Information systems security design methods

  • Baskerville R
N/ACitations
Citations of this article
8Readers
Mendeley users who have this article in their library.

Abstract

The security of information systems is a serious issue because computer abuse is increasing. It is important, therefore, that systems analysts and designers develop expertise in methods for specifying information systems security. The characteristics found in three generations of general information system design methods provide a framework for comparing and understanding current security design methods. These methods include approaches that use checklists of controls, divide functional requirements into engineering partitions, and create abstract models of both the problem and the solution. Comparisons and contrasts reveal that advances in security methods lag behind advances in general systems development methods. This analysis also reveals that more general methods fail to consider security specifications rigorously.

Cite

CITATION STYLE

APA

Baskerville, R. (1993). Information systems security design methods. ACM Computing Surveys, 25(4), 375–414. https://doi.org/10.1145/162124.162127

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free