Improving the information security model by using TH

被引:0
|
作者
Ahlfeldt, Rose-Mharie [1 ]
Spagnoletti, Paolo [2 ]
Sindre, Guttorm [3 ]
机构
[1] Univ Skovde, Box 408, S-54228 Skovde, Sweden
[2] Luiss Guido Carli Univ, CeRSI, Rome, Italy
[3] NTNU, Trondheim, Norway
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the context of information systems and information technology, information security is a concept that is becoming widely used. The European Network of Excellence INTEROP classifies information security as a nonfunctional aspect of interoperability and as such it is an integral part of the design process for interoperable systems. In the last decade, academics and practitioners have shown their interest in information security, for example by developing security models for evaluating products and setting up security specifications in order to safeguard the confidentiality, integrity, availability and accountability of data. Earlier research has shown that measures to achieve information security in the administrative or organisational level are missing or inadequate. Therefore, there is a need to improve information security models by including vital elements of information security. In this paper, we introduce a holistic view of information security based on a Swedish model combined with a literature survey. Furthermore we suggest extending this model using concepts based on semiotic theory and adopting the view of an information system as constituted of the technical, formal and informal (TFI) parts. The aim is to increase the understanding of the information security domain in order to develop a well-founded theoretical framework, which can be used both in the analysis and the design phase of interoperable systems. Finally, we describe and apply the Information Security (InfoSec) model to the results of three different case studies in the healthcare domain. Limits of the model will be highlighted and an extension will be proposed.
引用
收藏
页码:73 / +
页数:4
相关论文
共 50 条
  • [21] Information security, 4TH wave
    National School of Computer Science and Systems Analysis, Rabat, Morocco
    不详
    不详
    J. Theor. Appl. Inf. Technol., 1817, 1 (1-7):
  • [22] Preliminary Diagnosis Model for a New IT Service: Improving the Information Security of u-Services with Zigbee
    Lee, Ik-Seob
    Hong, Ki-Hyang
    Lee, Gang-Shin
    Lee, Jae-Il
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 23, 2007, 23 : 155 - 158
  • [23] Information security risk analysis model using fuzzy decision theory
    Henriques de Gusmao, Ana Paula
    Camara e Silva, Lucio
    Silva, Maisa Mendonca
    Poleto, Thiago
    Cabral Seixas Costa, Ana Paula
    INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2016, 36 (01) : 25 - 34
  • [24] Holistic framework for evaluating and improving information security culture
    Arbanas, Krunoslav
    Spremic, Mario
    Zajdela Hrustek, Nikolina
    ASLIB JOURNAL OF INFORMATION MANAGEMENT, 2021, 73 (05) : 699 - 719
  • [25] Enhancing security and improving interoperability in healthcare information systems
    Gritzalis, DA
    MEDICAL INFORMATICS, 1998, 23 (04): : 309 - 323
  • [26] Improving Usability of Information Flow Security in Java']Java
    Smith, Scott F.
    Thober, Mark
    PLAS'07: PROCEEDINGS OF THE 2007 ACM SIGPLAN WORKSHOP ON PROGRAMMING LANGUAGES AND ANALYSIS FOR SECURITY, 2007, : 11 - 20
  • [27] Improving the Automation of Security Information Management: A Collaborative Approach
    Aguirre, Idoia
    Alonso, Sergio
    IEEE SECURITY & PRIVACY, 2012, 10 (01) : 55 - 59
  • [28] Improving Internet Security Through Mandatory Information Disclosure
    Tang, Qian
    Whinston, Andrew B.
    2015 48TH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2015, : 4813 - 4823
  • [29] Security Model to Ensure Copyright of Medical Information Using Digital Watermarks
    Okawa, Akiko
    Umeda, Tokuo
    Gomi, Tsutomu
    Asaba, Kaori
    Takahata, Masako
    INTEGRATING INFORMATION TECHNOLOGY AND MANAGEMENT FOR QUALITY OF CARE, 2014, 202 : 312 - 312
  • [30] Information security model using decision tree for Jordanian public sector
    Arabeyyat, Omar Suleiman
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2018, 10 (03) : 228 - 241