Improving the information security model by using TH

被引:0
|
作者
Ahlfeldt, Rose-Mharie [1 ]
Spagnoletti, Paolo [2 ]
Sindre, Guttorm [3 ]
机构
[1] Univ Skovde, Box 408, S-54228 Skovde, Sweden
[2] Luiss Guido Carli Univ, CeRSI, Rome, Italy
[3] NTNU, Trondheim, Norway
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the context of information systems and information technology, information security is a concept that is becoming widely used. The European Network of Excellence INTEROP classifies information security as a nonfunctional aspect of interoperability and as such it is an integral part of the design process for interoperable systems. In the last decade, academics and practitioners have shown their interest in information security, for example by developing security models for evaluating products and setting up security specifications in order to safeguard the confidentiality, integrity, availability and accountability of data. Earlier research has shown that measures to achieve information security in the administrative or organisational level are missing or inadequate. Therefore, there is a need to improve information security models by including vital elements of information security. In this paper, we introduce a holistic view of information security based on a Swedish model combined with a literature survey. Furthermore we suggest extending this model using concepts based on semiotic theory and adopting the view of an information system as constituted of the technical, formal and informal (TFI) parts. The aim is to increase the understanding of the information security domain in order to develop a well-founded theoretical framework, which can be used both in the analysis and the design phase of interoperable systems. Finally, we describe and apply the Information Security (InfoSec) model to the results of three different case studies in the healthcare domain. Limits of the model will be highlighted and an extension will be proposed.
引用
收藏
页码:73 / +
页数:4
相关论文
共 50 条
  • [41] A new model for information security policies
    Lindup, KR
    COMPUTERS & SECURITY, 1995, 14 (08) : 691 - 695
  • [42] A model on workarounds and information security integrity
    Njenga, Kennedy
    Nyamandi, Ntsakisi F.
    Segooa, Mmatshuene A.
    SOUTH AFRICAN JOURNAL OF INFORMATION MANAGEMENT, 2024, 26 (01):
  • [43] A model for information security vulnerability awareness
    Mejias, Roberto J.
    Greer, Joshua J.
    Greer, Gabrila C.
    Shepherd, Morgan M.
    Reyes, Raul Y.
    COMPUTERS & SECURITY, 2025, 151
  • [44] A model of Anshin about the information security
    Nishioka, Dai
    Murayama, Yuko
    Saito, Yoshia
    PROCEEDINGS OF THE 46TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2013, : 305 - 314
  • [45] An active information security model research
    Zhuang, Y
    Liu, J
    Gu, JJ
    Wei, Q
    PROCEEDINGS OF THE 2004 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2004, : 282 - 286
  • [46] Present a Management Information System Deployment Model for Improving Food Security in Agricultural Sector of Khuzestan Province
    Zalaghi, Dariush
    Lashgarara, Farhad
    Omidi, Maryam
    INTERNATIONAL JOURNAL OF NONLINEAR ANALYSIS AND APPLICATIONS, 2020, 11 (02): : 115 - 125
  • [47] Information security model using data embedding technique for enhancing perceptibility and robustness
    Moon S.K.
    Raut R.D.
    International Journal of Electronic Security and Digital Forensics, 2019, 11 (01): : 70 - 95
  • [48] Security Defence Policy Selection Method Using the Incomplete Information Game Model
    ZHANG Hengwei
    YU Dingkun
    WANG Jindong
    HAN Jihong
    WANG Na
    中国通信, 2015, 12(S2) (S2) : 123 - 131
  • [49] Information security model using data embedding technique for enhancing perceptibility and robustness
    Moon, Sunil K.
    Raut, Rajeshree D.
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2019, 11 (01) : 70 - 95
  • [50] Management of Information Security Indicators under a Cognitive Security Model
    Andrade, Roberto
    Torres, Jenny
    Flores, Pamela
    2018 IEEE 8TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2018, : 478 - 483