for a Systemic Enterprise View on Information Security
2023 (English)In: 2023 7th International Conference on Cryptography, Security and Privacy (CSP): Tianjin, China, 21-23 April, IEEE, 2023, p. 41-46Conference paper, Published paper (Refereed)
Abstract [en]

Once, system thinking was about singular systems. Today we exist in a far more complex world, with systems interacting with systems, directly or indirectly. Information security, therefore, must involve all systems in the chain. New legal European regulations such as Guidelines for Data Protection Regulation demand that the ICT/IT world must include systems outside the organizational border to be involved and accounted for under enterprise information security umbrella. Recent mega hacks analyzed in this article point to the fact that a systems thinking perspective is needed to create modern governance, risk, and compliance security model framework. This research work puts forth a conceptual model based on Viable System Model appropriate for a major global information security restructuring. A motive for VSM is grounded in that it works fine with securing modern laws like GDPR and CCPA in supporting a needed enterprise perspective.

Place, publisher, year, edition, pages
IEEE, 2023
Keywords
agility, mega hack, governance, information security, system thinking
National Category
Information Systems
Research subject
Computer and Information Sciences Computer Science, Information Systems; Computer and Information Sciences Computer Science
Identifiers
urn:nbn:se:lnu:diva-124125 (URN)10.1109/CSP58884.2023.00014 (DOI)2-s2.0-85173127269 (Scopus ID)9798350323368 (ISBN)9798350323375 (ISBN)
Conference
2023 7th International Conference on Cryptography, Security and Privacy (CSP), Tianjin, China, 21-23 April
Available from: 2023-09-07 Created: 2023-09-07 Last updated: 2024-08-28Bibliographically approved
Magnusson, L. (2022). “System thinking as a critical driver to mitigate “the strong man” in IB.”.
Open this publication in new window or tab >>“System thinking as a critical driver to mitigate “the strong man” in IB.”
2022 (English)Other (Other (popular science, discussion, etc.))
Abstract [en]

Several previous researchers have looked at the management of the “firm” in International Business to establish the underlying key strategic factors for successful “firms”. Trying to identify the critical drivers defining the winners. However, there is a need to study why some fail or simply become mere “followers”. This paper will look at one of these overlooked negative human aspects of management factors found in many organizations, particularly affecting networking organizations, effects of the “strong man”, and how to mitigate this negative factor through system thinking.

Publisher
p. 20
Keywords
Business Models, Systemic Thinking, Digital Transition, Networking, Management Strategy, Psychology of Leadership
National Category
Business Administration
Research subject
Economy, Organisation theory; Economy, Business Informatics
Identifiers
urn:nbn:se:lnu:diva-110746 (URN)
Note

This is this writer's final paper in National Research School "Management & IT" / Mälardalens University joint doctoral course in International Business, SNABS. The reason for publishing it here is that the examiners reviewed it as handling a very unique topic, seldom discussed academically, but being very inflicting IRL.

Available from: 2022-03-08 Created: 2022-03-08 Last updated: 2024-08-28Bibliographically approved
Magnusson, L. (2021). Solarwinds breach, a signal for a systemic enterprise view on Information Security. In: The OR Society's 63rd Annual Conference: . Paper presented at The OR Society's 63rd Annual Conference, 14-16 september, 2021. Operational Research Society, UK
Open this publication in new window or tab >>Solarwinds breach, a signal for a systemic enterprise view on Information Security
2021 (English)In: The OR Society's 63rd Annual Conference, Operational Research Society, UK , 2021Conference paper, Oral presentation only (Refereed)
Abstract [en]

Once, system thinking was about singular systems. Today we exist in a far more complex world, with systems interacting with systems, directly or indirectly. Today's info security involves all systems in the chain; to use an old maxim, "No chain is stronger than its weakest link". The ICT world has become so interconnected that holistic system thinking is needed, with systems outside the organizational border to be involved and accounted for. ICT criminals are using increasingly sophisticated attack methods, often based on the victim's system architecture. In the Dec 2020 security breach at the network management firm Solarwinds in the US, an external party had added a trojan horse package to the Solarwinds management system. The hack gave the hackers stealth control of both Solarwinds as its 18.000 customers' internal system environments. Including high-security targets like the FBI, Homeland Security, and Microsoft. 

The attack was sophisticated, using the Solarwinds system knowledge, standards, and code layouts. Anyone not doing a deep survey would see Solarwinds code. The trojan was well-known but rewritten to the standards of the target. Solarwinds shows that we now entered a "new brave world", demanding a much more structural system discussion, how to protect our ICT. Based on this attack's sophistication, this was probably a 7- or 8-time successful attempt. We need solid enterprise-wide, system-coordinated security perspectives. But, how can we use system thinking to help plan a better and more cost-efficient security approach on an enterprise-level? For 14 years, this researcher worked with info security in a global automotive company, having the Viable System Model as its internal system model. When not "sabotage" by managers, yes, it happened; VSM worked fine. VSM also works fine with securing modern laws like GDPR when having an enterprise perspective. Info Security desperately needs enterprise system thinking.

Place, publisher, year, edition, pages
Operational Research Society, UK, 2021
Keywords
Data breaches, Info Security, Security Governance, System Thinking
National Category
Information Systems
Research subject
Computer and Information Sciences Computer Science, Information Systems
Identifiers
urn:nbn:se:lnu:diva-109132 (URN)
Conference
The OR Society's 63rd Annual Conference, 14-16 september, 2021
Note

No conference abstracts or compilations was published from OR Society for the OR63 conference

Ej belagd 220121

Available from: 2022-01-11 Created: 2022-01-11 Last updated: 2024-08-28Bibliographically approved
Magnusson, L., Elm, P. & Mirijamdotter, A. (2019). On System Thinking and Information Security. In: The OR Society Annual Conference OR61, 3-5 September 2019, Sibson Building, Kent University: Conference Handbook. Paper presented at The Operational Research Society OR61 Annual Conference (pp. 161-162). The Operational Research Society, Article ID OR61A151.
Open this publication in new window or tab >>On System Thinking and Information Security
2019 (English)In: The OR Society Annual Conference OR61, 3-5 September 2019, Sibson Building, Kent University: Conference Handbook, The Operational Research Society , 2019, p. 161-162, article id OR61A151Conference paper, Oral presentation with published abstract (Refereed)
Abstract [en]

Security problems we have to deal with today regarding Internet are created by ourselves. Internet, initially created to handle US Government data traffic, evolved to become communication between different research institutes. The protocols that were used had no security at all. Today we still use this network to almost everything and the complexity has grown tremendously. Compared to when the network initially was created, we now try to protect assets rather than just communicate, divide users according to permission and accessibility, and deal with privacy issues. Basically, everything is depending on the network that initially was created with no security.

Privacy has been a critical security aspect for the EU, but with the event of the GDPR privacy is both a legal aspect and an auditable ICT concept. GDPR includes topics like: owning your own data, independent of who collected it and where it is stored, and; the right to be forgotten. Each data collector also needs to have a complete data-flow map, describing any privacy data sets in a flow, to make these traceable and ready for audit inspection. Any organization handling EU residents’ data, needs to adhere to proactive Information Security processes. 

GDPR is based on the principles of Governance, Risk, and Compliance. It is not a purely legal construct; it is a management and strategy issue, not an IT issue. Further examples relate to cloud services with distributed resources, which illustrate the complex problem situation.

There is a need for a new perspective, moving from systems management to data flow management. We propose a systemic model which illustrate processes and flows within a fractal structure; we build on Beer’s Viable System Model. Such a model enables mapping of complexity and data flows and provide a tool for auditing and, thus, enable meeting the requirements of GDPR.

Place, publisher, year, edition, pages
The Operational Research Society, 2019
National Category
Information Systems
Research subject
Computer and Information Sciences Computer Science, Information Systems
Identifiers
urn:nbn:se:lnu:diva-89020 (URN)
Conference
The Operational Research Society OR61 Annual Conference
Available from: 2019-09-09 Created: 2019-09-09 Last updated: 2024-08-28Bibliographically approved
Iqbal, S. & Magnusson, L. (2019). Searching for A Governance Model to Secure the Data Flow in Organizations: an Indispensable Discussion. In: Edmond Hajrizi (Ed.), UBT International Conference: . Paper presented at International Conference on Business, Technology and Innovation (IC-UBT 2019), Oktober 26, 2019, Pristina, Kosovo,. UBT Knowledge center, Article ID 80.
Open this publication in new window or tab >>Searching for A Governance Model to Secure the Data Flow in Organizations: an Indispensable Discussion
2019 (English)In: UBT International Conference / [ed] Edmond Hajrizi, UBT Knowledge center , 2019, article id 80Conference paper, Published paper (Refereed)
Abstract [en]

Since the end of the 1980s, there have been several initiatives to control and manage IT environments. ITIL is one of the more successful models, COBIT another. However, thanks to the IP protocol and Internet, since mid-2000 the world has seen a veritable data explosion, affecting IT governance. Some predictions expect current data volumes to grow more than 10 times till 2020, having serious implications both from governance and security perspectives. Additionally, we see some new EU regulations, i.e., Network and Information Security Directive (NIS) and General Data Protection Regulation (GDPR), implemented in May 2018. The latter two will directly affect the scope of IT governance within the European Union and for non-European entities handling EU Citizen’s personal data, with substantial fines if not complying. Both regulations forces anyone handling such data to consider information strategies that include big data management, governance, and information security as a convoluted context. Particularly, GDPR make them to related questions, a governance package. This creates a need for a paradigm shift to remediate/mitigate identified limitations in today’s traditional governance models. This article discusses governance from a holistic perspective, based on the data flow, as per the requirements of GDPR. These are the issues which were not envisioned when today’s governance models were designed in the late 1980s or early 1990s.

Place, publisher, year, edition, pages
UBT Knowledge center, 2019
Keywords
Agility, Data-flow, GDPR, IT Governance, Security
National Category
Information Systems
Research subject
Computer and Information Sciences Computer Science, Information Systems
Identifiers
urn:nbn:se:lnu:diva-93595 (URN)978-9951-550-19-2 (ISBN)
Conference
International Conference on Business, Technology and Innovation (IC-UBT 2019), Oktober 26, 2019, Pristina, Kosovo,
Available from: 2020-04-17 Created: 2020-04-17 Last updated: 2024-08-28Bibliographically approved
Magnusson, L. & Iqbal, S. (2018). Implications of EU-GDPR in Low-Grade Social, Activist and NGO Settings. International Journal of Business and Technology, 6(3), 1-7, Article ID 7.
Open this publication in new window or tab >>Implications of EU-GDPR in Low-Grade Social, Activist and NGO Settings
2018 (English)In: International Journal of Business and Technology, E-ISSN 2223-8387, Vol. 6, no 3, p. 1-7, article id 7Article in journal (Refereed) Published
Abstract [en]

Social support services are becoming popular among the citizens of every country and every age. Though, social support services easily accessible on mobile phones are used in different contexts, ranging from extending your presence and connectivity to friends, family and colleagues to using social media services for being a social activist seeking to help individuals confined in miserable situations such as homeless community, drug addicts or even revolutionists fighting against dictatorships etc. However, a very recent development in the European Parliament’s law (2016/679) on the processing and free movement of personal data in terms of EU-GDPR (General data protection rules) considers the low funded social service development efforts unsafe. This article analyses a case study conducted at a shelter for homeless mothers in the United States to conceptualize the future similar development efforts from low end public activist groups within European union. This article aims to raise awareness on this issue and also puts forth a conceptual model to envision the possibilities of mitigating the risks attached to such development efforts under the light of EU-GDPR which will be implemented in may 2018.

Place, publisher, year, edition, pages
UBT, 2018
Keywords
GDPR, social services, information security, public activist
National Category
Information Systems
Research subject
Computer and Information Sciences Computer Science; Computer and Information Sciences Computer Science, Information Systems; Economy, Business Informatics
Identifiers
urn:nbn:se:lnu:diva-85249 (URN)10.33107/ijbte.2018.6.3.07 (DOI)978-9951-437-60-8 (ISBN)
Available from: 2019-06-13 Created: 2019-06-13 Last updated: 2024-08-28Bibliographically approved
Magnusson, L., Iqbal, S., Elm, P. & Mirijamdotter, A. (2018). Searching for a Governance Model to manage and secure the data flow in organizations, as required by GDPR. In: Information System Research Seminar in Scandinavia, Aarhus University in Odder, Denmark, August 5th - 8th 2018: . Paper presented at Information System Research Seminar in Scandinavia, Aarhus University in Odder, Denmark, August 5th - 8th 2018.
Open this publication in new window or tab >>Searching for a Governance Model to manage and secure the data flow in organizations, as required by GDPR
2018 (English)In: Information System Research Seminar in Scandinavia, Aarhus University in Odder, Denmark, August 5th - 8th 2018, 2018Conference paper, Oral presentation only (Refereed)
Abstract [en]

Since the end of the 1980s, there have been several initiatives to control and manage enterprise IT environments. ITIL is one of the more successful models, COBIT another, accompanied by others as British Petroleum’s OBASHI model. However, thanks to the IP protocol and Internet, since mid-2000 the world has seen a veritable data explosion, affecting IS governance, singular IS systems now integrated. Some recent predictions expect current data volumes to grow more than 10 times till 2020, with serious implications both on governance and IT security. Additionally, we see some new EU regulations, i.e., primarily the new General Data Protection Regulation (GDPR), implemented in May 2018. Something that directly affects the scope of IS governance within the European Union and for non-European entities handling EU Citizens’ personal data; with substantial fines if not complying. The regulation forces anyone handling personal data to consider information strategies that include big data management, IS governance, and information security as a convoluted context, not by themselves, a governance package. This creates a need for a paradigm shift to remediate/mitigate identified limitations in today’s traditional governance models. This paper discusses governance from a holistic and agile perspective, based on the overall data flow, as per the requirements of GDPR. Issues that were not envisioned when today’s IS governance models were designed or not even in their latest releases. 

Keywords
Agility, Data-flow, GDPR, IT Governance, Security
National Category
Information Systems
Research subject
Computer and Information Sciences Computer Science, Information Systems; Computer and Information Sciences Computer Science, Information Systems
Identifiers
urn:nbn:se:lnu:diva-108605 (URN)
Conference
Information System Research Seminar in Scandinavia, Aarhus University in Odder, Denmark, August 5th - 8th 2018
Note

This paper was presented at the IRIS41 Nordic conference in Informatics. The paper was a conference seminar discussion paper, under blind peer review and group discussions. Only 9 out of some 30 papers made the final compilation "SELECTED PAPERS OF THE IRIS, ISSUE NR 9 (2018)" by AIS. This paper was not selected, thus published via Diva.

Available from: 2021-12-15 Created: 2021-12-15 Last updated: 2024-08-28Bibliographically approved
Magnusson, L., Elm, P. & Mirijamdotter, A. (2018). Towards secure data flow oriented multi-vendor IT governance models. International Journal of Business and Technology, 6(3), 1-9, Article ID 8.
Open this publication in new window or tab >>Towards secure data flow oriented multi-vendor IT governance models
2018 (English)In: International Journal of Business and Technology, E-ISSN 2223-8387, Vol. 6, no 3, p. 1-9, article id 8Article in journal (Refereed) Published
Abstract [en]

Today, still, ICT Governance is being regarded as a departmental concern, not an overall organizational concern. History has shown us that implementation strategies, which are based on departments, results in fractional implementations leading to ad hoc solutions with no central control and stagnation for the in-house ICT strategy. Further, this recently has created an opinion trend; many are talking about the ICT department as being redundant, a dying out breed, which should be replaced by on-demand specialized external services. Clearly, the evermore changing surroundings do force organizations to accelerate the pace of new adaptations within their ICT plans, more vivacious than most organizations currently is able to. This leads to that ICT departments tend to be reactive rather than acting proactively and take the lead in the increased transformation pace in which organizations find themselves. Simultaneously, the monolithic systems of the 1980ies/1990ies is often very dominating in an organization, consume too much of the yearly IT budget, leaving healthy system development behind. These systems were designed before data became an organizational all-encompassing resource; the systems were designed more or less in isolation in regards to the surrounding environment. These solutions make data sharing costly and not at all optimal. Additionally, in strives to adapt to the organization’s evolution, the initial architecture has become disrupted and built up in shreds. Adding to this, on May 25, 2018, an upgraded EU Privacy Regulation on General Data Protection Regulation (GDPR) will be activated. This upgraded privacy regulation includes a substantial strengthening of 1994’s data privacy regulation, which will profoundly affect EU organizations. This regulation will, among other things, limit the right to collect and process personal data and will give the data subject all rights to his/her data sets, independentof where this data is/has been collected and by whom. Such regulation force data collecting and processingorganizations to have total control over any personal data collected and processed. This includes detailedunderstanding of data flows, including who did what and when and under who’s authorization, and how data istransported and stored. Concerning data/information flows, maps are a mandatory part of the system documentation. This encompasses all systems, including outsourced such as cloud services. Hence, individual departments cannot any longer claim they “own” data. Further, since mid-2000, we have seen aglobal inter-organizational data integration, independent of organizations, public or private. If this integration ceasesto exist, the result will be a threat to the survival of the organization. Additionally, if the organization fails to providea transparent documentation according to the GDPR, substantial economic risk is at stake. So, the discussion aboutthe ICT departments’ demise is inapt. Any organizational change will require costly and time-consuming ICTdevelopment efforts to adapt to the legislation of today’s situation. Further, since data nowadays is interconnectedand transformed at all levels, interacting at multiple intersections all over the organization, and becoming a unifiedbase of all operative decisions, an ICT governance model for the organization is required.

Place, publisher, year, edition, pages
UBT, 2018
Keywords
ICT Governance, Privacy, IT, GDPR, Data flow, Data integration
National Category
Information Systems
Research subject
Computer and Information Sciences Computer Science, Information Systems
Identifiers
urn:nbn:se:lnu:diva-84876 (URN)10.33107/ijbte.2018.6.3.08 (DOI)
Available from: 2019-06-10 Created: 2019-06-10 Last updated: 2024-08-28Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0009-0000-8265-0944

Search in DiVA

Show all publications