Skip to main content
Top

2014 | OriginalPaper | Chapter

4. Model of Multilevel Information Splitting and Management in an Organization

Authors : Marek R. Ogiela, Urszula Ogiela

Published in: Secure Information Management Using Linguistic Threshold Approach

Publisher: Springer London

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Information is split within commercial organizations regardless of its type, the method of its processing or the purpose for which the organization collects it. The significance of information splitting may depend on the method of its splitting, the purpose of splitting it and the meaning of this information. The significance of information sharing, on the other hand, may depend on its strategic importance and the meaning it contains for the specific organization. If information is important and of great materiality for the organization or for e.g. external organizations, then it makes sense to attempt sharing this information to protect it and secure it from disclosure to unauthorized persons (or organizations). When defining the type of information to undergo the splitting or sharing process, we should consider its ‘character’ determined by its confidentiality, significance and importance, because only important information determines the method of its splitting and the sense of doing so.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Ogiela, M. R., & Ogiela, U. (2012). Linguistic protocols for secure information management and sharing. Computers & Mathematics with Applications, 63(2), 564–572.MathSciNetCrossRef Ogiela, M. R., & Ogiela, U. (2012). Linguistic protocols for secure information management and sharing. Computers & Mathematics with Applications, 63(2), 564–572.MathSciNetCrossRef
2.
go back to reference Reynolds, G. (2009). Information technology for managers. Boston: Course Technology. Reynolds, G. (2009). Information technology for managers. Boston: Course Technology.
3.
go back to reference Schermerhorn, J. R. (2012). Management. Hoboken: Wiley. Schermerhorn, J. R. (2012). Management. Hoboken: Wiley.
4.
go back to reference Ogiela, M. R., & Ogiela, U. (2010). The use of mathematical linguistic methods in creating secret sharing threshold algorithms. Computers & Mathematics with Applications, 60(2), 267–271.MathSciNetMATHCrossRef Ogiela, M. R., & Ogiela, U. (2010). The use of mathematical linguistic methods in creating secret sharing threshold algorithms. Computers & Mathematics with Applications, 60(2), 267–271.MathSciNetMATHCrossRef
5.
go back to reference Haag, S., & Cummings, M. (2012). Management information systems for the information age. Irwin: McGraw-Hill. Haag, S., & Cummings, M. (2012). Management information systems for the information age. Irwin: McGraw-Hill.
6.
go back to reference Li, H., & Singhal, M. (2007). Trust management in distributed systems. Computer, 40(2), 45–53.CrossRef Li, H., & Singhal, M. (2007). Trust management in distributed systems. Computer, 40(2), 45–53.CrossRef
7.
go back to reference Krcmar, H. (2006). Information management. Springer. Krcmar, H. (2006). Information management. Springer.
8.
go back to reference Mackenzie, O. J. (Ed.). (2006). Information science and knowledge management. Berlin: Springer. Mackenzie, O. J. (Ed.). (2006). Information science and knowledge management. Berlin: Springer.
9.
go back to reference Ogiela, L. (2009). UBIAS systems for cognitive interpretation and analysis of medical images. Opto-Electronics Review, 17(2), 166–179.CrossRef Ogiela, L. (2009). UBIAS systems for cognitive interpretation and analysis of medical images. Opto-Electronics Review, 17(2), 166–179.CrossRef
10.
go back to reference Ogiela, L., & Ogiela, M. R. (2009). Cognitive techniques in visual data interpretation (Studies in computational intelligence, Vol. 228). Berlin/Heidelberg: Springer.CrossRef Ogiela, L., & Ogiela, M. R. (2009). Cognitive techniques in visual data interpretation (Studies in computational intelligence, Vol. 228). Berlin/Heidelberg: Springer.CrossRef
11.
go back to reference Ogiela, L., & Ogiela, M. R. (2012). Advances in cognitive information systems (Cognitive systems monographs, Vol. 17). Berlin/Heidelberg: Springer.MATHCrossRef Ogiela, L., & Ogiela, M. R. (2012). Advances in cognitive information systems (Cognitive systems monographs, Vol. 17). Berlin/Heidelberg: Springer.MATHCrossRef
12.
go back to reference Ogiela, M. R., & Ogiela, U. (2012). DNA-like linguistic secret sharing for strategic information systems. International Journal of Information Management, 32, 175–181.CrossRef Ogiela, M. R., & Ogiela, U. (2012). DNA-like linguistic secret sharing for strategic information systems. International Journal of Information Management, 32, 175–181.CrossRef
13.
go back to reference Ward, J., Griffiths, P., & Whitemore, P. (1992). Strategic planning for information systems. Chichester: Wiley. Ward, J., Griffiths, P., & Whitemore, P. (1992). Strategic planning for information systems. Chichester: Wiley.
14.
go back to reference Whitman, M. E., & Mattord, H. J. (2010). Management of information security. Boston: Course Technology. Whitman, M. E., & Mattord, H. J. (2010). Management of information security. Boston: Course Technology.
15.
go back to reference Ladley, J. (2010). Making enterprise information management (EIM) work for business: A guide to understanding information as an asset. Burlington: Morgan Kaufman. Ladley, J. (2010). Making enterprise information management (EIM) work for business: A guide to understanding information as an asset. Burlington: Morgan Kaufman.
16.
go back to reference Cellary, W. (2007). Globalization from the information and communication perspective. Lecture Notes in Computer Science 4882:283–292 Cellary, W. (2007). Globalization from the information and communication perspective. Lecture Notes in Computer Science 4882:283–292
17.
go back to reference Cellary, W., Wiza, W., & Walczak, K. (2004). Visualizing web search results in 3D. Computer, 37(5), 87–89.CrossRef Cellary, W., Wiza, W., & Walczak, K. (2004). Visualizing web search results in 3D. Computer, 37(5), 87–89.CrossRef
18.
go back to reference ElGamal, T. (1985). A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31, 469–472.MathSciNetMATHCrossRef ElGamal, T. (1985). A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31, 469–472.MathSciNetMATHCrossRef
19.
go back to reference Hang, N., & Zhao, W. (2007). Privacy-preserving data mining systems. Computer, 40(4), 52–58.CrossRef Hang, N., & Zhao, W. (2007). Privacy-preserving data mining systems. Computer, 40(4), 52–58.CrossRef
20.
go back to reference Menezes, A., van Oorschot, P., & Vanstone, S. (2001). Handbook of applied cryptography. Waterloo: CRC Press. Menezes, A., van Oorschot, P., & Vanstone, S. (2001). Handbook of applied cryptography. Waterloo: CRC Press.
21.
go back to reference O’Brien, J., & Marakas, G. (2010). Management information systems. Irwin: McGraw-Hill. O’Brien, J., & Marakas, G. (2010). Management information systems. Irwin: McGraw-Hill.
22.
go back to reference Ogiela, M. R., & Ogiela, U. (2008). Linguistic approach to cryptographic data sharing. In: FGCN 2008 – The 2nd International Conference on Future Generation Communication and Networking (Vol. 1, pp. 377–380), December 13–15, 2008, Hainan Island. Ogiela, M. R., & Ogiela, U. (2008). Linguistic approach to cryptographic data sharing. In: FGCN 2008 – The 2nd International Conference on Future Generation Communication and Networking (Vol. 1, pp. 377–380), December 13–15, 2008, Hainan Island.
23.
go back to reference Ogiela, M. R., & Ogiela, U. (2010). Grammar encoding in DNA-like secret sharing infrastructure. Lecture Notes in Computer Science, 6059, 175–182.CrossRef Ogiela, M. R., & Ogiela, U. (2010). Grammar encoding in DNA-like secret sharing infrastructure. Lecture Notes in Computer Science, 6059, 175–182.CrossRef
24.
go back to reference Okamoto, T. (1990). A fast signature scheme based on congruential polynomial operations. IEEE Transactions on Information Theory, 1, 47–53.CrossRef Okamoto, T. (1990). A fast signature scheme based on congruential polynomial operations. IEEE Transactions on Information Theory, 1, 47–53.CrossRef
25.
go back to reference Schneier, B. (1996). Applied cryptography: Protocols, algorithms, and source code in C. New York: Wiley.MATH Schneier, B. (1996). Applied cryptography: Protocols, algorithms, and source code in C. New York: Wiley.MATH
26.
go back to reference Seberry, J., & Pieprzyk, J. (1989). Cryptography: An introduction to computer security. Englewood Cliffs: Prentice-Hall.MATH Seberry, J., & Pieprzyk, J. (1989). Cryptography: An introduction to computer security. Englewood Cliffs: Prentice-Hall.MATH
27.
go back to reference Tipton, H. F. (2007). Information security management handbook. Boca Raton: Auerbach.MATH Tipton, H. F. (2007). Information security management handbook. Boca Raton: Auerbach.MATH
Metadata
Title
Model of Multilevel Information Splitting and Management in an Organization
Authors
Marek R. Ogiela
Urszula Ogiela
Copyright Year
2014
Publisher
Springer London
DOI
https://doi.org/10.1007/978-1-4471-5016-9_4

Premium Partner