EconPapers    
Economics at your fingertips  
 

Components of a multi-perspective modeling method for designing and managing IT security systems

Anat Goldstein () and Ulrich Frank ()
Additional contact information
Anat Goldstein: Ben-Gurion University of the Negev
Ulrich Frank: University of Duisburg-Essen

Information Systems and e-Business Management, 2016, vol. 14, issue 1, No 5, 140 pages

Abstract: Abstract Information technology (IT) security design and management are a major concern and substantial challenge for IT management. Today’s highly complex business and technological environments and the need to effectively communicate and justify IT security requirements and controls demand methodical support. The modeling method presented in this paper addresses this demand. The method is based on the assumption that enriched enterprise models integrating technological, business, organizational and strategic aspects provide an effective foundation for developing and managing IT security systems and facilitating communication and understanding between stakeholders. The proposed modeling method for designing and managing IT security in organizations accounts for different perspectives and is based on multi-perspective enterprise modeling. The core components of the method, based on analysis of requirements at different levels of abstraction, are: modeling language concepts specifically designed to address security issues, process models that guide the use of the resulting language, and a modeling environment. The method facilitates elaborate representations of the various aspects of IT security at different levels of abstraction and covers the entire lifecycle of IT security systems. It not only supports multi-perspective requirement analysis and design but also enables monitoring and analysis of IT security at runtime. The presented artifact is evaluated with recourse to a research method that enables the configuration of multi-criteria justification procedures.

Keywords: IT security; Multi-perspective security management; Information security modeling; Enterprise modeling; Domain-specific modeling language (search for similar items in EconPapers)
Date: 2016
References: View references in EconPapers View complete reference list from CitEc
Citations: View citations in EconPapers (4)

Downloads: (external link)
http://link.springer.com/10.1007/s10257-015-0276-5 Abstract (text/html)
Access to the full text of the articles in this series is restricted.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:spr:infsem:v:14:y:2016:i:1:d:10.1007_s10257-015-0276-5

Ordering information: This journal article can be ordered from
http://www.springer. ... ystems/journal/10257

DOI: 10.1007/s10257-015-0276-5

Access Statistics for this article

Information Systems and e-Business Management is currently edited by Jörg Becker and Michael J. Shaw

More articles in Information Systems and e-Business Management from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().

 
Page updated 2025-03-20
Handle: RePEc:spr:infsem:v:14:y:2016:i:1:d:10.1007_s10257-015-0276-5