Abstract
This paper presents the Systemic-Holistic Approach developed and used in an academic educational programme in IT security. The programme itself has been presented before in [Yngström 1983, 1988, 1994]. This time the theoretical background to the holistic approach is explained in detail, it is presented how it has influenced the conceptual model of the programme, and how it is taught in the classroom, including reading material. Finally the former presented evaluations are extended with evaluations of the same approach taken in another social environment.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Ackoff, R., Designing a National Scientific and Technological Communication System, University of Pennsylvania Press, 1976
Computing Curricula 1991. Report of the ACM/IEEE-CS Joint Curriculum Task Force. ACM Press & IEEE Computer Society Press, 1991.
Ashby, R. Introduction to Cybernetics, Wiley & Sons, New York, 1963
Beer, S., Cybernetics and Management, John Wiley & Sons, 1964
Beer, S., The heart of the enterprise. John Wiley & Sons,1979.
Boulding K., “General Systems as a point of view” in Mesarovic, M., D. (ed) View on General Systems Theory, John Wiley & Sons, New York, 1964
Checkland, P.B., “Images of Systems and the Systems Image”, Presidential address to ISGSR, June 1987, in Journal of Applied Systems Analysis, 15, (1988) 37–42.
Checkland, P.B., Soft System Methodology in Action, Wiley & Sons, 1990
Denning, Peter J., (ed) Computers under Attack. Intruders, Worms, and Viruses, ACM Press, Addison-Wesley Publishing Co., Mass, 1990
Denning, D. E., “A New Paradigm for Trusted Systems” in Proceedings 1992–1993 ACM SIGSAC New Security Paradigm Workshop, September 2224,1992, August 3–5, 1993, Little Compton, Rhode Island, USA, IEEE Computer Society Press 1993
de Rosnay, J, The Macroscope. A New World Scientific System, Harper & Row Publ., New York, 1975
Gordon, S., “Technologically Enabled Crime: Shifting Paradigm for the Year 2000” in Proceedings of the Tenth International Information Security Conference, IFIP SEC 84, Curacao, Netherlands Antilles, May 23–27, 1994. Conference edition
Hoffman, Lance J.: Reducing Society’s Vulnerability as Computers and Networks Proliferate. The George Washington University, Institute for Information Science and Technology GWU-IIST-92–19, 1992.
Hofstadter, Douglas R., Gödel, Escher, Bach: an eternal golden braid. A Metaphorical fugue on minds and machines in the spirit of Lewis Carroll. Penguin Books, Harvester Press Ltd, 1979.
Laufer, R., “Cybernetics, Legitimacy and Society”, in Yngström, L., Sizer, R., Berleur, J., Laufer, R. (eds) Can Information Technology result in Benevolent Bureaucracies? Proceedings of the IFIP TC9/WG9.2 Working Conference, Namur, Belgum, 3–6 January, 1985, North-Holland, 1985, 29–42.
Laufer, R., “The Question of the Legitimacy of the Computer: An Epistemological Point of View”, in Berleur, J., Clement, A., Sizer, R, Whitehouse, D.(eds), The Information Society: Evolving Landscapes, Springer Verlag & Captus University Publications, 1990.
Computers at Risk. Safe Computing In the Information Age., System Security Study Committee Computer Science and Telecommunications Board Commission on Physical Sciences, Mathematics, and Applications, National Research Council, National Academy Press,1991.
Guidelines for the Security of Information Systems, Organisation for Economic Cooperation and Development, OECD/GD(92)190, Paris, 1992.
Pfleeger, Charles P., Security in Computing. Prentice Ha11, 1989.
Schoderbek, P., Schoderbek, G., Kefalas, A., Management Systems. Conceptual Considerations, 4:th ed, Irwin, Boston, 1990
Smith, R. A.,(Ed) Innovative teaching in engineering, Ellis Horwood Ltd, Chichester, 1991
Wiener, N., Cybernetics or Control and Communication in Man, Animal, and Machine, John Wiley & Sons, 1948
von Bertalanffy, L., “Main Currents in Modern Thought” in Yearbook of the Society for General Systems Research, Vol 1, 1956
von Bertalanffy, L., General Systems Theory, Braziller, New York, 1968
Yngström, L., “Education in Safety Systems and Security Analysis–Suggestions for a One Year University Program”, in Fâk, V. (ed) Security, IFIP/Sec’83, Proceedings of the First Security Conference, Stockholm, Sweden, 16–19 May 1983, North-Holland, Amsterdam 1983, p 295–303
Yngström, L., “Experiences from a one-year Academic Programme in Security Informatics”, in Caelli, William (ed) Computer Security in the Age of Information, Proceedings of the Fifth International Conference on Computer and Security, 19–21 May, Gold Coast, Queensland, Australia, North-Holland, 1988.
Yngström, L., “Evaluation of an academic programme in IT Security 1985–1990”, in Dougall, Graham E., Jones, Darren, (eds) Computer Security: Discovering Tomorrow, Proceedings of the Ninth IFIP International Symposium on Computer Security, IFIP/Sec’93, Deerhurst, Ontario, Canada, 12–14 May, 1993, 281–294.
Yngström, L., “Education in IT Security at Bachelor and Master Levels Using a Systemic-Holistic Approach” in Seizer R., Yngström, L., Kaspersen, H., Fischer-Hubner, S., (eds) Security and Control of Information Technology in Society, Proceedings of the IFIP TC9/WG9.6 Working Conference on Security and Control of Information Technology in Society on board MIS Ilich and ashore at St. Petersburg, Russia, 12–17 August, 1993, North-Holland, 1994.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1995 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
Yngström, L. (1995). A Holistic Approach to IT Security. In: Eloff, J.H.P., von Solms, S.H. (eds) Information Security — the Next Decade. IFIP Advances in Information and Communication Technology. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-34873-5_9
Download citation
DOI: https://doi.org/10.1007/978-0-387-34873-5_9
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-5041-2910-7
Online ISBN: 978-0-387-34873-5
eBook Packages: Springer Book Archive