Defining Information Security
- PMID: 29143269
- PMCID: PMC6450831
- DOI: 10.1007/s11948-017-9992-1
Defining Information Security
Abstract
This article proposes a new definition of information security, the 'Appropriate Access' definition. Apart from providing the basic criteria for a definition-correct demarcation and meaning concerning the state of security-it also aims at being a definition suitable for any information security perspective. As such, it bridges the conceptual divide between so-called 'soft issues' of information security (those including, e.g., humans, organizations, culture, ethics, policies, and law) and more technical issues. Because of this it is also suitable for various analytical purposes, such as analysing possible security breaches, or for studying conflicting attitudes on security in an organization. The need for a new definition is demonstrated by pointing to a number of problems for the standard definition type of information security-the so-called CIA definition. Besides being too broad as well as too narrow, it cannot properly handle the soft issues of information security, nor recognize the contextual and normative nature of security.
Keywords: Appropriate access; CIA definition; Defining information security; Ethical aspects on information security; Human aspects on information security; Information security.
References
-
- Adriaans, P. (2013). Information. In E. N. Zalta (Ed.), The Stanford encyclopedia of philosophy (Fall 2013 ed.). http://plato.stanford.edu/archives/fall2013/entries/information/.
-
- Bishop M. Introduction to computer security. Boston: Addison-Wesley; 2005.
-
- Chapman MT. Wireless security mayhem: Restraining the insanity of convenience. In: Tipton HF, Krause M, editors. Information security management handbook. 5. Boca Raton: Auerbach; 2004.
-
- Dhillon G. Violations of safegaurds by trusted personnel and understanding related information security concerns. Computers & Security. 2001;20:165–172. doi: 10.1016/S0167-4048(01)00209-7. - DOI
-
- Dhillon G. Challenges in managing information security in the new millennium. In: Dhillon G, editor. Information security management: Global challenges in the new millennium. Hershey, PA: IGI Global; 2001. pp. 1–9.
Publication types
MeSH terms
LinkOut - more resources
Full Text Sources
Other Literature Sources
Research Materials