June 6, 2001By: Respickius Casmir1 Doctoral Thesis Title and Author A Systemic-Holistic Approach to Academic Programmes In IT Security Presented By Louise.

Slides:



Advertisements
Similar presentations
Critical Reading Strategies: Overview of Research Process
Advertisements

Critical Reading Strategies: Overview of Research Process
Poster & Project Presentations The Robert Gordon University
SETTINGS AS COMPLEX ADAPTIVE SYSTEMS AN INTRODUCTION TO COMPLEXITY SCIENCE FOR HEALTH PROMOTION PROFESSIONALS Nastaran Keshavarz Mohammadi Don Nutbeam,
A primer on teaching portfolios at CSU Rod Duncan School of Marketing and Management.
Introduction To System Analysis and Design
History, Theory, and Philosophy of Science (In SMAC + RT) 7th smester -Fall 2005 Institute of Media Technology and Engineering Science Aalborg University.
Knowledge Acquisitioning. Definition The transfer and transformation of potential problem solving expertise from some knowledge source to a program.
IMS1805 Systems Analysis Topic 3 (revisited and continued): Doing analysis – a ‘soft’ systems perspective.
introduction to MSc projects
Writing Reports: Identify these stages I) Obtaining a clear specification II) Research & preparation III) Report writing.
Problem Identification
Research Proposal Development of research question
Topics - Reading a Research Article Brief Overview: Purpose and Process of Empirical Research Standard Format of Research Articles Evaluating/Critiquing.
TERM PROJECT The Project usually consists of the following: Title
Common Core State Standards Professional Learning Module Series
9 1 Chapter 9 Database Design Database Systems: Design, Implementation, and Management, Seventh Edition, Rob and Coronel.
Allyn & Bacon 2003 Social Research Methods: Qualitative and Quantitative Approaches, 5e This multimedia product and its contents are protected.
Allyn & Bacon 2003 Social Work Research Methods: Qualitative and Quantitative Approaches Topic 3: What is the role of social work theory? Find.
Research Methods for Computer Science CSCI 6620 Spring 2014 Dr. Pettey CSCI 6620 Spring 2014 Dr. Pettey.
Business Communication Research Class 1 : What is Research? Leena Louhiala-Salminen, Spring 2013.
Medical Informatics Basics
Writing a Research Proposal
RSBM Business School Research in the real world: the users dilemma Dr Gill Green.
Chapter 10 Architectural Design
Ciarán O’Leary Wednesday, 23 rd September Ciarán O’Leary School of Computing, Dublin Institute of Technology, Kevin St Research Interests Distributed.
CONCEPT, THEORY, CASE Deciphering the Differences 1.
1 CS 456 Software Engineering. 2 Contents 3 Chapter 1: Introduction.
A structured approach to writing a successful thesis and completing your PhD within time: the 5 chapter thesis Dr. Terence Love Curtin Research Fellow.
Medical Informatics Basics
Reviewing the Standards for Mathematics and Statistics A progress report September 2009 Presented by Rhona Lever at the NZAMT Conference, on behalf of.
GRADUATE STUDIES: STUDENTS’ OBLIGATIONS AND EXPECTATIONS By Dr. Michael Wainaina Associate Dean, Graduate School.
Copyright © Allyn & Bacon 2008 Locating and Reviewing Related Literature Chapter 3 This multimedia product and its contents are protected under copyright.
CHAPTER 15, READING AND WRITING SOCIAL RESEARCH. Chapter Outline  Reading Social Research  Using the Internet Wisely  Writing Social Research  The.
Chapter 3 Copyright © Allyn & Bacon 2008 Locating and Reviewing Related Literature This multimedia product and its contents are protected under copyright.
Introduction To System Analysis and Design
Experimental Research Methods in Language Learning Chapter 1 Introduction and Overview.
1 Systems Analysis and Design in a Changing World, Thursday, January 18, 2007.
Introduction to Science Informatics Lecture 1. What Is Science? a dependence on external verification; an expectation of reproducible results; a focus.
ADS511 RESEARCH METHODOLOGY AND DATA ANALYSYS
Researcher’s Name School City, State.  Explain the background concepts that your audience needs to understand your research.  Describe why you chose.
Understanding the Parts of a Research Paper
ITEC0700/ NETE0501/ ISEC0502 Research Methodology#5 Suronapee Phoomvuthisarn, Ph.D.
From description to analysis
Copyright © Allyn & Bacon 2008 Intelligent Consumer Chapter 14 This multimedia product and its contents are protected under copyright law. The following.
Cat 2 Non Experimental Research Projects Day Competition 2009.
Developing Business Practice –302LON Critical thinking, reading and taking notes Unit: 4 Knowledgecast: 1.
Title Sub-Title Open Writing it up! The content of the report/essay/article.
Research for Nurses: Methods and Interpretation Chapter 1 What is research? What is nursing research? What are the goals of Nursing research?
1 RESEARCH METHODOLOGY FOR ED, BABM AND MBA STUDENTS PREPARED BY: MUKUNDA KUMAR.
1 Measuring Social Life Ch. 5, pp Measuring Social Life Connecting the specifics you observe in the empirical world to an abstract idea you.
Banaras Hindu University. A Course on Software Reuse by Design Patterns and Frameworks.
ABRA Week 3 research design, methods… SS. Research Design and Method.
Helpful hints for planning your Wednesday investigation.
© 2006 by The McGraw-Hill Companies, Inc. All rights reserved. 1 Chapter 1 Introduction to Research in Communication Research: –Process of asking questions.
Basic Concepts in Research According to : Jacinta Karen Juin P71697 For GGGB6013 KAEDAH PENYELIDIKAN 1 (TASK 1)
Chapter 9. The PlayMate System ( 2/2 ) in Cognitive Systems Monographs. Rüdiger Dillmann et al. Course: Robots Learning from Humans Summarized by Nan Changjun.
Project Report Format for Final Year Engineering Students.
HCS 465 OUTLET Experience Tradition /hcs465outlet.com FOR MORE CLASSES VISIT
© ITT Educational Services, Inc. All rights reserved. IS4680 Security Auditing for Compliance Unit 1 Information Security Compliance.
Chapter 4 Theoretical Foundations of Nursing Practice
Writing for Academic Journals
Title: Validating a theoretical framework for describing computer programming processes 29 November 2017.
Project proposal presentation Guidelines
Explaining the Methodology : steps to take and content to include
Presentation on CAPSTONE PROJECT presented by Cdr MD Masum-ul-Haque, (E), BN ME DEPT MILITARY INSTITUTE of SCIENCE and TECHNOLOGY (MIST)
Reading and Evaluating Research Reports
Presentation transcript:

June 6, 2001By: Respickius Casmir1 Doctoral Thesis Title and Author A Systemic-Holistic Approach to Academic Programmes In IT Security Presented By Louise Yngström Stockholm University, October 1996

June 6, 2001By: Respickius Casmir2 Overview Structural Organization Methodology & Approach used The Systemic-Holistic Model Adherence to Research and Reporting Guidelines Summary and Conclusion

June 6, 2001By: Respickius Casmir3 Structural Organization Comprises of 6 Chapters Chapter 1: Problem, Idea & Approach Chapter 2: Thoughts & Background Chapter 3: Systemic-Holistic Model Chapter 4: Two Educational Programmes Chapter 5: Interdisciplinary & Holistic Chapter 6: Suggestions for further studies

June 6, 2001By: Respickius Casmir4 Structural Organization The research Problem The Thesis attempts to discuss some of the problems associated with how to understand the concept of Security in relation to IT –A problem of language –Confidentiality, Integrity & Availability –Information vs Data –IT Security Criteria, etc

June 6, 2001By: Respickius Casmir5 Structural Organization Study Rationale The reason for undertaking this research was to try and find the best way to address or define the aspects of IT Security Centrally, hence to get rid of the confusions and Misunderstandings in grasping Security. Also to develop an Interdisciplinary IT Security Model

June 6, 2001By: Respickius Casmir6 Structural Organization Hypothesis “The subjective models produced through General Systems Theory and Cybernetics make students understand IT security banking problems, although their practical banking experiences are restricted to being customers”

June 6, 2001By: Respickius Casmir7 Structural Organization The students, with theoretical and practical backgrounds from computing, business and libraries, used the concepts of general systems and Cybernetics to transform objective models into subjective models useful also for understanding problems involved with IT Security.

June 6, 2001By: Respickius Casmir8 Structural Organization She used “System” as an epistemological device to describe organisms as wholes, and showed that it could be generalised and applied to wholes of any kind Cybernetics is a philosophy and a science concerned with the control or regulation of information flow within and between systems, whether human or machine.

June 6, 2001By: Respickius Casmir9 Methodology & Approach used Action-oriented and explorative approach The work included the design, implementation and evaluations of courses and programmes, their content and structure, theory, methodology and approach. It is both Qualitative & Quantitative

June 6, 2001By: Respickius Casmir10 The Systemic-Holistic Model In 1970’s Computer Science and Law took initiative to regulate the development, use, operation, and management of safe and secure IT structures

June 6, 2001By: Respickius Casmir11 The Systemic-Holistic Model Although both areas were driven by the technical developments and the new applications made, developments of regulatory and protective measurements and mechanisms were initially conducted in parallel, rather than interactively, between computer science and law.

June 6, 2001By: Respickius Casmir12 The Systemic-Holistic Model The model relies on three main building blocks: General Systems Theory including Cybernetics ( Ontological & Epistemological ) Soft System Methodology ( Engineering or hard systems thinking & Systemic or Soft systems thinking) - Problems Solved by systematic methods & Systemic methods respectively General Living Systems Theory ( Ontological entity)

June 6, 2001By: Respickius Casmir13 The Systemic-Holistic Model Context Orientation (geographical/space and time bound “system point” Level of abstraction (Design/architecture, Theory/model, Physical construction Content subject areas (Technical and Non-technical aspects) Fig. 1: Overview of the framework and methodology for Security Informatics - the Systemic-Holistic Model Systemic Module -an epistemological device -meta-science -criteria for control

June 6, 2001By: Respickius Casmir14 The Systemic-Holistic Model Information Security Administrative (Procedural security) IT Security ADP (Computer security) Communications security Fig. 2: The Definition of Information Security [ITS 1994, p. 7]

June 6, 2001By: Respickius Casmir15 The Systemic-Holistic Model An interdisciplinary area encompassing theories and methods for secure handling of information within organizations or technical systems. The area also contains the use of information technology as means for security and safety in social, socio- technical, and technical environments [ITS 1994, p. 14] Security Informatics was defined as:

June 6, 2001By: Respickius Casmir16 The Systemic-Holistic Model Schoderbek defined the concept “System” as “A set of objects together with relationships between the objects and between their attributes related to each other and to their environment so as to form a whole” [ Schoderbek et al p. 13 ]

June 6, 2001By: Respickius Casmir17 The Systemic-Holistic Model InputsProcessesOutputs Feedback Controls To Environment and other Systems System’s boundary Fig. 3: An open system [Schoderbek et al p. 25]

June 6, 2001By: Respickius Casmir18 Adherence to Research and Reporting Guidelines The author has adhered to the research and reporting guidelines in that: Clearly defined a problem Stated the hypothesis Stated the research rationale Chapters well organized Simple and understandable language

June 6, 2001By: Respickius Casmir19 Adherence to Research and Reporting Guidelines Defined all key terminology Evidence communicated Visually –Tables –Charts –Graphs, and –Figures

June 6, 2001By: Respickius Casmir20 Summary and Conclusion The Model is based on Cybernetics and general systems theories It consists of a framework & epistemology Taken together they are called the “Systemic-Holistic Model. When in use, it is called the “Systemic- Holistic Approach”

June 6, 2001By: Respickius Casmir21 End of Presentation Thank you all!