Abstract
Digital heritage, with its intellectual and cultural identity value, constitutes a significant asset. This also makes it an important asset in the cyber market. Cultural heritage institutions, recognising the vital role of digital assets, confront various information security risks and must adopt cyber threat related strategies to counter potential cyber-attacks. This paper first investigates the susceptibility of digital heritage objects to cyber threats by examining their distinctive characteristics. The study subsequently poses research enquiries concerning the cybersecurity proficiency and general awareness of cultural heritage professionals. A conducted survey in Croatia among these professionals analyses their information and computer practices related to the storage and preservation of digital cultural heritage. Findings reveal that while overall cybersecurity awareness is commendable, there exists a deficiency in cybersecurity and data protection training among cultural heritage professionals, even at the basic level. Additionally, the study highlights insufficient technical support and equipment for cybersecurity within cultural heritage institutions.
Acknowledgements
We are thankful to our study participants for their time and effort.
Appendix: Questionnaire Used in the Survey[2]
Please indicate the type of institution or organisation where you work:
Archive
Museum
Library
Gallery
Institute
Association
Library/archive/museum included
Other (free text input)
Is there a department or person in charge of IT systems management in your institution?
Yes
No
How long have you been working at your current workplace?
Up to 5 years
6 to 10 years
10 to 15 years
More than 15 years
Have you passed the professional exam for a certain professional title so far?
Yes
No
If the answer to the previous question is “Yes”, please indicate which professional title you have obtained:
Curator
Senior curator
Museum advisor
Documentary artist
Senior documentarian
From the archive
Senior archivist
Archival consultant
Librarian
Graduated librarian
Senior librarian
Library advisor
Professional associate
Senior Associate
Other (free text input)
What types of materials do you come into contact with in your daily work (multiple answers possible):
Original analogue materials (e.g. three-dimensional museum objects, book materials, archival materials on paper or parchment)
Digitised materials and materials
Digitised documentation material and documentary material
Original digital documents and/or audio-visual material
Are you in charge of describing materials in your daily work?
Yes
No
Do you have the role of administrator of collections of digital and digitised materials?
Yes
No
Do you come into contact with confidential and/or personal data in your daily work?
Yes
No
Do you think that the security of digital and digitised materials is adequately and clearly regulated in existing professional guidelines and instructions?
Yes
No
I do not know
Other (free text input)
How would you rate your general technical knowledge of computers and the Internet?
Bad
Good
Excellent
Have you participated in any kind of education related to the problems of security and privacy on the Internet?
Yes
No
Are you familiar with the procedures for protecting digital documents and digital and digitised materials on your business computer?
Yes
No
Partially
Do you access business computer equipment from home (e.g. remote work)?
Sometimes
Often
Never
In my institution, there is no possibility of external access to business computer equipment
The passwords for accessing your user account on a business computer are available:
Only to you
To you and your superior
To you and the IT/administrator
I’m not sure
Assess the possibility of hacking your business computer?
There is a small possibility
There is a great possibility
Hacking my business computer is unlikely
There is no possibility of hacking
I don’t know/I’m not sure
Other (free text input)
You have received an e-mail from your supervisor/IT specialist to urgently change your business password via the link in the message. What should you do?
I will always trust an e-mail sent from a superior/IT specialist
I will check what this is about before changing the password
I will completely ignore the message
Do you connect your private mobile phone to the network at work via Wi-Fi?
Often
Sometimes
Never
There is no business Wi-Fi network available in our institution
Connecting private devices to any network is not allowed in our institution
How often do you change your business password?
In the institution, we have a defined policy of periodic password changes
Sometimes, on my own initiative
Never
References
Alcala, R. 2022. “Ukraine Symposium – The Ukraine Conflict and the Future of Digital Cultural Property.” Articles of War. https://lieber.westpoint.edu/ukraine-conflict-future-digital-cultural-property/ (accessed September 25, 2023).Search in Google Scholar
Bishara, H. 2020. “How Does the Vatican Protect its Digitized Collection from Hackers?” Hyperallergic. https://hyperallergic.com/600782/vatican-hires-cybersecurity-library/ (accessed September 25, 2023).Search in Google Scholar
Cascone, S. 2020. “Hackers Have Stolen Private Information from Donor Lists to 200 Institutions, Including the Smithsonian and the UK’s National Trust.” artnet®news. https://news.artnet.com/art-world/hackers-hit-smithsonian-parrish-corning-1905256 (accessed September 25, 2023).Search in Google Scholar
Donaldson, D. R., and L. Bell. 2018. “Security, Archivists, and Digital Collections.” Journal of Archival Organization 15 (1–2): 1–19. https://doi.org/10.1080/15332748.2019.1609311.Search in Google Scholar
Dulong de Rosnay, M., and F. Musiani. 2012. “The Preservation of Digital Heritage: Epistemological and Legal Reflections.” ESSACHESS. Journal for Communication Studies 5 (2): 81–94.Search in Google Scholar
Galba, T., K. Solic, and K. Nenadic. 2018. “Evidential Reasoning Approach to Behavioural Analysis of ICT Users’ Security Awareness.” Technical Gazette 25 (2): 309–15. https://doi.org/10.17559/TV-20150513123751.Search in Google Scholar
Gandhi, R., A. Sharma, W. Mahoney, W. Sousan, Z. Qiuming, and P. Laplante. 2011. “Dimension of Cyber Attacks: Social, Political, Economic and Cultural.” IEEE Technology and Society Magazine 30 (1): 28–38. https://doi.org/10.1109/MTS.2011.940293.Search in Google Scholar
Hui, Y. 2012. “What Is a Digital Object?” Metaphyilosophy 43 (4): 380–95. https://doi.org/10.1111/j.1467-9973.2012.01761.x.Search in Google Scholar
Information Security Act. 2007. Narodne novine (79). https://narodne-novine.nn.hr/eli/sluzbeni/2007/79/2484 (accessed November 22, 2023).Search in Google Scholar
International Centre for the Study of the Preservation and Restoration of Cultural Property. 2022. Sustaining Digital Heritage Initiative. https://www.iccrom.org/programmes/sustaining-digital-heritage (accessed November 22, 2023).Search in Google Scholar
Kirschenbaum, M. G., R. Ovenden, and G. Redwine. 2010. Digital Forensics and Born-Digital Content in Cultural Heritage Collections. Washington, D.C.: Council on Library and Information Resources. https://www.clir.org/wp-content/uploads/sites/6/pub149.pdf (accessed September 25, 2023).Search in Google Scholar
Law on Archives and Archival Material. 2018. Official Gazette (61). https://narodne-novine.nn.hr/clanci/sluzbeni/full/2018_07_61_1265.html (accessed November 22, 2023).Search in Google Scholar
Law on Libraries and Library Activities. 2019. Official Gazette (17, 19). https://narodne-novine.nn.hr/clanci/sluzbeni/2019_02_17_356.html; https://narodne-novine.nn.hr/clanci/sluzbeni/2019_10_98_1945.html (accessed November 22, 2023).Search in Google Scholar
Li, X. 2017. “A Review of Motivations of Illegal Cyber Activities.” Kriminologija & socijalna integracija 25 (1): 110–26. https://doi.org/10.31299/ksi.25.1.4.Search in Google Scholar
Owen, J. M. 2005. “Preserving the Digital Heritage: Roles and Responsibilities for Heritage Repositories.” In Selected Papers of the International Conference Organized by Netherlands National Commission for UNESCO Koninklijke Bibliotheek (National Library of the Netherlands), The Hague, November 4–5, 2005, edited by Yola de Lusen, and Vincent Wintermans, 45–9. https://www.ica.org/sites/default/files/WG_2007_PAAG-preserving-the-digital-heritage_EN.pdf (accessed September 25, 2023).Search in Google Scholar
Registry of Public and Private Museums in Croatia. 2019. Official Gazette (16). https://narodne-novine.nn.hr/eli/sluzbeni/2019/16/337 (accessed November 22, 2023).Search in Google Scholar
Regulation on Protective Measures for the Security of Information Systems. 2008. Official Gazette (46). https://narodne-novine.nn.hr/eli/sluzbeni/2008/46/1547 (accessed November 22, 2023).Search in Google Scholar
Rosén, F. 2022. NATO and Cultural Property: A Hybrid Threat Perspective. Copenhagen: Nordic Center for Cultural Heritage and Armed Conflict. https://www.heritageconflict.org/blog/2022/3/2/nato-and-cpp-a-hybrid-threat-perspective (accessed September 25, 2023).Search in Google Scholar
San Nicolas-Rocca, T., and R. J. Burkhard. 2019. “Information Security in Libraries: Examining the Effects of Knowledge Transfer.” Information Technology and Libraries 38 (2): 58–71. https://doi.org/10.6017/ital.v38i2.10973.Search in Google Scholar
Schmitt, M. N., ed. 2017. Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. 2nd ed. New York: Cambridge University Press.10.1017/9781316822524Search in Google Scholar
Soare, B. 2022. What Are the Main Attack Vectors in Cybersecurity? https://heimdalsecurity.com/blog/attack-vectors/ (accessed November 25, 2023).Search in Google Scholar
UNESCO. 1954. Convention for the Protection of Cultural Property in the Event of Armed Conflict with Regulations for the Execution of the Convention. http://portal.unesco.org/en/ev.php-URL_ID=13637&URL_DO=DO_TOPIC&URL_SECTION=201.html (accessed November 22, 2023).Search in Google Scholar
UNESCO. 2003. Charter on the Preservation of the Digital Heritage, Adopted at the 32nd Session of the General Conference of UNESCO. https://unesdoc.unesco.org/ark:/48223/pf0000179529.page=2 (accessed November 22, 2023).Search in Google Scholar
UNESCO. 2015. Recommendation Concerning the Preservation of, and Access to, Documentary Heritage, Including in Digital Form (38 C/24). UNESCO General Conference, 38th. https://unesdoc.unesco.org/ark:/48223/pf0000233916 (accessed November 22, 2023).Search in Google Scholar
© 2023 Walter de Gruyter GmbH, Berlin/Boston
Articles in the same Issue
- Frontmatter
- Editorial
- From the Editor
- Articles
- Legislative Acts on Electronic Document Management in China
- Digital Cultural Heritage, Cybersecurity, and the Human Factor
- Smart Solutions for Heritage Sites: Florence and Yazd
- Strategies for Promoting Open Access Resources in Academic Institutions
- Book Review
- Raiford Guins: Replayed: Essential Writings on Software Preservation and Game Histories
Articles in the same Issue
- Frontmatter
- Editorial
- From the Editor
- Articles
- Legislative Acts on Electronic Document Management in China
- Digital Cultural Heritage, Cybersecurity, and the Human Factor
- Smart Solutions for Heritage Sites: Florence and Yazd
- Strategies for Promoting Open Access Resources in Academic Institutions
- Book Review
- Raiford Guins: Replayed: Essential Writings on Software Preservation and Game Histories