Improving the information security model by using TH

被引:0
|
作者
Ahlfeldt, Rose-Mharie [1 ]
Spagnoletti, Paolo [2 ]
Sindre, Guttorm [3 ]
机构
[1] Univ Skovde, Box 408, S-54228 Skovde, Sweden
[2] Luiss Guido Carli Univ, CeRSI, Rome, Italy
[3] NTNU, Trondheim, Norway
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the context of information systems and information technology, information security is a concept that is becoming widely used. The European Network of Excellence INTEROP classifies information security as a nonfunctional aspect of interoperability and as such it is an integral part of the design process for interoperable systems. In the last decade, academics and practitioners have shown their interest in information security, for example by developing security models for evaluating products and setting up security specifications in order to safeguard the confidentiality, integrity, availability and accountability of data. Earlier research has shown that measures to achieve information security in the administrative or organisational level are missing or inadequate. Therefore, there is a need to improve information security models by including vital elements of information security. In this paper, we introduce a holistic view of information security based on a Swedish model combined with a literature survey. Furthermore we suggest extending this model using concepts based on semiotic theory and adopting the view of an information system as constituted of the technical, formal and informal (TFI) parts. The aim is to increase the understanding of the information security domain in order to develop a well-founded theoretical framework, which can be used both in the analysis and the design phase of interoperable systems. Finally, we describe and apply the Information Security (InfoSec) model to the results of three different case studies in the healthcare domain. Limits of the model will be highlighted and an extension will be proposed.
引用
收藏
页码:73 / +
页数:4
相关论文
共 50 条
  • [1] Improving Scrum Model Using Inclusion Information Security Practices through Information Security Master and Backlog Framework
    Hussain, Shafiq
    Draz, Umar
    Yasin, Sana
    Tahseen, Aisha
    Ahmad, Zunaim
    Mahmood, Haroon
    Faheem, Zaid Bin
    Sani, Shahid
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2020, 20 (06): : 99 - 111
  • [2] A Stochastic Model for Improving Information Security in Supply Chain Systems
    Al Kattan, Ibrahim
    Al Nunu, Ahmed
    Saleh, Kassem
    INTERNATIONAL JOURNAL OF INFORMATION SYSTEMS AND SUPPLY CHAIN MANAGEMENT, 2009, 2 (03) : 35 - 49
  • [3] Improving security in Information Technology using cryptographic hardware modules
    Sanchez-Reillo, R
    Sanchez-Avila, C
    Lopez-Ongil, C
    Entrena-Arrontes, L
    36TH ANNUAL 2002 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2002, : 120 - 123
  • [4] Information security risk analysis model using information entropy
    Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
    不详
    Beijing Youdian Daxue Xuebao, 2008, 2 (50-53):
  • [5] Improving information Extraction using knowledge model
    Chen, Yue
    PACLIC 24 - Proceedings of the 24th Pacific Asia Conference on Language, Information and Computation, 2010, : 613 - 620
  • [6] Improving Information Extraction using Knowledge Model
    Chen, Yue
    PROCEEDINGS OF THE 24TH PACIFIC ASIA CONFERENCE ON LANGUAGE, INFORMATION AND COMPUTATION, 2010, : 613 - 620
  • [7] Improving the privacy and security of electronic health information
    Clayton, PD
    ACADEMIC MEDICINE, 1997, 72 (06) : 522 - 523
  • [8] Quantum Cryptography: A way of Improving Security of Information
    Panhwar, Muhammad Aamir
    Khuhro, Sijjad Ali
    Mazhar, Tehseen
    Deng ZhongLiang
    Qadir, Nabeel
    INTERNATIONAL JOURNAL OF MATHEMATICS AND COMPUTER SCIENCE, 2021, 16 (01): : 9 - 21
  • [9] Improving sensor network security with information quality
    Qiu, Q
    Li, TY
    Biswas, J
    SECURITY AND PRIVACY IN AD-HOC AND SENSOR NETWORKS, 2005, 3813 : 68 - 79
  • [10] Using the Capital Asset Pricing Model in Information Security Investments
    Mosoiu, Ovidiu
    Cioaca, Catalin
    Balaceanu, Ion
    ELEARNING CHALLENGES AND NEW HORIZONS, VOL 4, 2018, : 39 - 46