Advertisement

Critical Information Infrastructures

  • Ali Sunyaev
Chapter
  • 50 Downloads

Abstract

Information systems have evolved rapidly in the past decades and increasingly take a central role in society. Today, some information systems have become such integral parts of society that their disruption or unintended consequences can have detrimental effects on vital societal functions; that is, they have become critical information infrastructures. This chapter clarifies the concept of ‘critical information infrastructures’ and distinguishes them from conventional critical infrastructures. After introducing foundational concepts and the evolution of information infrastructures, the chapter discusses salient characteristics, important challenges, main functions, and core tasks for operating critical information infrastructures. Critical information infrastructures, in spite of their vital role in society, often go unnoticed. In this chapter, the reader learns the basics of recognizing, understanding, and operating critical information infrastructures.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Antonakakis M, April T, Bailey M, Bernhard M, Bursztein E, Cochran J, Durumeric Z, Halderman JA, Invernizzi L, Kallitsis M (2017) Understanding the Mirai botnet. Paper presented at the 26th USENIX security symposium, Vancouver, BC, 16–18 Aug 2017Google Scholar
  2. AT&T (2010) AT&T completes 100-Gigabit Ethernet field trial. PR Newswire, 9 Mar 2010Google Scholar
  3. Ayres RU (1990) Technological transformations and long waves. Part I. Technol Forecast Soc Chang 37(1):1–37CrossRefGoogle Scholar
  4. Bhagat S, Burke M, Diuk C, Filiz IO, Edunov S (2016) Three and a half degrees of separation. https://joytothehome.com/wp-content/uploads/2015/11/Three-and-a-half-degrees-of-separation-_-Blog-_-Research-at-Facebook.pdf. Accessed 15 Sept 2019
  5. Bondi AB (2000) Characteristics of scalability and their impact on performance. Paper presented at the 2nd international workshop on software and performance, Ottawa, ON, 17–20 Sept 2000Google Scholar
  6. Bostrom RP, Heinen JS (1977) MIS problems and failures: a socio-technical perspective. Part I: The causes. MIS Q 1(3):17–32CrossRefGoogle Scholar
  7. Bye BL (2011) Volcanic eruptions: science and risk management. https://www.science20.com/planetbye/volcanic_eruptions_science_and_risk_management-79456. Accessed 15 Sept 2019
  8. Cadwalladr C, Graham-Harrison E (2018) Revealed: 50 Million facebook profiles harvested for Cambridge analytica in major data breach. The Guardian, 17 Mar 2018Google Scholar
  9. Caplan R, Donovan J, Hanson L, Matthews J (2018) Algorithmic accountability: a primer. https://datasociety.net/wp-content/uploads/2018/04/Data_Society_Algorithmic_Accountability_Primer_FINAL-4.pdf
  10. Carroll AB (1979) A three-dimensional conceptual model of corporate performance. Acad Manag Rev 4(4):497–505CrossRefGoogle Scholar
  11. Carroll EC (2017) Making news: balancing newsworthiness and privacy in the age of algorithms. Georgetown Law J 106:69–114Google Scholar
  12. Clarke R (1999) Internet privacy concerns confirm the case for intervention. Commun ACM 42(2):60–67CrossRefGoogle Scholar
  13. Cropanzano R, Byrne ZS, Bobocel DR, Rupp DE (2001) Moral virtues, fairness heuristics, social entities, and other denizens of organizational justice. J Vocat Behav 58(2):164–209CrossRefGoogle Scholar
  14. Dehling T, Sunyaev A (2014) Secure provision of patient-centered health information technology services in public networks: leveraging security and privacy features provided by the German nationwide health information technology infrastructure. Electron Mark 24(2):89–99CrossRefGoogle Scholar
  15. Dehling T, Gao F, Schneider S, Sunyaev A (2015) Exploring the far side of mobile health: information security and privacy of mobile health applications on iOS and android. JMIR mHealth and uHealth 3(1):e8CrossRefGoogle Scholar
  16. Egan MJ (2007) Anticipating future vulnerability: defining characteristics of increasingly critical infrastructure-like systems. J Conting Crisis Manag 15(1):4–17MathSciNetCrossRefGoogle Scholar
  17. Fekete A (2011) Common criteria for the assessment of critical infrastructures. Int J Disaster Risk Sci 2(1):15–24CrossRefGoogle Scholar
  18. Gallagher R, Moltke H (2018) The NSA’s hidden spy hubs in eight U.S. cities. https://theintercept.com/2018/06/25/att-internet-nsa-spy-hubs/. Accessed 15 Sept 2019
  19. Holwerda T (2011) DuckDuckGo: the privacy-centric alternative to Google. https://www.osnews.com/story/24867/duckduckgo-the-privacy-centric-alternative-to-google/. Accessed 15 Sept 2019
  20. Juiz C, Toomey M (2015) To govern IT, or not to govern IT? Commun ACM 58(2):58–64CrossRefGoogle Scholar
  21. Kannengießer N, Lins S, Dehling T, Sunyaev A (2019) What does not fit can be made to fit! Trade-offs in distributed ledger technology designs. Paper presented at the 52nd Hawaii international conference on system sciences, Maui, HI, 8–11 Jan 2019Google Scholar
  22. Landau S (2015) Control use of data to protect privacy. Science 347(6221):504–506CrossRefGoogle Scholar
  23. Laudon KC (1996) Markets and privacy. Commun ACM 39(9):92–104CrossRefGoogle Scholar
  24. Martin K, Nissenbaum H (2016) Measuring privacy: an empirical test using context to expose confounding variables. Columbia Sci Technol Law Rev 18:176–218Google Scholar
  25. Meulen Rvd (2017) Gartner says 8.4 billion connected “things” will be in use in 2017, up 31 percent from 2016. https://www.gartner.com/en/newsroom/press-releases/2017-02-07-gartner-says-8-billion-connected-things-will-be-in-use-in-2017-up-31-percent-from-2016. Accessed 15 Sept 2019
  26. Nissenbaum H (1996) Accountability in a computerized society. Sci Eng Ethics 2(1):25–42CrossRefGoogle Scholar
  27. Nissenbaum H (2010) Privacy in context: technology, policy, and the integrity of social life. Stanford University Press, Stanford, CAGoogle Scholar
  28. Oetzel MC, Spiekermann S (2014) A systematic methodology for privacy impact assessments: a design science approach. Eur J Inf Syst 23(2):126–150CrossRefGoogle Scholar
  29. Oliver C (1991) Strategic responses to institutional processes. Acad Manag Rev 16(1):145–179CrossRefGoogle Scholar
  30. Orlikowski WJ (2007) Sociomaterial practices: exploring technology at work. Organ Stud 28(9):1435–1448CrossRefGoogle Scholar
  31. Orlikowski WJ, Scott SV (2008) Sociomateriality: challenging the separation of technology, work and organization. Acad Manag Ann 2(1):433–474CrossRefGoogle Scholar
  32. Rinaldi SM, Peerenboom JP, Kelly TK (2001) Identifying, understanding, and analyzing critical infrastructure interdependencies. IEEE Control Syst Mag 21(6):11–25CrossRefGoogle Scholar
  33. Solove DJ (2002) Conceptualizing privacy. California Law Rev 90(4):1087–1155CrossRefGoogle Scholar
  34. Sunyaev A, Huber MJ, Mauro C, Leimeister JM, Krcmar H (2008) Bewertung und Klassifikation von Bedrohungen im Umfeld der elektronischen Gesundheitskarte. Paper presented at the INFORMATIK 2008: Beherrschbare Systeme dank Informatik, Munich, 8–13 Sept 2008Google Scholar
  35. Travers J, Milgram S (1977) An experimental study of the small world problem. In: Leinhardt S (ed) Social networks: a developing paradigm. Academic Press, New York, NY, pp 179–197CrossRefGoogle Scholar
  36. Trist E (1981) The evolution of socio-technical systems. In: Perspectives in organization design and behavior. Wiley, New York, NY, pp 32–47Google Scholar
  37. Union CotE (2008) Council directive 2008/114/EC on the identification and designation of European critical infrastructures and the assessment of the need to improve their protection. Off J Eur Union L 345(75)Google Scholar
  38. Warren SD, Brandeis LD (1890) The right to privacy. Harvard Law Rev 4(5):193–220CrossRefGoogle Scholar
  39. Westin AF (1968) Privacy and freedom. Washington Lee Law Rev 25(1):166Google Scholar

Further Reading

  1. Clemons EK (2019) New patterns of power and profit: a strategist’s guide to competitive advantage in the age of digital transformation, 1st edn. Palgrave Macmillan, ChamCrossRefGoogle Scholar
  2. Dehling T, Sunyaev A (2014) Secure provision of patient-centered health information technology services in public networks: leveraging security and privacy features provided by the German nationwide health information technology infrastructure. Electron Mark 24(2):89–99CrossRefGoogle Scholar
  3. Rinaldi SM, Peerenboom JP, Kelly TK (2001) Identifying, understanding, and analyzing critical infrastructure interdependencies. IEEE Control Syst Mag 21(6):11–25CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Ali Sunyaev
    • 1
  1. 1.Institute of Applied Informatics and Formal Description MethodsKarlsruhe Institute of TechnologyKarlsruheGermany

Personalised recommendations