Aller à : contenu haut bas recherche
 
 
EN     FR
Vous êtes ici:   UNIL > HEC Inst. > HEC App. > RECHERCHE
 
 

Solange Ghernaouti

Contact

Full Professor
Department of Information Systems


Contact
sgh@unil.ch
Tel 021.692.35.80
Fax 0216923585

Postal address
Université de Lausanne
Quartier UNIL-Chamberonne
Bâtiment Internef
1015 Lausanne

Internef, room 136
Tel 021.692.34.21



Other address
Université de Lausanne
Quartier UNIL-Chamberonne
Bâtiment Internef
1015 Lausanne

Teaching

bachelor Cyberespace et Internet
Related programme
Bachelor of Science (BSc) in Management
master Cybersécurité et intelligence économique
Related programme
Master of Science (MSc) in Information Systems

Research

Research areas

Axes de recherche
Comprehensive approach of cybersecurity and cybecrime

Cyberissues' strategic analysis

Cybersecurity and cyberdefense research

Innovation and prospective analysis in cybersecurity and business intelligence

Assessment of security measures' efficiency

Critical information infrastructure protection

Risk Management

Assistants

Léonore Cellier
lleonore.cellier@unil.ch



  Célia Guisolan
celia.guisolan@unil.ch



 

Publications

100 last publications ordered by: publication type  -  year

: Peer Reviewed

2018

CRESPO Laura (2018). SWITZERLAND'S CONTRIBUTION TO INTERNATIONAL CYBER STABILITY. Université de Lausanne, Faculté des hautes études commerciales. Ghernaouti Solange (Dir.)


2017

Ghernaouti S. (2017). La cybercriminalité - Les nouvelles armes du pouvoir. Les Presses polytechniques et universitaires romandes, Lausanne, Suisse.


Ghernaouti S. , Dufour A. (2017). Internet (3073). Presses Universitaires de France , Paris, France.


2016

Ghernaouti S. (2016). Cybersécurité, sécurité informatique et réseaux. Dunod, Malakoff, France.


Länger T., Pöhls H.C. ; Ghernaouti S. (2016). Selected Cloud Security Patterns to Improve End User Security and Privacy in Public Clouds. Privacy Technologies and Policy (pp. 115-132). Springer International Publishing. Peer Reviewed


2014

Ghernaouti S. (2014). The role of CBMs in a renewed vision of international cybersecurity: prospects for a global response and an international treaty . The Quest for cyberconfidence (pp. 10-21). International Telecommunication Union (ITU), Geneva, Switzerland.


Ghernaouti S. (2014). Foreword. Architecting User-Centric Privacy-As-A-Set-Of-Services: A Digital Identity-Related Privacy Framework (pp. ix-x). Switzerland: Springer International Publishing.


Ghernaouti S. (2014). The Cybersecurity Continuum to Enhance Cyber Resilience. The Quest for Cyber Confidence (pp. 76-82). International Telecommunication Union (ITU), Geneva, Switzerland.


Simms D. (2014). A Confluence of Risks: Control and Compliance in the World of Unstructured Data, Big Data and the Cloud. Université de Lausanne, Faculté des hautes études commerciales. Ghernaouti S. (Dir.)


2013

Ghernaouti -Hélie S. (2013). Les cyberrisques - Réalités et perspectives. SCARG (Swiss Cybersecurity Advisory and Research Group).


Ghernaouti-Hélie S. (2013). Cyber Power - Crime, Conflict and Security in Cyberspace. EPFL Press, Lausanne.


Ghernaouti S. (2013). Sécurité informatique et réseaux. Dunod, Malakoff, France.


Langer T. (2013). Information security and the enforcement of secrecy : the practical application of quantum key distribution. Université de Lausanne, Faculté des hautes études commerciales. Ghernaouti S. (Dir.)


Simms D. , Ghernaouti S. (2013, Mar). Structured and Unstructured Data in the Cloud: A Swiss Perspective on Readiness and Internal Controls. 27th International Conference on Advanced Information Networking and Applications Workshops (pp. 643-648). IEEE. Peer Reviewed


2012

Ayed G. B. , Ghernaouti-Helie S. (2012, Aug). Processes View Modeling of Identity-related Privacy Business Interoperability: Considering User-Supremacy Federated Identity Technical Model and Identity Contract Negotiation. 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (pp. 906-913). Institute of Electrical and Electronics Engineers (IEEE).


BEN AYED G. (2012). ARCHITECTING USER-CENTRIC PRIVACY-AS-A-SET-OF-SERVICES: DIGITAL IDENTITY RELATED PRIVACY FRAMEWORK. Université de Lausanne, Faculté des hautes études commerciales. Ghernaouti-Hélie S. (Dir.)


Ben Ayed G. , Ghernaouti-Helie S. (2012, Sep). Service-Oriented Digital Identity-Related Privacy Interoperability: Implementation Framework of Privacy-as-a-Set-of-Services (PaaSS). Enterprise Interoperability : 4th International IFIP Working Conference, IWEI 2012, Harbin, China, September 6-7, 2012. Proceedings, 122 (pp. 193-200). Springer.


Dufour A. , Ghernaouti-Hélie S. (2012). Internet. PUF.


Ghernaouti-Hélie S. (2012). The cybercrime ecosystem & privacy issues - mains challenges and perspectives from a social perspective. ERCIM News, 90, 10-11.


Ghernaouti-Helie S. (2012, Sep). Going Digital – Rethinking Cybersecurity and Confidence in a Connected World: A Challenge for Society. 2012 Third International Conference on Emerging Security Technologies (pp. 8-11). Institute of Electrical and Electronics Engineers (IEEE).


Ghernaouti-Hélie S. (2012, Mar). The global cybercrime ecosystem: Major players and their relationships - challenges from a societal perspective. The Europe - Asia Pacific - Commonwealth of Independent States (EUR-ASP-CIS) Cross Regional Seminar - "Current Methods for Combating Cybercrime" - IMPACTS - ITU - Odessa, Ukraine, 28-30 March 2012.


Ghernaouti-Hélie S. , Berger R. (2012, May). Techno Sacré, cyberespace et protéisme numérique : répondre autrement aux interrogations profondes de l'humain. Lire demain - Des manuscrits antiques à l'ère digitale (pp. 709-724). Presses polytechniques et universitaires romandes.


Ghernaouti-Hélie S. , Länger T. (2012). Quantum key distribution for next generation networks. Magazine Hackin9 Extra - Cryptography, 1, 40-46.


Ghernaouti-Hélie S., Parent C. ; Spaccapietra S. (2012). Geolocalisation and privacy issues. MODAP Newsletter (Mobility, data mining, and privacy), 3, 3.


Ghernaouti-Hélie S., Tölle J. ; Quisquater J.-J. (2012). Introduction to the special theme « Cybercrime and Privacy Issues ». ERCIM News, 90, 9.


2011

Ben Ayed G. , Ghernaouti-Hélie S. (2011, Apr). Digital Identity Attributes Cohesion: Major Issues and Challenges for E-services Access Control. ICITeS'2011 - International Conference on Information Technology and e-Services - April 10-12 .


Ben Ayed G. , Ghernaouti-Hélie S. (2011, Jan). Digital Identity Management within Networked Information Systems: From Vertical Silos View into Horizontal User-Supremacy Processes Management. The 14th International Conference on Network-Based Information Systems (NBiS 2011), Sept. 7-9 (pp. 98-103). IEEE publications.


Ben Ayed G. , Ghernaouti-Hélie S. (2011, Mar). Claim-Based Digital Identity Fusion to Access E-Services: Major Issues and Challenges in Digital Society. International Conference on Information and Computer Applications, ICICA 2011 ,March 18-20. IEEE Press.


Ben Ayed G. , Ghernaouti-Hélie S. (2011, Jul). XRD Metadata to Make Digital Identity Less Visible and Foster Trusted Collaborations across Networked Computing Ecosystems. Networked Digital Technologies : Third International Conference, NDT 2011, Macau, China, July 11-13, 2011. Proceedings, 136.


Ben Hayed G. , Ghernaouti S. (2011, Jan). Privacy requirements specification for digital identity management systems implementation: Towards a digital society of privacy. 2011 International Conference for Internet Technology and Secured Transactions. IEEE. Peer Reviewed


Ghernaouti-Hélie S. (2011). Menaces, conflits dans le cyberespace et cyberpouvoir. Sécurité & Stratégie - Dossier spécial: la sécurité à l'international / Revue de la Documentation française, 7, 61 - 67.


Ghernaouti-Hélie S. (2011). La cybercriminalité: Le cyberespace une valeur commune à protéger. Rapport de l'Observatoire National de la Délinquance et des Réponses Pénales 2011 (ONDRP), sous la direction d'Alain Bauer. Institut National en Hautes Etudes et Sécurité et de la Justice (INHESJ) (pp. 775-904). CNRS Editions, Paris, France.


Ghernaouti-Hélie S. (2011). Des cybergraines d'une présence infinie. Un homme de parole - Hommage à René Berger. Le Cadratin - Iderive, Vevey.


Ghernaouti-Hélie S. (2011, Jan). Going digital: Cybersecurity and confidence in a connected world. Second Worldwide Cybersecurity Summit :Mobilizing for International Action, EWI 2011 .


Ghernaouti-Hélie S. (2011). La femme est l'avenir de l'homme, publié dans "L'Hebdo", 3 mars 11.


Ghernaouti-Hélie S. (2011). La sécurité informatique offre un avantage concurrentiel aux entreprises, publié dans "Entreprise Romande", 4 mars 2011.


Ghernaouti-Hélie S., Simms D. ; Tashi I. (2011, Sep). Protecting Information in a Connected World: A Question of Security and of Confidence in Security. Network-Based Information Systems (NBiS), 2011 14th International Conference on, Sept. 7-9 (pp. 208-212). IEEE publications.


Ghernaouti-Hélie S., Tashi I. ; Simms D. (2011, Mar). Optimizing security efficiency through effective risk management. 25th International Conference on Advanced Information Networking & Application (IEEE, AINA 2011) - Workshop Security Tools & Solutions - 22-25 March 2011. IEEE.


Ghernaouti S. (2011). Connecter le monde de manière responsable. Pour un management responsable au 21e siècle (pp. 7-13). Pearson, Paris, France. Peer Reviewed


Ghernaouti S. , Tashi I. (2011). Information Security Evaluation - A Holistic Approach. EPFL Press - Presses polytechniques et universitaires romandes, Lausanne, Switzerland.


Schjolberg S. , Ghernaouti-Hélie S. (2011). A Global Protocol on Cybersecurity and Cybercrime: An initiative for peace and security in cyberspace. Cybercrimedata, Oslo.


2010

Berger R. , Ghernaouti-Hélie S. (2010). Technocivilisation - Pour une philosophie du numérique. PPUR (Presses Polytechniques et Universitaires Romandes), Lausanne, Suisse.


Ghernaouti-Hélie S. , Debbagh T. (2010). Organizational structures. Global Cybersecurity Agenda : a Framework for International Cooperation. International Telecommunication Union (ITU), Geneva, Switzerland.


Ghernaouti-Hélie S. , Tallo I. (2010). Capacity Building. Global Cybersecurity Agenda : a Framework for International Cooperation. International Telecommunication Union (ITU), Geneva, Switzerland.


Ghernaouti-Hélie S. (2010, Feb). A national strategy for an effective cybersecurity approach and culture. 5th International conference on Availability, Reliability and Security: ARES 2010, Proceedings (pp. 370-373). IEEE. Peer Reviewed


Ghernaouti-Hélie S. (2010, Jun). Human rights in a digital interconnected world. Proceeding - 18th Biennial Conference International Telecommunication Society (ITS) in association with the 27th Annual Conference of the Japan Society of Information and Communication Research (JSICR) . Peer Reviewed


Ghernaouti-Hélie S. (2010). Contribution au Rapport d'experts "Dialogue Internet et moi - Des citoyennes et citoyens posent des questions et formulent des propositions sur le thème d'Internet". Centre d'évaluation des choix technologiques TA-SWISS, projet "L'Internet du futur".


Ghernaouti-Hélie S. (2010). Comment lutter contre la cybercriminalité?, publié dans "Revue pour la science; le magazine de référence scientifique", mai 2010, pp. 24-27.


Ghernaouti-Hélie S. (2010). M.A.O - Mort Assistée par Ordinateur, publié dans "Flash informatique", EPFL, No 3/2010.


Ghernaouti-Hélie S. (2010). We need a Cyberspace Treat, published in "Intermedia", July 2010, Vol. 38, Issue 3.


Ghernaouti-Hélie S. (2010). Domaine en téléinformatique, publié dans "Flash informatique", EPFL, No 6/2010.


Ghernaouti-Hélie S., Rosales E. ; Lavanchy A. (2010). Mot croisé: PIRATE, publié dans "Flash informatique", EPFL, No 3/2010.


Ghernaouti-Hélie S., Tashi I. ; Simms D. (2010, Feb). A multi-stage methodology for ensuring appropriate security culture and governance. 5th International conference on Availability, Reliability and Security: ARES 2010, Proceedings (pp. 353-360). IEEE. Peer Reviewed


Remili A. (2010). Contribution à l'élaboration de mécanismes de détection, de contrôle et de lutte contre le blanchiment d'argent au regard de l'usage des technologies de l'information et de la communication "cas de l'Algérie". Université de Lausanne, Faculté des hautes études commerciales. Ghernaouti-Hélie S. (Dir.)


Schjolberg S. , Ghernaouti-Hélie S. (2010, Jun). Needs of an United Nation convention on cybersecurity and presentation of a Global Protocol on Cybersecurity and Cybercrime to answer them. Proceeding - 18th Biennial Conference International Telecommunication Society (ITS) in association with the 27th Annual Conference of the Japan Society of Information and Communication Research (JSICR) . Peer Reviewed


Tashi I. (2010). An assurance-based model to holistically assess the information security posture. Université de Lausanne, Faculté des hautes études commerciales. Ghernaouti-Hélie S. (Dir.)


Tashi I. , Ghernaouti-Hélie S. (2010). A Security Assurance Model to Holistically Assess the Information Security Posture. Complex Intelligent Systems and their Applications (Vol. 41, pp. 83-108). New York, USA: Springer New York.


Tashi I. , Ghernaouti-Hélie S. (2010, Jun). Assessing the Legal and Regulatory Compliance Dimension of the Information Security. Proceeding - 18th Biennial Conference International Telecommunication Society (ITS) in association with the 27th Annual Conference of the Japan Society of Information and Communication Research (JSICR) . Peer Reviewed


2009

Ghernaouti-Hélie S. (2009). Cybersecurity Guide for Developing Countries. ITU-D (International Telecommunication Union), Geneva, Switzerland.


Ghernaouti-Hélie S. (2009). La Cybercriminalité : le visible et l'invisible. PPUR (Presses Polytechniques et Universitaires Romandes), Lausanne, Suisse.


Ghernaouti-Hélie S. (2009, Mar). An inclusive information society needs a global approach of information security. 4th international conference on Availability, Reliability and Security (ARES 2009), Proceedings (pp. 658-662). IEEE. Peer Reviewed


Ghernaouti-Hélie S. (2009). Contribution au Rapport d'experts "Weiter knüpfen am Netz der Netze Bericht von TA-SWISS im Rahmen des Projekts Internet der Zukunft " [Aujourd'hui comme demain, tisser la toile des réseaux: Ce que disent les experts sur l'Internet du futur]. Centre d'évaluation des choix technologiques TA-SWISS, projet "L'Internet du futur" - module 2.


Ghernaouti-Hélie S. (2009). Les Droits de l'Homme au regard d'Internet et de la sécurité informatique : Posture ou Imposture ?, publié dans "Flash informatique", EPFL, No 10, 22 décembre 2009, pp. 11-12.


Ghernaouti-Hélie S. (2009). L'économie souterraine induite du cybercrime, publié dans "l'AGEFI", 27 novembre 2009.


Ghernaouti-Hélie S., Simms D. ; Tashi I. (2009, Aug). Reasonable Security by Effective Risk Management Practices: From Theory to Practice. 12th International Conference on Network-Based Information Systems, 2009. NBIS '09. (pp. 226-233). IEEE. Peer Reviewed


Ghernaouti-Hélie S. , Tashi I. (2009, Mar). A security management assurance model to holistically assess the information security posture. Proceedings of the 4th international conference on Availability, Reliability and Security (ARES 2009) (pp. 756-761). IEEE. Peer Reviewed


Schjolberg S. , Ghernaouti-Hélie S. (2009). A Global Protocol on Cybersecurity and Cybercrime: An initiative for peace and security in cyberspace. Cybercrimedata, Oslo.


Sonna Momo L. (2009). Elaboration de tableaux de bord SSI dynamiques : une approche à base d'ontologies. Université de Lausanne, Faculté des hautes études commerciales. Ghernaouti-Hélie S. (Dir.)


Tashi I. , Ghernaouti-Hélie S. (2009, Jan). An Holistic model to evaluate the Information Security Health State. European Telecommunications Standartization Institute (ETSI) 4th Security Workshop. Peer Reviewed


Tashi I. , Ghernaouti-Hélie S. (2009, May). Information Security Management is not only Risk Management. Proceedings of the 2009 Fourth International Conference on Internet Monitoring and Protection (ICIMP 2009) (pp. 116-123). IEEE. Peer Reviewed


2008

Ghernaouti-Hélie S. (2008). Un monde numérique particulièrement vulnérable à la criminalité. La Documentation française - Problèmes politiques et sociaux - Dossier N° 953 La délinquance électronique, 13-15.


Ghernaouti-Hélie S. (2008). Information Security for Economic and social development. United Nations Economic and Social Commission for Asia and the Pacific (UNESCAP), Bangkok, Thailand.


Ghernaouti-Hélie S. (2008, Oct). Quantum cryptography : An Innovation in the Domain of Secure Information Transmission. Quantum Network Demonstration Scientific Conference. Peer Reviewed


Ghernaouti-Hélie S. (2008). Global Strategic Report co-autor (Part III : Organisational Structures and Part IV : Capacity Building). ITU Global Cybersecurity Agenda (GCA) - High-level Experts Group (HLEG).


Ghernaouti-Hélie S. (2008). Investir autrement en matière de sécurité informatique, publié dans "Le Temps", Chronique Un temps d'avance, 6 juin 2008.


Ghernaouti-Hélie S. (2008). Identités multiples sur Internet et identification des cybercriminels, publié dans "Revue de la Gendarmerie nationale" No 27.


Länger T. , Ghernaouti-Hélie S. (2008, Jan). Next Steps towards Practical Application of Quantum Cryptography. Proceedings of Networking and Electronic Commerce Research Conference 2008 (NAEC 2008). Peer Reviewed


Länger T., Ghernaouti-Hélie S. ; Lenhart G. (2008, Jul). SECOQC / ETSI Open Initiative for Standardisation of Quantum Cryptography and Quantum Technologies. Proceedings of 17th International Laser Physics workshop, The International Journal Laser Physics. Peer Reviewed


Rass S., Sfaxi M.A., Ghernaouti-Hélie S. ; Kyamakya K. (2008, Feb). Secure Message Relay over Networks with QKD-Links. Proceedings of the Second International Conference on Quantum, Nano, and Micro Technologies (ICQNM 08) (pp. 10-15). Peer Reviewed


Tashi I. , Ghernaouti-Hélie S. (2008, Jul). Efficient Security Measurements and Metrics for Risk Assessment. The Third International Conference on Internet Monitoring and Protection (ICIMP 2008), Proceedings (pp. 131-138). Peer Reviewed


2007

Ghernaouti-Hélie S. (2007). Information security, Internet security or critical information infrastructure protection? ICT security challenges for citizens, organisations and states. European CIIP Newsletter, 3, 27-28. Peer Reviewed


Ghernaouti-Hélie S. (2007). Cybercriminalité: réponse des institutions. Hakin9 Magazine.


Ghernaouti-Hélie S. (2007). Cybercriminalité et sécurité intérieure : état des lieux et éléments de prévention. Traité de sécurité intérieure (pp. 246-259). Centre International de Criminologie Comparée (CiCC), Université de Montréal, Canada.


Ghernaouti-Hélie S. (2007). Cyberslacking et cybersurveillance des employés, publié dans "Le Temps", Chronique Un temps d'avance, 8 décembre 2007.


Ghernaouti-Hélie S. (2007). L'informatique est une infrastructure critique au même titre que l'électricité, publié dans "Le Temps", Chronique Un temps d'avance, 11 mai 2007.


Ghernaouti-Hélie S. (2007). Pourquoi bâtir la sécurité des Etats sur la terreur?, publié dans "Le Temps", Courrier des lecteurs, 25 septembre 2007.


Ghernaouti-Hélie S. , Sfaxi M. A. (2007). Guaranteerring Security of Financial Transaction by Using Quantum Cryptography in Banking Environment. E-business and Telecommunication Networks (Vol. 3, pp. 139-149). Springer, Berlin, Heidelberg.


Ghernaouti-Hélie S. , Sfaxi M.A. (2007, Mar). Sharing information using quantum cryptography to reach the unconditional security. Proceedings of 5th Research, Innovation and Vision for the Future (RIVF) (pp. 175-180). IEEE. Peer Reviewed


Ghernaouti-Hélie S., Sfaxi M.A. ; Tashi I. (2007, Sep). How QKD can improve the security level of future e-commerce transactions. Proceedings of the 18th European Regional International Telecommunication Society Conference (ITS). Peer Reviewed


Sfaxi M.A. (2007). Improving telecommunication security level by integrating quantum key distribution in communication protocols. Université de Lausanne, Faculté des hautes études commerciales. Ghernaouti-Hélie S. (Dir.)


Tashi I. , Ghernaouti-Hélie S. (2007). Quantum Cryptography: An innovation in the domain of secure information transmission. Business White Paper. Peer Reviewed


Tashi I. , Ghernaouti-Hélie S. (2007, Aug). ISO security standards as leverage on IT Security Management. Proceedings of 13th Americas Conference on Information Systems (AMCIS). Peer Reviewed


Tashi I. , Ghernaouti-Hélie S. (2007, Oct). Quantum security for business and commercial applications. Proceedings of Networking and Electronic Commerce Research Conference 2007 (NAEC 2007). Peer Reviewed


Tashi I. , Ghernaouti-Hélie S. (2007, Apr). Security metrics to improve information security management. Proceedings of 6th Annual Security Conference. Peer Reviewed


Villa A., Iglesias J. ; Ghernaouti-Hélie S. (2007, Oct). Knowledge Sharing by means of OpenAdap.net. Proceedings of 2nd Workshop IST_Africa - Supporting Research Engagement with Africa. Peer Reviewed


Villa A., Iglesias J. ; Ghernaouti-Hélie S. (2007, Sep). OpenAdap.net - A socialware for knowledge sharing. Proceedings of International Conference on Internet Technologies and Applications (ITA). Peer Reviewed


Villa A., Iglesias J. ; Ghernaouti-Hélie S. (2007, Jun). OpenAdapt.net: a dynamic middleware for knowledge production and distribution. Proceedings of International conference - Towards a Knowledge Society: Is Knowledge a Public Good? Dynamics of Knowledge Production and Distribution (ESSHRA). Bern. Peer Reviewed


2006

Ghernaouti-Hélie S. (2006). Guide de la cybersécurité pour les pays en développement. UIT (Union Internationale des Télécommunications), Genève, Suisse.


Ghernaouti-Hélie S. (2006). L'intelligence juridique dans la gestion de la sécurité des systèmes d'information et des réseaux de télécommunication. Droit des sociétés : Mélanges en l'honneur de Roland Ruedin (pp. 87-98). Helbing & Lichtenhahn.


Ghernaouti-Hélie S. (2006, Jun). Risques informatiques d'origine cybercriminelle et gestion de la sécurité. Proceedings of Colloque AFME. Montréal, Canada.


Curriculum

Education

Doctor of Paris VI University in "Informatics and Telecommunication"
with distinction "Excellent"

Work experience

Full Professor
Swiss Cybersecurity Advisory and Research Group - HEC - UNIL

  • The First women Professor-promoted in Faculty of Business and Economics in 1987

  • President of the Social Commission of the University of Lausanne


Invited professor at the Sociology department of the University of Geneva (Internet and Society)
Cybersecurity and Cybercrime International Expert
Author of numerous books and publications on cyber issues
Key speaker for numerous events
One of the 100 most important personalities in French-speaking Switzerland (Forum des 100 Edition 2011 - l'Hebdo) and one of the 300 most influential figures in Switzerland (Bilan of 22 juin 2011)
She is an emblematic figure among scientists on the cutting edge of cybersecurity's research field.


Other activities

Various engagements and contributions
defending Human Rights, equal opportunities and dignity.
defending fundamental rights on Internet and in Cyberspace
protecting personal data and digital privacy

Events organization
Conferences and debates for general public and professionals
Scientific conferences and symposiums

Various editorial activities (one & off line)

Keywords

  • business intelligence
  • crisis management
  • cybercrime
  • cyberdefense
  • cybersecurity
  • cyberspace
  • data protection for individuals, organizations and states
  • economic crime
  • geopolitical context of security
  • information security audit
  • information security management
  • information security transverse and integrative approach
  • informational risk
  • informational security
  • interdisciplinary research
  • internet
  • internet philosophy
  • network and telecommunication
  • political, economical, social, legal and technological dimensions of ntic
  • protection of the critical infrastructures
  • public security
  • risk management (5)
  • security strategy
  • social networks (2)
  • training and sensitisation about information security needs and measures

 
 
Search


Internef - CH-1015 Lausanne - Suisse  -   Tél. +41 21 692 33 00  -   Fax +41 21 692 33 05
Swiss University