Skip to main content
Top
Published in:
Cover of the book

2019 | OriginalPaper | Chapter

Information Security: Going Digital (Invited Lecture)

Author : Richard Baskerville

Published in: ICT Education

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Because ‘going digital’ regards using digital technologies to fundamentally change the way things get done, information security is necessarily engaged in going digital. Society and science are going digital. For the sciences, this digitalization process invokes an emerging model of the science of design that incorporates the assembly of information systems from a wide variety of platform ecosystems. According to principles of bounded rationality and bounded creativity, this mode of design requires more creativity to develop needed functionality from a finite set of available platforms. Going digital requires more creativity in designers of all types of information systems. Furthermore, the designers’ goals are changing. The traditional model of information systems is representational: the data in the system represents (reflects) reality. Newer information systems, equipped with 3D printing and robotics actually create reality. Reality represents (reflects) the data in the system. This invited paper explores the example of information security. Designers of security for information systems not only must be more creative, they must design for more goals. The security task is no longer just protecting the digital system, the security task is protecting the products of the digital system. These innovations have particular implications for information systems curricula at university, too.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Anderson, C., Baskerville, R., Kaul, M.: Information security control theory: achieving a sustainable reconciliation between sharing and protecting the privacy of information. J. Manag. Inf. Syst. 34, 1082–1112 (2017)CrossRef Anderson, C., Baskerville, R., Kaul, M.: Information security control theory: achieving a sustainable reconciliation between sharing and protecting the privacy of information. J. Manag. Inf. Syst. 34, 1082–1112 (2017)CrossRef
2.
go back to reference Ciborra, C.U.: From thinking to tinkering: the grassroots of strategic information systems. Inf. Soc. 8, 297–309 (1992)CrossRef Ciborra, C.U.: From thinking to tinkering: the grassroots of strategic information systems. Inf. Soc. 8, 297–309 (1992)CrossRef
3.
go back to reference Dörner, K., Edelman, D.: What ‘digital’ really means. McKinsey (2015) Dörner, K., Edelman, D.: What ‘digital’ really means. McKinsey (2015)
4.
go back to reference Finke, R.A., Ward, T.B., Smith, S.M.: Creative Cognition: Theory, Research, and Applications. MIT Press, Cambridge (1992) Finke, R.A., Ward, T.B., Smith, S.M.: Creative Cognition: Theory, Research, and Applications. MIT Press, Cambridge (1992)
5.
go back to reference Griffy-Brown, C., Lazarikos, D., Chun, M.: How do you secure an environment without a perimeter? Using emerging technology processes to support information security efforts in an agile data center. J. Appl. Bus. Econ. 18, 90–102 (2016) Griffy-Brown, C., Lazarikos, D., Chun, M.: How do you secure an environment without a perimeter? Using emerging technology processes to support information security efforts in an agile data center. J. Appl. Bus. Econ. 18, 90–102 (2016)
6.
go back to reference Hoegl, M., Gibbert, M., Mazursky, D.: Financial constraints in innovation projects: when is less more? Res. Policy 37, 1382–1391 (2008)CrossRef Hoegl, M., Gibbert, M., Mazursky, D.: Financial constraints in innovation projects: when is less more? Res. Policy 37, 1382–1391 (2008)CrossRef
8.
go back to reference Pfleeger, S.L., Cunningham, R.K.: Why measuring security is hard. Secur. Priv. 8, 46–54 (2010)CrossRef Pfleeger, S.L., Cunningham, R.K.: Why measuring security is hard. Secur. Priv. 8, 46–54 (2010)CrossRef
9.
go back to reference Simon, H.A.: The Sciences of the Artificial. MIT Press, Cambridge (1996) Simon, H.A.: The Sciences of the Artificial. MIT Press, Cambridge (1996)
10.
go back to reference Simon, H.A.: Theories of bounded rationality. In: Decision and Organization: A Volume in Honor of Jacob Marschak, pp. 161–176. North-Holland (1972) Simon, H.A.: Theories of bounded rationality. In: Decision and Organization: A Volume in Honor of Jacob Marschak, pp. 161–176. North-Holland (1972)
11.
go back to reference Vodanovich, S., Sundaram, D., Myers, M.D.: Digital natives and ubiquitous information systems. Inf. Syst. Res. 21, 711–723 (2010)CrossRef Vodanovich, S., Sundaram, D., Myers, M.D.: Digital natives and ubiquitous information systems. Inf. Syst. Res. 21, 711–723 (2010)CrossRef
13.
go back to reference Yoo, Y.: Computing in everyday life: a call for research on experiential computing. MIS Q. 34, 213–231 (2010)CrossRef Yoo, Y.: Computing in everyday life: a call for research on experiential computing. MIS Q. 34, 213–231 (2010)CrossRef
Metadata
Title
Information Security: Going Digital (Invited Lecture)
Author
Richard Baskerville
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-05813-5_1

Premium Partner