Abstract
Information systems have evolved rapidly in the past decades and increasingly take a central role in society. Today, some information systems have become such integral parts of society that their disruption or unintended consequences can have detrimental effects on vital societal functions; that is, they have become critical information infrastructures. This chapter clarifies the concept of ‘critical information infrastructures’ and distinguishes them from conventional critical infrastructures. After introducing foundational concepts and the evolution of information infrastructures, the chapter discusses salient characteristics, important challenges, main functions, and core tasks for operating critical information infrastructures. Critical information infrastructures, in spite of their vital role in society, often go unnoticed. In this chapter, the reader learns the basics of recognizing, understanding, and operating critical information infrastructures.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Antonakakis M, April T, Bailey M, Bernhard M, Bursztein E, Cochran J, Durumeric Z, Halderman JA, Invernizzi L, Kallitsis M (2017) Understanding the Mirai botnet. Paper presented at the 26th USENIX security symposium, Vancouver, BC, 16–18 Aug 2017
AT&T (2010) AT&T completes 100-Gigabit Ethernet field trial. PR Newswire, 9 Mar 2010
Ayres RU (1990) Technological transformations and long waves. Part I. Technol Forecast Soc Chang 37(1):1–37
Bhagat S, Burke M, Diuk C, Filiz IO, Edunov S (2016) Three and a half degrees of separation. https://joytothehome.com/wp-content/uploads/2015/11/Three-and-a-half-degrees-of-separation-_-Blog-_-Research-at-Facebook.pdf. Accessed 15 Sept 2019
Bondi AB (2000) Characteristics of scalability and their impact on performance. Paper presented at the 2nd international workshop on software and performance, Ottawa, ON, 17–20 Sept 2000
Bostrom RP, Heinen JS (1977) MIS problems and failures: a socio-technical perspective. Part I: The causes. MIS Q 1(3):17–32
Bye BL (2011) Volcanic eruptions: science and risk management. https://www.science20.com/planetbye/volcanic_eruptions_science_and_risk_management-79456. Accessed 15 Sept 2019
Cadwalladr C, Graham-Harrison E (2018) Revealed: 50 Million facebook profiles harvested for Cambridge analytica in major data breach. The Guardian, 17 Mar 2018
Caplan R, Donovan J, Hanson L, Matthews J (2018) Algorithmic accountability: a primer. https://datasociety.net/wp-content/uploads/2018/04/Data_Society_Algorithmic_Accountability_Primer_FINAL-4.pdf
Carroll AB (1979) A three-dimensional conceptual model of corporate performance. Acad Manag Rev 4(4):497–505
Carroll EC (2017) Making news: balancing newsworthiness and privacy in the age of algorithms. Georgetown Law J 106:69–114
Clarke R (1999) Internet privacy concerns confirm the case for intervention. Commun ACM 42(2):60–67
Cropanzano R, Byrne ZS, Bobocel DR, Rupp DE (2001) Moral virtues, fairness heuristics, social entities, and other denizens of organizational justice. J Vocat Behav 58(2):164–209
Dehling T, Sunyaev A (2014) Secure provision of patient-centered health information technology services in public networks: leveraging security and privacy features provided by the German nationwide health information technology infrastructure. Electron Mark 24(2):89–99
Dehling T, Gao F, Schneider S, Sunyaev A (2015) Exploring the far side of mobile health: information security and privacy of mobile health applications on iOS and android. JMIR mHealth and uHealth 3(1):e8
Egan MJ (2007) Anticipating future vulnerability: defining characteristics of increasingly critical infrastructure-like systems. J Conting Crisis Manag 15(1):4–17
Fekete A (2011) Common criteria for the assessment of critical infrastructures. Int J Disaster Risk Sci 2(1):15–24
Gallagher R, Moltke H (2018) The NSA’s hidden spy hubs in eight U.S. cities. https://theintercept.com/2018/06/25/att-internet-nsa-spy-hubs/. Accessed 15 Sept 2019
Holwerda T (2011) DuckDuckGo: the privacy-centric alternative to Google. https://www.osnews.com/story/24867/duckduckgo-the-privacy-centric-alternative-to-google/. Accessed 15 Sept 2019
Juiz C, Toomey M (2015) To govern IT, or not to govern IT? Commun ACM 58(2):58–64
Kannengießer N, Lins S, Dehling T, Sunyaev A (2019) What does not fit can be made to fit! Trade-offs in distributed ledger technology designs. Paper presented at the 52nd Hawaii international conference on system sciences, Maui, HI, 8–11 Jan 2019
Landau S (2015) Control use of data to protect privacy. Science 347(6221):504–506
Laudon KC (1996) Markets and privacy. Commun ACM 39(9):92–104
Martin K, Nissenbaum H (2016) Measuring privacy: an empirical test using context to expose confounding variables. Columbia Sci Technol Law Rev 18:176–218
Meulen Rvd (2017) Gartner says 8.4 billion connected “things” will be in use in 2017, up 31 percent from 2016. https://www.gartner.com/en/newsroom/press-releases/2017-02-07-gartner-says-8-billion-connected-things-will-be-in-use-in-2017-up-31-percent-from-2016. Accessed 15 Sept 2019
Nissenbaum H (1996) Accountability in a computerized society. Sci Eng Ethics 2(1):25–42
Nissenbaum H (2010) Privacy in context: technology, policy, and the integrity of social life. Stanford University Press, Stanford, CA
Oetzel MC, Spiekermann S (2014) A systematic methodology for privacy impact assessments: a design science approach. Eur J Inf Syst 23(2):126–150
Oliver C (1991) Strategic responses to institutional processes. Acad Manag Rev 16(1):145–179
Orlikowski WJ (2007) Sociomaterial practices: exploring technology at work. Organ Stud 28(9):1435–1448
Orlikowski WJ, Scott SV (2008) Sociomateriality: challenging the separation of technology, work and organization. Acad Manag Ann 2(1):433–474
Rinaldi SM, Peerenboom JP, Kelly TK (2001) Identifying, understanding, and analyzing critical infrastructure interdependencies. IEEE Control Syst Mag 21(6):11–25
Solove DJ (2002) Conceptualizing privacy. California Law Rev 90(4):1087–1155
Sunyaev A, Huber MJ, Mauro C, Leimeister JM, Krcmar H (2008) Bewertung und Klassifikation von Bedrohungen im Umfeld der elektronischen Gesundheitskarte. Paper presented at the INFORMATIK 2008: Beherrschbare Systeme dank Informatik, Munich, 8–13 Sept 2008
Travers J, Milgram S (1977) An experimental study of the small world problem. In: Leinhardt S (ed) Social networks: a developing paradigm. Academic Press, New York, NY, pp 179–197
Trist E (1981) The evolution of socio-technical systems. In: Perspectives in organization design and behavior. Wiley, New York, NY, pp 32–47
Union CotE (2008) Council directive 2008/114/EC on the identification and designation of European critical infrastructures and the assessment of the need to improve their protection. Off J Eur Union L 345(75)
Warren SD, Brandeis LD (1890) The right to privacy. Harvard Law Rev 4(5):193–220
Westin AF (1968) Privacy and freedom. Washington Lee Law Rev 25(1):166
Further Reading
Clemons EK (2019) New patterns of power and profit: a strategist’s guide to competitive advantage in the age of digital transformation, 1st edn. Palgrave Macmillan, Cham
Dehling T, Sunyaev A (2014) Secure provision of patient-centered health information technology services in public networks: leveraging security and privacy features provided by the German nationwide health information technology infrastructure. Electron Mark 24(2):89–99
Rinaldi SM, Peerenboom JP, Kelly TK (2001) Identifying, understanding, and analyzing critical infrastructure interdependencies. IEEE Control Syst Mag 21(6):11–25
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Sunyaev, A. (2020). Critical Information Infrastructures. In: Internet Computing. Springer, Cham. https://doi.org/10.1007/978-3-030-34957-8_11
Download citation
DOI: https://doi.org/10.1007/978-3-030-34957-8_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-34956-1
Online ISBN: 978-3-030-34957-8
eBook Packages: Computer ScienceComputer Science (R0)