Conceptual Information Modelling within the Contemporary Information Security Policies

被引:0
|
作者
Klaic, Aleksandar [1 ]
Golub, Marin [2 ]
机构
[1] Off Natl Secur Council, Zagreb, Croatia
[2] Fac Elect Engn & Comp, Zagreb, Croatia
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The contemporary information security policies are analysed in the paper. These policies are characterised by increased similarities among the information security requirements of different sectors of society. Also, they are characterised by the increased differences in comparison with the traditional approach to the security within the closed environment. Key factors of the information security policy: people, process, and technology, are closely related to the requirements and restrictions imposed on certain type of information. In that way the approach to conceptual information modelling becomes one of the central problems of contemporary information security policies. The paper elaborates the tpproach to the conceptual information modelling, stressing the requirements of both the protection and the sharing of information. It offers the taxonomy of the main terms, which is the base for the development of proposed conceptual model of the information definition and sharing. The conceptual model is based on the standard UML graphical notation that makes it easier to visualize and understand the proposed model and the approach applied in the paper. The proposed model introduces formalized and more structured approach to this field in order to facilitate the development of the solutions that can keep up with the growing complexity of contemporary information security policies.
引用
收藏
页码:1105 / 1110
页数:6
相关论文
共 50 条
  • [31] Determinants of early conformance with information security policies
    Belanger, France
    Collignon, Stephane
    Enget, Kathryn
    Negangard, Eric
    [J]. INFORMATION & MANAGEMENT, 2017, 54 (07) : 887 - 901
  • [32] Compliance with Information Security Policies: An Empirical Investigation
    Siponen, Mikko
    Pahnila, Seppo
    Mahmood, M. Adam
    [J]. COMPUTER, 2010, 43 (02) : 64 - 71
  • [33] Architecture of Information Security Policies: A Content Analysis
    Lopes, Isabel
    Oliveira, Pedro
    [J]. NEW ADVANCES IN INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 1, 2016, 444 : 493 - 502
  • [34] Information Security Policies in Small Finnish Companies
    Ilvonen, Ilona
    [J]. PROCEEDINGS OF THE 8TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2009, : 112 - 117
  • [35] Preparing for Cyber Threats with Information Security Policies
    Ilvonen, Ilona
    Virtanen, Pasi
    [J]. INTERNATIONAL JOURNAL OF CYBER WARFARE AND TERRORISM, 2013, 3 (04) : 22 - 31
  • [36] POLICIES OF OPTIMIZING THE LEVEL OF INVESTMENT IN INFORMATION SECURITY
    Stroie, Elena Ramona
    Panait, Robert Constantin
    [J]. INTERNATIONAL CONFERENCE ON INFORMATICS IN ECONOMY, 2012, : 277 - 281
  • [37] Exploiting fact verbalisation in conceptual information modelling
    Ter Hofstede, AHM
    Proper, HA
    Van der Weide, TP
    [J]. INFORMATION SYSTEMS, 1997, 22 (6-7) : 349 - 385
  • [38] A New Method for Conceptual Modelling of Information Systems
    Gustas, Remigijus
    Gustiene, Prima
    [J]. INFORMATION SYSTEMS DEVELOPMENT: TOWARDS A SERVICE PROVISION SOCIETY, 2009, : 157 - 166
  • [39] Conceptual analysis and ontological modelling in information systems
    Dreher, Heinz
    Reiners, Torsten
    Voß, Stefan
    Williams, Robert
    [J]. MKWI 2010 - Multikonferenz Wirtschaftsinformatik 2010, 2010, : 5 - 6
  • [40] Information Security by Words Alone: The Case for Strong Security Policies
    Arnett, Kirk P.
    Templeton, Gary F.
    Vance, David A.
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2009, 3 (02) : 84 - 89