Abstract
The paper discusses forms and structures for an international doctoral program with specialization in information security and information assurance based on an analysis of international educational efforts in the area 1995–2003. The presentation underlines the need for holistic approaches to the IT security area and presents, as an example, the Systemic-Holistic Approach, SHA.
Chapter PDF
Similar content being viewed by others
References
Abrams, Marshall D., Symbiosis Among IT Security Standatds, policies, and Criteria, in Seizer, R., Yngström, L., Kaspersen, H. and Fisher-Hubner, S. (eds) Security and Control of Information Technology in Society, IFIP Transactions A-34, North-Holland, 1994, pp.145–159
Armstrong, H., Yngström, L., (eds) Linking government, industry and academia to raise information security awareness, education and training in an age of cybercrime, Proceedings of IFIP TC11/WG11.8 Second World Conference on Information Security Education, 12–14 July, 2001, Perth, Australi, Edith Cowan University and IFIP 2001, ISBN 0-7298-0498-4
Beer, S., Cybernetics and Management, John Wiley & Sons, 1964.
Beer, Stafford, Cybernetics and Management, Science Edition, John Wiley, New York, 1968.
Beer, S., The heart of the enterprise, John Wiley & Sons, 1979.
Checkland, P.B., Images of Systems and the Systems Image, Presidential address to ISGSR, June 1987, Journal of Applied Systems Analysis, Vol 15, 1988, pp. 37–42.
Armstrong H., (Fillery-James H.L.) A Soft Approach to Management of information Security, PhD thesis, School of Public Health, Curtin university of Technology, Australia, 1999
Hoffman, Lance J., Reducing Society’s Vulnerability as Computers and Networks Proliferate, The George Washington University, Institute for Information Science and Technology GWU-IIST-92-19, 1992.
Hofstadter, Douglas R., Gödel, Escher, Bach: an eternal golden braid. A Metaphorical fugue on minds and machines in the spirit of Lewis Carroll, Penguin Books, Harvester Press Ltd, 1979.
Irvine, C., Armstrong, H., (eds) Security Education and Critical Infrastructure, Proceedings of IFIP TC11/WG11. 8 Third Annual World Conference on Information Security Education (WISE3), June 26–28, 2003, Monterey, California, USA, Kluwer Academic Publishers, 2003
Kjellman A., Sociocybernetics-the path to a science of becoming, presented at the 3rd Int. Conf. On Sociocybernetics in Leon, Mexico, June 2001
Kjellman, A., Constructive Systems Science-the only remaining alternative?, PhD thesis, Department of Computer and Systems Sciences, Stockholm University, 2003, DSV report serie 03.014
Laufer, R.: Cybernetics, Legitimacy and Society, in Yngström, L., Sizer, R., Berleur, J., Laufer, R., eds., Can Information Technology result in Benevolent Bureaucracies? Proceedings of the IFIP TC9/WG9.2 Working Conference, Namur, Belgum, 3–6 January, 1985, North-Holland, 1985, pp. 29–42.
Laufer, Romain, The Question of the Legimitacy of the Computer: An Epistemological Point of view, in Berleur, J., Clement, A., Sizer, R., Whitehouse, D., eds., The Information Society: Evolving Landscapes, Springer Verlag & Captus University Publications, 1990, pp. 31–61.
Miller, James G., Living Systems, McGrawHill, 1978.
Siponen, M., Designing Secure Information Systems and Software. Critical evaluation of the existing approaches and a new paradigm, PhD Theisi, Faculty of Science, University of Oulu, Finland, ISBN 951-42-6789-3
Truex, D, Baskerville, R., Travis, J., Amethodical Systems Development: The Deferred Meaning of Systems Development Methods, pre-copy to be printed in Accounting, Management and Information Technologies, 1999.
von Bertalanffy, L., Main Currents in Modern Thoughts, in Yearbook of the Society for General Systems Research, Vol 1, 1956.
von Bertalanffy, L., General Systems Theory, Braziller, 1968.
Wiener, N., Cybernetics or Control and Communication in the Animal and Machine, John Wiley & Sons, 1948.
Yngström, L., A Systemic Holistic Approach to Academic programmes in IT Security, PhD thesis, Department of Computer and Systems Sciences, Stockholm University, DSV report serie 96-021, 1996 (CC).
Yngström, L. Preface in Yngström, L., Fischer-Hubner, S., (eds) WISE1 Proceedings of IFIP TC11 WG11.8 First World Conference on Information Security Education, 17–19 June 1999, Kista, Sweden. DSV and IFIP ISBN 91-7153-910-7, pp. v–vii
Yngström, L., Fischer-Hubner, S., (eds) WISE1 Proceedings of IFIP TC11 WG11.8 First World Conference on Information Security Education, 17–19 June 1999, Kista, Sweden. DSV and IFIP ISBN 91-7153-910-7
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer Science + Business Media, Inc.
About this paper
Cite this paper
Yngström, L. (2004). An Holistic Approach to an International Doctoral Program. In: Deswarte, Y., Cuppens, F., Jajodia, S., Wang, L. (eds) Information Security Management, Education and Privacy. IFIP International Federation for Information Processing, vol 148. Springer, Boston, MA. https://doi.org/10.1007/1-4020-8145-6_8
Download citation
DOI: https://doi.org/10.1007/1-4020-8145-6_8
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4020-8144-6
Online ISBN: 978-1-4020-8145-3
eBook Packages: Springer Book Archive