This article aims to generate discussion about strategies to improve information security – in particular to support people in appropriately handling sensitive information (recognising the human factor as one of the main weaknesses in security programs); leveraging existing systems and frameworks to enhance interoperability; and encouraging knowledge sharing between IG […]