Abstract
Information is split within commercial organizations regardless of its type, the method of its processing or the purpose for which the organization collects it. The significance of information splitting may depend on the method of its splitting, the purpose of splitting it and the meaning of this information. The significance of information sharing, on the other hand, may depend on its strategic importance and the meaning it contains for the specific organization. If information is important and of great materiality for the organization or for e.g. external organizations, then it makes sense to attempt sharing this information to protect it and secure it from disclosure to unauthorized persons (or organizations). When defining the type of information to undergo the splitting or sharing process, we should consider its ‘character’ determined by its confidentiality, significance and importance, because only important information determines the method of its splitting and the sense of doing so.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Ogiela, M. R., & Ogiela, U. (2012). Linguistic protocols for secure information management and sharing. Computers & Mathematics with Applications, 63(2), 564–572.
Reynolds, G. (2009). Information technology for managers. Boston: Course Technology.
Schermerhorn, J. R. (2012). Management. Hoboken: Wiley.
Ogiela, M. R., & Ogiela, U. (2010). The use of mathematical linguistic methods in creating secret sharing threshold algorithms. Computers & Mathematics with Applications, 60(2), 267–271.
Haag, S., & Cummings, M. (2012). Management information systems for the information age. Irwin: McGraw-Hill.
Li, H., & Singhal, M. (2007). Trust management in distributed systems. Computer, 40(2), 45–53.
Krcmar, H. (2006). Information management. Springer.
Mackenzie, O. J. (Ed.). (2006). Information science and knowledge management. Berlin: Springer.
Ogiela, L. (2009). UBIAS systems for cognitive interpretation and analysis of medical images. Opto-Electronics Review, 17(2), 166–179.
Ogiela, L., & Ogiela, M. R. (2009). Cognitive techniques in visual data interpretation (Studies in computational intelligence, Vol. 228). Berlin/Heidelberg: Springer.
Ogiela, L., & Ogiela, M. R. (2012). Advances in cognitive information systems (Cognitive systems monographs, Vol. 17). Berlin/Heidelberg: Springer.
Ogiela, M. R., & Ogiela, U. (2012). DNA-like linguistic secret sharing for strategic information systems. International Journal of Information Management, 32, 175–181.
Ward, J., Griffiths, P., & Whitemore, P. (1992). Strategic planning for information systems. Chichester: Wiley.
Whitman, M. E., & Mattord, H. J. (2010). Management of information security. Boston: Course Technology.
Ladley, J. (2010). Making enterprise information management (EIM) work for business: A guide to understanding information as an asset. Burlington: Morgan Kaufman.
Cellary, W. (2007). Globalization from the information and communication perspective. Lecture Notes in Computer Science 4882:283–292
Cellary, W., Wiza, W., & Walczak, K. (2004). Visualizing web search results in 3D. Computer, 37(5), 87–89.
ElGamal, T. (1985). A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31, 469–472.
Hang, N., & Zhao, W. (2007). Privacy-preserving data mining systems. Computer, 40(4), 52–58.
Menezes, A., van Oorschot, P., & Vanstone, S. (2001). Handbook of applied cryptography. Waterloo: CRC Press.
O’Brien, J., & Marakas, G. (2010). Management information systems. Irwin: McGraw-Hill.
Ogiela, M. R., & Ogiela, U. (2008). Linguistic approach to cryptographic data sharing. In: FGCN 2008 – The 2nd International Conference on Future Generation Communication and Networking (Vol. 1, pp. 377–380), December 13–15, 2008, Hainan Island.
Ogiela, M. R., & Ogiela, U. (2010). Grammar encoding in DNA-like secret sharing infrastructure. Lecture Notes in Computer Science, 6059, 175–182.
Okamoto, T. (1990). A fast signature scheme based on congruential polynomial operations. IEEE Transactions on Information Theory, 1, 47–53.
Schneier, B. (1996). Applied cryptography: Protocols, algorithms, and source code in C. New York: Wiley.
Seberry, J., & Pieprzyk, J. (1989). Cryptography: An introduction to computer security. Englewood Cliffs: Prentice-Hall.
Tipton, H. F. (2007). Information security management handbook. Boca Raton: Auerbach.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag London
About this chapter
Cite this chapter
Ogiela, M.R., Ogiela, U. (2014). Model of Multilevel Information Splitting and Management in an Organization. In: Secure Information Management Using Linguistic Threshold Approach. Advanced Information and Knowledge Processing. Springer, London. https://doi.org/10.1007/978-1-4471-5016-9_4
Download citation
DOI: https://doi.org/10.1007/978-1-4471-5016-9_4
Published:
Publisher Name: Springer, London
Print ISBN: 978-1-4471-5015-2
Online ISBN: 978-1-4471-5016-9
eBook Packages: Computer ScienceComputer Science (R0)