2015
DOI: 10.1007/s10257-015-0276-5
|View full text |Cite
|
Sign up to set email alerts
|

Components of a multi-perspective modeling method for designing and managing IT security systems

Abstract: Information technology (IT) security design and management are a major concern and substantial challenge for IT management. Today's highly complex business and technological environments and the need to effectively communicate and justify IT security requirements and controls demand methodical support. The modeling method presented in this paper addresses this demand. The method is based on the assumption that enriched enterprise models integrating technological, business, organizational and strategic aspects … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
3
3

Relationship

1
9

Authors

Journals

citations
Cited by 21 publications
(7 citation statements)
references
References 37 publications
(42 reference statements)
0
6
0
Order By: Relevance
“…Goldstein and Frank pointed out that the rapid development of information network has changed the way of information transmission from hierarchical to horizontal, not only leading units can make decisions but also executive units can make quick decisions based on real-time conditions. These all bring new challenges to the management decision-making of modern enterprises [17]. Douglas et al believe that the architecture of business intelligence refers to the main framework for providing business intelligence system applications by identifying and understanding the flow process of data in the system and the application process of data in the enterprise [18].…”
Section: Related Workmentioning
confidence: 99%
“…Goldstein and Frank pointed out that the rapid development of information network has changed the way of information transmission from hierarchical to horizontal, not only leading units can make decisions but also executive units can make quick decisions based on real-time conditions. These all bring new challenges to the management decision-making of modern enterprises [17]. Douglas et al believe that the architecture of business intelligence refers to the main framework for providing business intelligence system applications by identifying and understanding the flow process of data in the system and the application process of data in the enterprise [18].…”
Section: Related Workmentioning
confidence: 99%
“…This has been known for some time. Various methods for risk analysis and damage control are based on conceptual models or on enterprise models in particular (Neiger et al 2006;Strecker et al 2011;Goldstein and Frank 2016). Since none of these methods accounts for the specific threats generated by a global pandemic, it might appear obvious to extend them with further concepts.…”
Section: How Can Business Informatics Contribute To Disastermentioning
confidence: 99%
“…P. Michelberger et al (Michelberger, & Labodi, 2012) proposes a holistic and process centered enterprise security model; however, there are no suitable tools to model all components of the framework. Different aspects of IT security at different levels of abstraction, including the entire lifecycle of IT security systems (Goldstein, & Frank, 2016) have to be considered for deep modeling of security in enterprise analysis.…”
Section: Analysis Of Information Security Evaluation Toolsmentioning
confidence: 99%