Skip to main content

Information Security: Going Digital (Invited Lecture)

  • Conference paper
  • First Online:

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 963))

Abstract

Because ‘going digital’ regards using digital technologies to fundamentally change the way things get done, information security is necessarily engaged in going digital. Society and science are going digital. For the sciences, this digitalization process invokes an emerging model of the science of design that incorporates the assembly of information systems from a wide variety of platform ecosystems. According to principles of bounded rationality and bounded creativity, this mode of design requires more creativity to develop needed functionality from a finite set of available platforms. Going digital requires more creativity in designers of all types of information systems. Furthermore, the designers’ goals are changing. The traditional model of information systems is representational: the data in the system represents (reflects) reality. Newer information systems, equipped with 3D printing and robotics actually create reality. Reality represents (reflects) the data in the system. This invited paper explores the example of information security. Designers of security for information systems not only must be more creative, they must design for more goals. The security task is no longer just protecting the digital system, the security task is protecting the products of the digital system. These innovations have particular implications for information systems curricula at university, too.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    http://www.cnbc.com/2016/09/16/future-of-farming-driverless-tractors-ag-robots.html.

References

  1. Anderson, C., Baskerville, R., Kaul, M.: Information security control theory: achieving a sustainable reconciliation between sharing and protecting the privacy of information. J. Manag. Inf. Syst. 34, 1082–1112 (2017)

    Article  Google Scholar 

  2. Ciborra, C.U.: From thinking to tinkering: the grassroots of strategic information systems. Inf. Soc. 8, 297–309 (1992)

    Article  Google Scholar 

  3. Dörner, K., Edelman, D.: What ‘digital’ really means. McKinsey (2015)

    Google Scholar 

  4. Finke, R.A., Ward, T.B., Smith, S.M.: Creative Cognition: Theory, Research, and Applications. MIT Press, Cambridge (1992)

    Google Scholar 

  5. Griffy-Brown, C., Lazarikos, D., Chun, M.: How do you secure an environment without a perimeter? Using emerging technology processes to support information security efforts in an agile data center. J. Appl. Bus. Econ. 18, 90–102 (2016)

    Google Scholar 

  6. Hoegl, M., Gibbert, M., Mazursky, D.: Financial constraints in innovation projects: when is less more? Res. Policy 37, 1382–1391 (2008)

    Article  Google Scholar 

  7. Olivé, A.: Conceptual Modeling of Information Systems. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-39390-0

    Book  MATH  Google Scholar 

  8. Pfleeger, S.L., Cunningham, R.K.: Why measuring security is hard. Secur. Priv. 8, 46–54 (2010)

    Article  Google Scholar 

  9. Simon, H.A.: The Sciences of the Artificial. MIT Press, Cambridge (1996)

    Google Scholar 

  10. Simon, H.A.: Theories of bounded rationality. In: Decision and Organization: A Volume in Honor of Jacob Marschak, pp. 161–176. North-Holland (1972)

    Google Scholar 

  11. Vodanovich, S., Sundaram, D., Myers, M.D.: Digital natives and ubiquitous information systems. Inf. Syst. Res. 21, 711–723 (2010)

    Article  Google Scholar 

  12. Ward, T.B.: Cognition, creativity, and entrepreneurship. J. Bus. Ventur. 19, 173–188 (2004)

    Article  MathSciNet  Google Scholar 

  13. Yoo, Y.: Computing in everyday life: a call for research on experiential computing. MIS Q. 34, 213–231 (2010)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Richard Baskerville .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Baskerville, R. (2019). Information Security: Going Digital (Invited Lecture). In: Kabanda, S., Suleman, H., Gruner, S. (eds) ICT Education. SACLA 2018. Communications in Computer and Information Science, vol 963. Springer, Cham. https://doi.org/10.1007/978-3-030-05813-5_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-05813-5_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-05812-8

  • Online ISBN: 978-3-030-05813-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics