Abstract
Because ‘going digital’ regards using digital technologies to fundamentally change the way things get done, information security is necessarily engaged in going digital. Society and science are going digital. For the sciences, this digitalization process invokes an emerging model of the science of design that incorporates the assembly of information systems from a wide variety of platform ecosystems. According to principles of bounded rationality and bounded creativity, this mode of design requires more creativity to develop needed functionality from a finite set of available platforms. Going digital requires more creativity in designers of all types of information systems. Furthermore, the designers’ goals are changing. The traditional model of information systems is representational: the data in the system represents (reflects) reality. Newer information systems, equipped with 3D printing and robotics actually create reality. Reality represents (reflects) the data in the system. This invited paper explores the example of information security. Designers of security for information systems not only must be more creative, they must design for more goals. The security task is no longer just protecting the digital system, the security task is protecting the products of the digital system. These innovations have particular implications for information systems curricula at university, too.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Anderson, C., Baskerville, R., Kaul, M.: Information security control theory: achieving a sustainable reconciliation between sharing and protecting the privacy of information. J. Manag. Inf. Syst. 34, 1082–1112 (2017)
Ciborra, C.U.: From thinking to tinkering: the grassroots of strategic information systems. Inf. Soc. 8, 297–309 (1992)
Dörner, K., Edelman, D.: What ‘digital’ really means. McKinsey (2015)
Finke, R.A., Ward, T.B., Smith, S.M.: Creative Cognition: Theory, Research, and Applications. MIT Press, Cambridge (1992)
Griffy-Brown, C., Lazarikos, D., Chun, M.: How do you secure an environment without a perimeter? Using emerging technology processes to support information security efforts in an agile data center. J. Appl. Bus. Econ. 18, 90–102 (2016)
Hoegl, M., Gibbert, M., Mazursky, D.: Financial constraints in innovation projects: when is less more? Res. Policy 37, 1382–1391 (2008)
Olivé, A.: Conceptual Modeling of Information Systems. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-39390-0
Pfleeger, S.L., Cunningham, R.K.: Why measuring security is hard. Secur. Priv. 8, 46–54 (2010)
Simon, H.A.: The Sciences of the Artificial. MIT Press, Cambridge (1996)
Simon, H.A.: Theories of bounded rationality. In: Decision and Organization: A Volume in Honor of Jacob Marschak, pp. 161–176. North-Holland (1972)
Vodanovich, S., Sundaram, D., Myers, M.D.: Digital natives and ubiquitous information systems. Inf. Syst. Res. 21, 711–723 (2010)
Ward, T.B.: Cognition, creativity, and entrepreneurship. J. Bus. Ventur. 19, 173–188 (2004)
Yoo, Y.: Computing in everyday life: a call for research on experiential computing. MIS Q. 34, 213–231 (2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Baskerville, R. (2019). Information Security: Going Digital (Invited Lecture). In: Kabanda, S., Suleman, H., Gruner, S. (eds) ICT Education. SACLA 2018. Communications in Computer and Information Science, vol 963. Springer, Cham. https://doi.org/10.1007/978-3-030-05813-5_1
Download citation
DOI: https://doi.org/10.1007/978-3-030-05813-5_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-05812-8
Online ISBN: 978-3-030-05813-5
eBook Packages: Computer ScienceComputer Science (R0)