Skip to main content

Information Security and System Development

  • Conference paper
  • First Online:
Novel Algorithms and Techniques in Telecommunications and Networking

Abstract

Due to globalization, stronger competition, increased complexity, information explosion, interconnection and exten-sive use of IT data and information management are main performance driver and key differentiator for sustainable or-ganization success. Long time organizations had developed IT systems regarding overall access rights. Due to stronger re-quirements of data protection code and increased requirements for data integrity, availability and confidentiality information security is a key requirement for system development. Many organizations of different sizes are implementing standard based management systems, such as quality ISO9001, environ-mental ISO14001or others, which are based on common prin-ciples: objectives and strategies, business processes, resource management and continuously optimization. Due to this situa-tion we used in different case studies as basis for system devel-opment a the organization adapted, holistic, standard based management system to analyze the system requirements. This promotes legal conformity, information security awareness, ef-fectiveness and information security improvement for sustain-able organization success.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. M. Hammer, Beyond reengineering, HarperCollins Business, London, 1996.

    Google Scholar 

  2. ISO/IEC 27001:2005 Information technology – Security techniques – Information security management systems – Requirements, 5.10.2005.

    Google Scholar 

  3. EN/ISO 9001:2000 Quality Management Systems – requirements, ISO 17.12.2000.

    Google Scholar 

  4. P. Osanna, M. Durakbasa and A. Afjehi-Sada, Quality in Industry, Vienna University of Technology, 2004.

    Google Scholar 

  5. Y. Akao, Quality Function Deployment, integrating customer requirements into product design, Productivity Press, Portland, 1990.

    Google Scholar 

  6. M. Stoll, Workplace Process Integrated Learning and Knowledge Organization, in H. Maurer and K. Tochtermann Eds. Proc. I-Know 07, 7th International Conference on Knowledge Management, J.UCS Journal of Universal Computer Science, Graz, 2007.

    Google Scholar 

  7. T. Davenport and L. Prusak, Working Knowledge, Harvard Business School Press, Boston, 1998.

    Google Scholar 

  8. R. Maier, Knowledge management systems, Springer, Berlin, 2002.

    Google Scholar 

  9. G. Riempp, Integrierte Wissensmanagementsysteme: Architektur und praktische Anwendung, Springer, Berlin, 2004.

    Google Scholar 

  10. G. Probst, S. Raub and K. Romhardt, Wissen managen, Gabler, Wiesbaden, 1999.

    Google Scholar 

  11. F. Lehner, Wissensmanagement: Grundlagen Methoden und technische Unterstützung, Hanser, München, 2006.

    Google Scholar 

  12. S. Güldenberg, Wissensmanagement und Wissenscontrolling in lernenden Organisationen. Deutscher Universitäts-Verlag, Wiesbaden, 1997.

    Google Scholar 

  13. P. Pawlowsky, Wissensmanagement, Erfahrungen und Perspektiven. Gabler, Wiesbaden, 1998.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Margareth Stoll PhD or Dietmar Laner .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer Science+Business Media B.V.

About this paper

Cite this paper

Stoll, M., Laner, D. (2010). Information Security and System Development. In: Sobh, T., Elleithy, K., Mahmood, A. (eds) Novel Algorithms and Techniques in Telecommunications and Networking. Springer, Dordrecht. https://doi.org/10.1007/978-90-481-3662-9_6

Download citation

  • DOI: https://doi.org/10.1007/978-90-481-3662-9_6

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-90-481-3661-2

  • Online ISBN: 978-90-481-3662-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics