Abstract
The security of information systems is a serious issue because computer abuse is increasing. It is important, therefore, that systems analysts and designers develop expertise in methods for specifying information systems security. The characteristics found in three generations of general information system design methods provide a framework for comparing and understanding current security design methods. These methods include approaches that use checklists of controls, divide functional requirements into engineering partitions, and create abstract models of both the problem and the solution. Comparisons and contrasts reveal that advances in security methods lag behind advances in general systems development methods. This analysis also reveals that more general methods fail to consider security specifications rigorously.
Publisher
Association for Computing Machinery (ACM)
Subject
General Computer Science,Theoretical Computer Science
Reference114 articles.
1. AVISON D. AND FITZGERALD G. 1988. Information Systems Development: Methodologies Techniques and Tools. Blackwell Scientific Oxford U.K. AVISON D. AND FITZGERALD G. 1988. Information Systems Development: Methodologies Techniques and Tools. Blackwell Scientific Oxford U.K.
2. Information Systems Development Research: An Exploration of Ideas in Practice
3. Computer security methodology: Risk analysis and project definition
Cited by
189 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献