Nothing Special   »   [go: up one dir, main page]

Skip to main content

Security and Privacy of Information Technology Management Systems

  • Living reference work entry
  • First Online:
Encyclopedia of Education and Information Technologies
  • 140 Accesses

Synonyms

Data protection

Definition

Information security is usually defined as a feature of information systems management which involves three main aspects, named confidentiality, integrity, and availability (Lov om behandling 2000; ISO/IEC 27002:2005 2005; ISO/IEC 27000:2009 2009). Usually, quality is included as a fourth aspect of information security, although it can be considered as overlapping with integrity. The following is a brief definition of these items: (a) Confidentiality is the guarantee that information is not made available or disclosed to unauthorized persons, entities, or processes; (b) integrity relates to the trustworthiness of the information, thus assuring that data has not been deliberately tampered with, nor accidentally changed; (c) availability means that information is accessible and can be utilized upon demand by an authorized entity; and (d) quality refers to the information being correct and not misleading. Among the aforementioned aspects,...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  • Akbaba-Altun S, Gürer MD (2008) School administrators’ perceptions of their roles regarding information technology classrooms. Eurasian J Educ Res 33:35–54

    Google Scholar 

  • Brockmeier LL, Sermon JM, Hope WC (2005) Principals’ relationship with computer technology. NASSP Bull 89(643):45–63

    Article  Google Scholar 

  • CAP Gemini (2000) Factbook of information technology. Aranzadi & Thomson, Navarra

    Google Scholar 

  • Culhane D, Fantuzzo J, Hill M, Burnett TC (2018) Maximizing the use of integrated data systems: understanding the challenges and advancing solutions. Ann Am Acad Pol Soc Sci 675(1):221–239

    Article  Google Scholar 

  • Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. The European Parliament and the Council of the European Union; 1995. http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:31995L0046:EN:HTML. Accessed 15 Nov 2017

  • Health Insurance Portability and Accountability Act of 1996 (HIPAA). US Department of Health & Human Services; 1996. http://aspe.hhs.gov/admnsimp/pl104191.htm. Accessed 15 Nov 2017

  • Henriksen E, Burkow TM, Johnsen E, Vognild LK (2013) Privacy and information security risks in a technology platform for home-based chronic disease rehabilitation and education. BMC Med Inform Decis Mak 13:85

    Article  Google Scholar 

  • ISO/IEC 27002:2005 (2005) Information technology – security techniques – code of practice for information security controls. International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC), http://www.iso.org/iso/catalogue_detail?csnumber=50297. Accessed 14 Jan 2018

  • ISO/IEC 27000:2009 (2009) Information technology – security techniques – information security management systems – overview and vocabulary. International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC), http://www.iso.org/iso/catalogue_detail?csnumber=41933. Accessed 14 Jan 2018

  • Lov om behandling av personopplysninger [personopplysningsloven]. (Norwegian Act of 14 April 2000 no. 31 relating to the processing of personal data [Personal Data Act]). Det norske justis- og beredskapsdepartement (Norway’s Ministry of Justice and Public Security) (2000). http://www.lovdata.no/all/hl-20000414-031.html (English version: http://www.ub.uio.no/ujur/ulovdata/lov-20000414-031-eng.pdf). Accessed 26 Feb 2018

  • Schwartz PM (2004) Property, privacy, and personal data. Harv Law Rev 117(7):2055–2128

    Article  Google Scholar 

  • Weng CH, Tang Y (2014) The relationship between technology leadership strategies and effectiveness of school administration: an empirical study. Comput Educ 76:91–107

    Article  Google Scholar 

  • Wilk A (2016) Cyber security education and law. In: Proceedings – 2016 IEEE international conference on software science, technology and engineering, Article number 7515415, IEEE, Beer-Sheva, Israel, https://doi.org/10.1109/SWSTE.2016.21, pp 94–103

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Javier Osorio .

Editor information

Editors and Affiliations

Section Editor information

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Osorio, J., Nieves, J. (2019). Security and Privacy of Information Technology Management Systems. In: Tatnall, A. (eds) Encyclopedia of Education and Information Technologies. Springer, Cham. https://doi.org/10.1007/978-3-319-60013-0_122-1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-60013-0_122-1

  • Received:

  • Accepted:

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-60013-0

  • Online ISBN: 978-3-319-60013-0

  • eBook Packages: Springer Reference Computer SciencesReference Module Computer Science and Engineering

Publish with us

Policies and ethics