Information Security: Going Digital (Invited Lecture)

  • Richard BaskervilleEmail author
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 963)


Because ‘going digital’ regards using digital technologies to fundamentally change the way things get done, information security is necessarily engaged in going digital. Society and science are going digital. For the sciences, this digitalization process invokes an emerging model of the science of design that incorporates the assembly of information systems from a wide variety of platform ecosystems. According to principles of bounded rationality and bounded creativity, this mode of design requires more creativity to develop needed functionality from a finite set of available platforms. Going digital requires more creativity in designers of all types of information systems. Furthermore, the designers’ goals are changing. The traditional model of information systems is representational: the data in the system represents (reflects) reality. Newer information systems, equipped with 3D printing and robotics actually create reality. Reality represents (reflects) the data in the system. This invited paper explores the example of information security. Designers of security for information systems not only must be more creative, they must design for more goals. The security task is no longer just protecting the digital system, the security task is protecting the products of the digital system. These innovations have particular implications for information systems curricula at university, too.


Digitalization Digital artifacts Information systems Information security Information privacy Education at university Invited keynote lecture 


  1. 1.
    Anderson, C., Baskerville, R., Kaul, M.: Information security control theory: achieving a sustainable reconciliation between sharing and protecting the privacy of information. J. Manag. Inf. Syst. 34, 1082–1112 (2017)CrossRefGoogle Scholar
  2. 2.
    Ciborra, C.U.: From thinking to tinkering: the grassroots of strategic information systems. Inf. Soc. 8, 297–309 (1992)CrossRefGoogle Scholar
  3. 3.
    Dörner, K., Edelman, D.: What ‘digital’ really means. McKinsey (2015)Google Scholar
  4. 4.
    Finke, R.A., Ward, T.B., Smith, S.M.: Creative Cognition: Theory, Research, and Applications. MIT Press, Cambridge (1992)Google Scholar
  5. 5.
    Griffy-Brown, C., Lazarikos, D., Chun, M.: How do you secure an environment without a perimeter? Using emerging technology processes to support information security efforts in an agile data center. J. Appl. Bus. Econ. 18, 90–102 (2016)Google Scholar
  6. 6.
    Hoegl, M., Gibbert, M., Mazursky, D.: Financial constraints in innovation projects: when is less more? Res. Policy 37, 1382–1391 (2008)CrossRefGoogle Scholar
  7. 7.
    Olivé, A.: Conceptual Modeling of Information Systems. Springer, Heidelberg (2007). Scholar
  8. 8.
    Pfleeger, S.L., Cunningham, R.K.: Why measuring security is hard. Secur. Priv. 8, 46–54 (2010)CrossRefGoogle Scholar
  9. 9.
    Simon, H.A.: The Sciences of the Artificial. MIT Press, Cambridge (1996)Google Scholar
  10. 10.
    Simon, H.A.: Theories of bounded rationality. In: Decision and Organization: A Volume in Honor of Jacob Marschak, pp. 161–176. North-Holland (1972)Google Scholar
  11. 11.
    Vodanovich, S., Sundaram, D., Myers, M.D.: Digital natives and ubiquitous information systems. Inf. Syst. Res. 21, 711–723 (2010)CrossRefGoogle Scholar
  12. 12.
    Ward, T.B.: Cognition, creativity, and entrepreneurship. J. Bus. Ventur. 19, 173–188 (2004)MathSciNetCrossRefGoogle Scholar
  13. 13.
    Yoo, Y.: Computing in everyday life: a call for research on experiential computing. MIS Q. 34, 213–231 (2010)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Department of Computer Information SystemsGeorgia State UniversityAtlantaUSA
  2. 2.School of ManagementCurtin UniversityPerthAustralia

Personalised recommendations