Logo Goletty

Information Security Engineering: a Framework for Research and Practices
Journal Title International Journal of Computers Communications & Control
Journal Abbreviation ijccc
Publisher Group Agora University Publishing House: Journals (Agora University)
Website http://univagora.ro/jour/index.php/ijccc
PDF (1,507 kb)
   
Title Information Security Engineering: a Framework for Research and Practices
Authors Tang, Mincong; Li, Meng’gang
Abstract Information security is not a new topic in academics and industry. However, through a comprehensive literature review, we found that most research in information security focus on technical perspectives including evaluation methods and mathematical approaches for securities, risk mitigation algorithms, with some research focus on economic perspective of information security and even a few talked about social engineering of information security. There is not a unique framework to integrate different types of research in information security. We believe that information security research apply the theories and methodologies in systems engineering to investigate the problems, that is, information security engineering. In this paper, we propose a conceptual framework of information security engineering. This framework explicitly illustrates the methodological system, content system, procedures and strategies for information security engineering research and practices.
Publisher Agora University of Oradea
Date 2013-08-01
Source International Journal of Computers Communications & Control Vol 8, No 4 (2013): INT J COMPUT COMMUN
Rights Copyright Transfer FormThe undersigned Author(s) of the above mentioned Paper here by transfer any and all copyright-rights in and to The Paper to The Publisher.The Author(s) warrants that The Paper is based on their original work and that the undersigned has the power and authority to make and execute this assignment. It is the author´s responsibility to obtain written permission to quote material that has been previously published in any form.The Publisher recognizes the retained rights noted below and grants to the above authors and employers for whom the work performed royalty-free permission to reuse their materials below. Authors may reuse all or portions of the above Paper in other works, excepting the publication of the paper in the same form. Authors may reproduce or authorize others to reproduce the above Paper for the Author´s personal use or for internal company use, provided that the source and The Publisher copyright notice are mentioned, that the copies are not used in any way that implies The Publisher endorsement of a product or service of an employer, and that the copies are not offered for sale as such. Authors are permitted to grant third party requests for reprinting, republishing or other types of reuse. The Authors may make limited distribution of all or portions of the above Paper prior to publication if they inform The Publisher of the nature and extent of such limited distribution prior there to. Authors retain all proprietary rights in any process, procedure, or article of manufacture described in The Paper. This agreement becomes null and void if and only if the above paper is not accepted and published by The Publisher, or is withdrawn by the author(s) before acceptance by the Publisher.

 

See other article in the same Issue


Goletty © 2024