Skip to main content

Critical Information Infrastructures

  • Chapter
  • First Online:
Internet Computing

Abstract

Information systems have evolved rapidly in the past decades and increasingly take a central role in society. Today, some information systems have become such integral parts of society that their disruption or unintended consequences can have detrimental effects on vital societal functions; that is, they have become critical information infrastructures. This chapter clarifies the concept of ‘critical information infrastructures’ and distinguishes them from conventional critical infrastructures. After introducing foundational concepts and the evolution of information infrastructures, the chapter discusses salient characteristics, important challenges, main functions, and core tasks for operating critical information infrastructures. Critical information infrastructures, in spite of their vital role in society, often go unnoticed. In this chapter, the reader learns the basics of recognizing, understanding, and operating critical information infrastructures.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 64.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 84.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Antonakakis M, April T, Bailey M, Bernhard M, Bursztein E, Cochran J, Durumeric Z, Halderman JA, Invernizzi L, Kallitsis M (2017) Understanding the Mirai botnet. Paper presented at the 26th USENIX security symposium, Vancouver, BC, 16–18 Aug 2017

    Google Scholar 

  • AT&T (2010) AT&T completes 100-Gigabit Ethernet field trial. PR Newswire, 9 Mar 2010

    Google Scholar 

  • Ayres RU (1990) Technological transformations and long waves. Part I. Technol Forecast Soc Chang 37(1):1–37

    Article  Google Scholar 

  • Bhagat S, Burke M, Diuk C, Filiz IO, Edunov S (2016) Three and a half degrees of separation. https://joytothehome.com/wp-content/uploads/2015/11/Three-and-a-half-degrees-of-separation-_-Blog-_-Research-at-Facebook.pdf. Accessed 15 Sept 2019

  • Bondi AB (2000) Characteristics of scalability and their impact on performance. Paper presented at the 2nd international workshop on software and performance, Ottawa, ON, 17–20 Sept 2000

    Google Scholar 

  • Bostrom RP, Heinen JS (1977) MIS problems and failures: a socio-technical perspective. Part I: The causes. MIS Q 1(3):17–32

    Article  Google Scholar 

  • Bye BL (2011) Volcanic eruptions: science and risk management. https://www.science20.com/planetbye/volcanic_eruptions_science_and_risk_management-79456. Accessed 15 Sept 2019

  • Cadwalladr C, Graham-Harrison E (2018) Revealed: 50 Million facebook profiles harvested for Cambridge analytica in major data breach. The Guardian, 17 Mar 2018

    Google Scholar 

  • Caplan R, Donovan J, Hanson L, Matthews J (2018) Algorithmic accountability: a primer. https://datasociety.net/wp-content/uploads/2018/04/Data_Society_Algorithmic_Accountability_Primer_FINAL-4.pdf

  • Carroll AB (1979) A three-dimensional conceptual model of corporate performance. Acad Manag Rev 4(4):497–505

    Article  Google Scholar 

  • Carroll EC (2017) Making news: balancing newsworthiness and privacy in the age of algorithms. Georgetown Law J 106:69–114

    Google Scholar 

  • Clarke R (1999) Internet privacy concerns confirm the case for intervention. Commun ACM 42(2):60–67

    Article  Google Scholar 

  • Cropanzano R, Byrne ZS, Bobocel DR, Rupp DE (2001) Moral virtues, fairness heuristics, social entities, and other denizens of organizational justice. J Vocat Behav 58(2):164–209

    Article  Google Scholar 

  • Dehling T, Sunyaev A (2014) Secure provision of patient-centered health information technology services in public networks: leveraging security and privacy features provided by the German nationwide health information technology infrastructure. Electron Mark 24(2):89–99

    Article  Google Scholar 

  • Dehling T, Gao F, Schneider S, Sunyaev A (2015) Exploring the far side of mobile health: information security and privacy of mobile health applications on iOS and android. JMIR mHealth and uHealth 3(1):e8

    Article  Google Scholar 

  • Egan MJ (2007) Anticipating future vulnerability: defining characteristics of increasingly critical infrastructure-like systems. J Conting Crisis Manag 15(1):4–17

    Article  MathSciNet  Google Scholar 

  • Fekete A (2011) Common criteria for the assessment of critical infrastructures. Int J Disaster Risk Sci 2(1):15–24

    Article  Google Scholar 

  • Gallagher R, Moltke H (2018) The NSA’s hidden spy hubs in eight U.S. cities. https://theintercept.com/2018/06/25/att-internet-nsa-spy-hubs/. Accessed 15 Sept 2019

  • Holwerda T (2011) DuckDuckGo: the privacy-centric alternative to Google. https://www.osnews.com/story/24867/duckduckgo-the-privacy-centric-alternative-to-google/. Accessed 15 Sept 2019

  • Juiz C, Toomey M (2015) To govern IT, or not to govern IT? Commun ACM 58(2):58–64

    Article  Google Scholar 

  • Kannengießer N, Lins S, Dehling T, Sunyaev A (2019) What does not fit can be made to fit! Trade-offs in distributed ledger technology designs. Paper presented at the 52nd Hawaii international conference on system sciences, Maui, HI, 8–11 Jan 2019

    Google Scholar 

  • Landau S (2015) Control use of data to protect privacy. Science 347(6221):504–506

    Article  Google Scholar 

  • Laudon KC (1996) Markets and privacy. Commun ACM 39(9):92–104

    Article  Google Scholar 

  • Martin K, Nissenbaum H (2016) Measuring privacy: an empirical test using context to expose confounding variables. Columbia Sci Technol Law Rev 18:176–218

    Google Scholar 

  • Meulen Rvd (2017) Gartner says 8.4 billion connected “things” will be in use in 2017, up 31 percent from 2016. https://www.gartner.com/en/newsroom/press-releases/2017-02-07-gartner-says-8-billion-connected-things-will-be-in-use-in-2017-up-31-percent-from-2016. Accessed 15 Sept 2019

  • Nissenbaum H (1996) Accountability in a computerized society. Sci Eng Ethics 2(1):25–42

    Article  Google Scholar 

  • Nissenbaum H (2010) Privacy in context: technology, policy, and the integrity of social life. Stanford University Press, Stanford, CA

    Google Scholar 

  • Oetzel MC, Spiekermann S (2014) A systematic methodology for privacy impact assessments: a design science approach. Eur J Inf Syst 23(2):126–150

    Article  Google Scholar 

  • Oliver C (1991) Strategic responses to institutional processes. Acad Manag Rev 16(1):145–179

    Article  Google Scholar 

  • Orlikowski WJ (2007) Sociomaterial practices: exploring technology at work. Organ Stud 28(9):1435–1448

    Article  Google Scholar 

  • Orlikowski WJ, Scott SV (2008) Sociomateriality: challenging the separation of technology, work and organization. Acad Manag Ann 2(1):433–474

    Article  Google Scholar 

  • Rinaldi SM, Peerenboom JP, Kelly TK (2001) Identifying, understanding, and analyzing critical infrastructure interdependencies. IEEE Control Syst Mag 21(6):11–25

    Article  Google Scholar 

  • Solove DJ (2002) Conceptualizing privacy. California Law Rev 90(4):1087–1155

    Article  Google Scholar 

  • Sunyaev A, Huber MJ, Mauro C, Leimeister JM, Krcmar H (2008) Bewertung und Klassifikation von Bedrohungen im Umfeld der elektronischen Gesundheitskarte. Paper presented at the INFORMATIK 2008: Beherrschbare Systeme dank Informatik, Munich, 8–13 Sept 2008

    Google Scholar 

  • Travers J, Milgram S (1977) An experimental study of the small world problem. In: Leinhardt S (ed) Social networks: a developing paradigm. Academic Press, New York, NY, pp 179–197

    Chapter  Google Scholar 

  • Trist E (1981) The evolution of socio-technical systems. In: Perspectives in organization design and behavior. Wiley, New York, NY, pp 32–47

    Google Scholar 

  • Union CotE (2008) Council directive 2008/114/EC on the identification and designation of European critical infrastructures and the assessment of the need to improve their protection. Off J Eur Union L 345(75)

    Google Scholar 

  • Warren SD, Brandeis LD (1890) The right to privacy. Harvard Law Rev 4(5):193–220

    Article  Google Scholar 

  • Westin AF (1968) Privacy and freedom. Washington Lee Law Rev 25(1):166

    Google Scholar 

Further Reading

  • Clemons EK (2019) New patterns of power and profit: a strategist’s guide to competitive advantage in the age of digital transformation, 1st edn. Palgrave Macmillan, Cham

    Book  Google Scholar 

  • Dehling T, Sunyaev A (2014) Secure provision of patient-centered health information technology services in public networks: leveraging security and privacy features provided by the German nationwide health information technology infrastructure. Electron Mark 24(2):89–99

    Article  Google Scholar 

  • Rinaldi SM, Peerenboom JP, Kelly TK (2001) Identifying, understanding, and analyzing critical infrastructure interdependencies. IEEE Control Syst Mag 21(6):11–25

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Sunyaev, A. (2020). Critical Information Infrastructures. In: Internet Computing. Springer, Cham. https://doi.org/10.1007/978-3-030-34957-8_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-34957-8_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-34956-1

  • Online ISBN: 978-3-030-34957-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics