publication . Doctoral thesis . 2011

A Framework for Adaptive Information Security Systems : A Holistic Investigation

Mwakalinga, Jeffy;
Open Access English
  • Published: 01 Jan 2011
  • Publisher: KTH, Kommunikationssystem, CoS
  • Country: Sweden
Abstract
This research proposes a framework for adaptive information security systems that considers both the technical and social aspects of information systems security. Initial development of information systems security focused on computer technology and communication protocols. Researchers and designers did not consider culture, traditions, ethics, and other social issues of the people using the systems when designing and developing information security systems. They also seemed to ignore environments where these systems run and concentrated only on securing parts of the information systems. Furthermore, they did not pay adequate attention to the enemies of informat...
Subjects
free text keywords: Security, framework for adaptive security systems, socio-technical, Information Systems, Systemvetenskap, informationssystem och informatik
Related Organizations
Download from

[1] James Hillman, Archetypical Psychology, Uniform Edition, Vol. 1, Spring Publications, 2004

[2] The soul, http://en.wikipedia.org/wiki/Soul#Socrates_and_Plato

[3] N. Van Dam, V. Evers, & F. Arts, Cultural user experience, issues in e-government: Designing for a Multi-cultural society. Digital Cities 3, University van Amsterdam, Netherlands, 2003

[4] S. P. Robbins, & T. A. Judge, Essentials of organizational behavior, tenth edition Pearson education publications, New Jersey, 2010

[5] S. Kowalski, Why do people deviate? University of Manitoba, Canada, 1975

[6] T. Anderson, Towards a theory of online learning, Distance Education, Athabasca university, Canada

[7] M. Levin & A.W. Martin, The praxis of educating action researchers: The possibilities and obstacles in higher education, Action Research, 2007 5: 219

[8] S. Kowalski, Two Case Studies in Using Chatbots for Security Training, Proceedings of the WISE Conference, 2009

[9] S. Kowalski, Lectures in Security management at the department of computer Sciences and Systems, University of Stockholm, 2011

[10] J.T. Hancock, J. Thom-Santelli, T. Ritchie, Deception and design: the impact of communication technology on lying behavior, Department of Communication, Cornell University, New York, USA

[11] C. Camden, M.T. Motley, & A. Wilson, A. White lies in interpersonal communication: A taxonomy and preliminary investigation of social motivations. Western Journal of Speech Communication, 48 (1984), pp. 309-325 [OpenAIRE]

[12] B.M. DePaulo, D. A. Kashy, S.E. Kirkendol, M. M. Wyer, & J. A. Epstein, Lying in everyday life, Journal of Personality and Social Psychology, 70 (1996), pp. 979-995 [OpenAIRE]

[13] D.A Kashy, & B. M. DePaulo, Who lies? Journal of Personality and Social Psychology, 70 (1996), pp. 1037-1051

[14] R. E. Turner, C. Edgely, & G. Olmstead, Informational control in conversations: Honesty is not always the best policy. Kansas Journal of Sociology, 11 (1975), pp. 69-89

[15] B.M. DePaulo, & D.A. Kashy, Everyday lies in close and personal relationships. Journal of Personality and Social Psychology, 74 (1998), pp. 63-79 P,AC, AU, I [OpenAIRE]

Powered by OpenAIRE Open Research Graph
Any information missing or wrong?Report an Issue