Redefining Information Systems Security: Viable Information Systems

被引:0
作者
Karyda, M [1 ]
Kokolakis, S [1 ]
Kiountouzis, E [1 ]
机构
[1] Athens Univ Econ & Business, Dept Informat, GR-10434 Athens, Greece
来源
TRUSTED INFORMATION: THE NEW DECADE CHALLENGE | 2001年 / 65卷
关键词
Information Systems; Information Systems Security; cybernetics; Viable Information Systems;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Research on Information Security has been based on a well-established definition of the subject. Consequently, it has delivered a plethora of methods, techniques, mechanisms and tools to protect the so-called security attributes (i.e. availability, confidentiality and integrity) of information. However, modem Information Systems (IS) appear rather vulnerable and people show mistrust on their ability to deliver the services expected. This phenomenon leads us to the conclusion that information security does not necessarily equal IS security. In this paper, we argue that IS security, contrary to information security, remains a confusing term and a neglected research area. We attempt to clarify the meaning and aims of IS security and propose a framework for building secure information systems, or as we suggest them to be called, viable information systems.
引用
收藏
页码:453 / 467
页数:5
相关论文
共 22 条
[1]  
Ashby R., 1964, INTRO CYBERNETICS
[2]  
Baskerville R., 1991, European Journal of Information Systems, V1, P121, DOI 10.1057/ejis.1991.20
[3]  
BASKERVILLE R, 1997, P IFIP TCI11 13 INT
[4]  
Beer S., 1981, BRAIN FIRM
[5]  
Beer S., 1979, The heart of the enterprise
[6]  
BROCKLESBY J, 1996, LONG RANGE PLANNING, V29
[7]  
CHECKLAND P, 1998, INFORMATION SYSTEMS
[8]  
*CSI, 2000, ISS TRENSD 2000 CSI
[9]  
Davidow W.H., 1992, VIRTUAL CORPORATION
[10]  
ELLISON R, 1999, P 11 CAN INF TECHN S