Holistic and Law Compatible IT Security Evaluation: Integration of Common Criteria, ISO 27001/IT-Grundschutz and KORA
Daniela Simić-Draws,
Stephan Neumann,
Anna Kahlert,
Philipp Richter,
Rüdiger Grimm,
Melanie Volkamer and
Alexander Roßnagel
Additional contact information
Daniela Simić-Draws: Institut für Wirtschafts- und Verwaltungsinformatik, Universität Koblenz-Landau, Koblenz, Germany
Stephan Neumann: Center for Advanced Security Research Darmstadt, Technische Universität Darmstadt, Darmstadt, Germany
Anna Kahlert: Projektgruppe verfassungsverträgliche Technikgestaltung (Provet), Universität Kassel, Kassel, Germany, Kassel, Germany
Philipp Richter: Projektgruppe verfassungsverträgliche Technikgestaltung (Provet), Universität Kassel, Kassel, Germany, Kassel, Germany
Rüdiger Grimm: Institut für Wirtschafts- und Verwaltungsinformatik, Universität Koblenz-Landau, Koblenz, Germany
Melanie Volkamer: Center for Advanced Security Research Darmstadt, Technische Universität Darmstadt, Darmstadt, Germany
Alexander Roßnagel: Projektgruppe verfassungsverträgliche Technikgestaltung (Provet), Universität Kassel, Kassel, Germany, Kassel, Germany
International Journal of Information Security and Privacy (IJISP), 2013, vol. 7, issue 3, 16-35
Abstract:
Common Criteria and ISO 27001/IT-Grundschutz are well acknowledged evaluation standards for the security of IT systems and the organisation they are embedded in. These standards take a technical point of view. In legally sensitive areas, such as processing of personal information or online voting, compliance with the legal specifications is of high importance, however, for the users’ trust in an IT system and thus for the success of this system. This article shows how standards for the evaluation of IT security may be integrated with the KORA approach for law compatible technology design to the benefit of both – increasing confidence IT systems and their conformity with the law on one hand and a concrete possibility for legal requirements to be integrated into technology design from the start. The soundness of this interdisciplinary work will be presented in an exemplary application to online voting.
Date: 2013
References: Add references at CitEc
Citations:
Downloads: (external link)
http://services.igi-global.com/resolvedoi/resolve. ... 4018/jisp.2013070102 (application/pdf)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:igg:jisp00:v:7:y:2013:i:3:p:16-35
Access Statistics for this article
International Journal of Information Security and Privacy (IJISP) is currently edited by Yassine Maleh
More articles in International Journal of Information Security and Privacy (IJISP) from IGI Global
Bibliographic data for series maintained by Journal Editor ().