By Topic

An Investigation of the Design and Implementation Flaws of Information Systems Security Models

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
Nicholas L. Norfolk ; Department of Information Science, University of Arkansas at Little Rock, 2801 S. University Ave., Little Rock, AR 72204,

Research has been conducted that has separately evaluated the qualitative and quantitative aspects of information systems security models. This split in methodology has caused a problem for both technical and nontechnical people. Since research has been done neglecting critical aspects of models, further investigation and experimentation is needed to pinpoint design and implementation flaws in information systems security models. This investigation is aimed at understanding different design and implementation flaws of models, including, but not limited to, the following: technical, economic, and human aspects. Collectively, these findings will not only highlight the problems in the models, but also lead to a better understanding of the models as a whole. This information can then be used to create a framework for a model that will overcome the flaws of existing models by being practical and robust. Thus, it will be a legitimate application in the information security world.

Published in:

Region 5 Technical Conference, 2007 IEEE

Date of Conference:

20-22 April 2007