Skip to main content

Model of Multilevel Information Splitting and Management in an Organization

  • Chapter
  • First Online:
  • 694 Accesses

Part of the book series: Advanced Information and Knowledge Processing ((AI&KP))

Abstract

Information is split within commercial organizations regardless of its type, the method of its processing or the purpose for which the organization collects it. The significance of information splitting may depend on the method of its splitting, the purpose of splitting it and the meaning of this information. The significance of information sharing, on the other hand, may depend on its strategic importance and the meaning it contains for the specific organization. If information is important and of great materiality for the organization or for e.g. external organizations, then it makes sense to attempt sharing this information to protect it and secure it from disclosure to unauthorized persons (or organizations). When defining the type of information to undergo the splitting or sharing process, we should consider its ‘character’ determined by its confidentiality, significance and importance, because only important information determines the method of its splitting and the sense of doing so.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Ogiela, M. R., & Ogiela, U. (2012). Linguistic protocols for secure information management and sharing. Computers & Mathematics with Applications, 63(2), 564–572.

    Article  MathSciNet  Google Scholar 

  2. Reynolds, G. (2009). Information technology for managers. Boston: Course Technology.

    Google Scholar 

  3. Schermerhorn, J. R. (2012). Management. Hoboken: Wiley.

    Google Scholar 

  4. Ogiela, M. R., & Ogiela, U. (2010). The use of mathematical linguistic methods in creating secret sharing threshold algorithms. Computers & Mathematics with Applications, 60(2), 267–271.

    Article  MathSciNet  MATH  Google Scholar 

  5. Haag, S., & Cummings, M. (2012). Management information systems for the information age. Irwin: McGraw-Hill.

    Google Scholar 

  6. Li, H., & Singhal, M. (2007). Trust management in distributed systems. Computer, 40(2), 45–53.

    Article  Google Scholar 

  7. Krcmar, H. (2006). Information management. Springer.

    Google Scholar 

  8. Mackenzie, O. J. (Ed.). (2006). Information science and knowledge management. Berlin: Springer.

    Google Scholar 

  9. Ogiela, L. (2009). UBIAS systems for cognitive interpretation and analysis of medical images. Opto-Electronics Review, 17(2), 166–179.

    Article  Google Scholar 

  10. Ogiela, L., & Ogiela, M. R. (2009). Cognitive techniques in visual data interpretation (Studies in computational intelligence, Vol. 228). Berlin/Heidelberg: Springer.

    Book  Google Scholar 

  11. Ogiela, L., & Ogiela, M. R. (2012). Advances in cognitive information systems (Cognitive systems monographs, Vol. 17). Berlin/Heidelberg: Springer.

    Book  MATH  Google Scholar 

  12. Ogiela, M. R., & Ogiela, U. (2012). DNA-like linguistic secret sharing for strategic information systems. International Journal of Information Management, 32, 175–181.

    Article  Google Scholar 

  13. Ward, J., Griffiths, P., & Whitemore, P. (1992). Strategic planning for information systems. Chichester: Wiley.

    Google Scholar 

  14. Whitman, M. E., & Mattord, H. J. (2010). Management of information security. Boston: Course Technology.

    Google Scholar 

  15. Ladley, J. (2010). Making enterprise information management (EIM) work for business: A guide to understanding information as an asset. Burlington: Morgan Kaufman.

    Google Scholar 

  16. Cellary, W. (2007). Globalization from the information and communication perspective. Lecture Notes in Computer Science 4882:283–292

    Google Scholar 

  17. Cellary, W., Wiza, W., & Walczak, K. (2004). Visualizing web search results in 3D. Computer, 37(5), 87–89.

    Article  Google Scholar 

  18. ElGamal, T. (1985). A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31, 469–472.

    Article  MathSciNet  MATH  Google Scholar 

  19. Hang, N., & Zhao, W. (2007). Privacy-preserving data mining systems. Computer, 40(4), 52–58.

    Article  Google Scholar 

  20. Menezes, A., van Oorschot, P., & Vanstone, S. (2001). Handbook of applied cryptography. Waterloo: CRC Press.

    Google Scholar 

  21. O’Brien, J., & Marakas, G. (2010). Management information systems. Irwin: McGraw-Hill.

    Google Scholar 

  22. Ogiela, M. R., & Ogiela, U. (2008). Linguistic approach to cryptographic data sharing. In: FGCN 2008 – The 2nd International Conference on Future Generation Communication and Networking (Vol. 1, pp. 377–380), December 13–15, 2008, Hainan Island.

    Google Scholar 

  23. Ogiela, M. R., & Ogiela, U. (2010). Grammar encoding in DNA-like secret sharing infrastructure. Lecture Notes in Computer Science, 6059, 175–182.

    Article  Google Scholar 

  24. Okamoto, T. (1990). A fast signature scheme based on congruential polynomial operations. IEEE Transactions on Information Theory, 1, 47–53.

    Article  Google Scholar 

  25. Schneier, B. (1996). Applied cryptography: Protocols, algorithms, and source code in C. New York: Wiley.

    MATH  Google Scholar 

  26. Seberry, J., & Pieprzyk, J. (1989). Cryptography: An introduction to computer security. Englewood Cliffs: Prentice-Hall.

    MATH  Google Scholar 

  27. Tipton, H. F. (2007). Information security management handbook. Boca Raton: Auerbach.

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag London

About this chapter

Cite this chapter

Ogiela, M.R., Ogiela, U. (2014). Model of Multilevel Information Splitting and Management in an Organization. In: Secure Information Management Using Linguistic Threshold Approach. Advanced Information and Knowledge Processing. Springer, London. https://doi.org/10.1007/978-1-4471-5016-9_4

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-5016-9_4

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-4471-5015-2

  • Online ISBN: 978-1-4471-5016-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics