Designing information systems security
Designing information systems security
Critical issues in information systems research
Four paradigms of information systems development
Communications of the ACM
An Ontological Model of an Information System
IEEE Transactions on Software Engineering
Information systems security design methods: implications for information systems development
ACM Computing Surveys (CSUR)
Information systems development and data modeling: conceptual and philosophical foundations
Information systems development and data modeling: conceptual and philosophical foundations
A practical solution to the complex human issues of information security design
Information systems security
How responsibility modelling leads to security requirements
NSPW '92-93 Proceedings on the 1992-1993 workshop on New security paradigms
Modelling data secrecy and integrity
Data & Knowledge Engineering
UML distilled (2nd ed.): a brief guide to the standard object modeling language
UML distilled (2nd ed.): a brief guide to the standard object modeling language
Survivability—a new technical and business perspective on security
Proceedings of the 1999 workshop on New security paradigms
Towards OLAP security design — survey and research issues
Proceedings of the 3rd ACM international workshop on Data warehousing and OLAP
COPS: A model and infrastructure for secure and fair electronic markets
Decision Support Systems - Special issue for business to business electronic commerce, issues and solutions
Software Engineering
A New Paradigm for Adding Security Into IS Development Methods
Proceedings of the IFIP TC11 WG11.1/WG11.2 Eigth Annual Working Conference on Advances in Information Security Management & Small Systems Security
Proceedings of the IFIP WG8.1 Working Conference on Methods and Associated Tools for the Information Systems Life Cycle
Managing Information Security in Healthcare - an Action Research Experience
Proceedings of the IFIP TC11 Fifteenth Annual Working Conference on Information Security for Global Information Infrastructures
Redefining Information Systems Security: Viable Information Systems
IFIP/Sec '01 Proceedings of the IFIP TC11 Sixteenth Annual Working Conference on Information Security: Trusted Information: The New Decade Challenge
A Paradigmatic Analysis Contrasting Information Systems Development Approaches and Methodologies
Information Systems Research
Research Commentary: Information Systems and Conceptual Modeling--A Research Agenda
Information Systems Research
Modeling Secure and Fair Electronic Commerce
ACSAC '98 Proceedings of the 14th Annual Computer Security Applications Conference
Using Abuse Case Models for Security Requirements Analysis
ACSAC '99 Proceedings of the 15th Annual Computer Security Applications Conference
Towards Security Semantics in Workflow Management
HICSS '98 Proceedings of the Thirty-First Annual Hawaii International Conference on System Sciences-Volume 7 - Volume 7
Abuse-Case-Based Assurance Arguments
ACSAC '01 Proceedings of the 17th Annual Computer Security Applications Conference
Eliciting security requirements with misuse cases
Requirements Engineering
Representing levels of abstraction to facilitate the Secure Multidimensional Modeling
ARES '06 Proceedings of the First International Conference on Availability, Reliability and Security
An analysis of the traditional IS security approaches: implications for research and practice
European Journal of Information Systems
Secure-System Design Methods: Evolution and Future Directions
IT Professional
Viewing business-process security from different perspectives
International Journal of Electronic Commerce - Special issue: Developing the business components of the digital economy
Developing secure data warehouses with a UML extension
Information Systems
A Dynamic Framework for Classifying Information Systems Development Methodologies and Approaches
Journal of Management Information Systems
Integrating security and systems engineering: towards the modelling of secure information systems
CAiSE'03 Proceedings of the 15th international conference on Advanced information systems engineering
Secure Systems Development with UML
Secure Systems Development with UML
Introducing mitigation use cases to enhance the scope of test cases
IWSEC'10 Proceedings of the 5th international conference on Advances in information and computer security
Hi-index | 0.00 |
Information system development (ISD) methods lack security features. To address this problem, various secure information system (SIS) design methods have been proposed. An important feature of these methods is modeling support, which manifests itself through modeling notations. This paper explores the extent to which the alternative SIS design methods offer modeling support. The results suggest that extant SIS design methods provide only limited modeling support. No single SIS design method offers comprehensive modeling support. This result has implications for practice and research. Practitioners may need to combine different SIS design methods for the development of secure information systems (IS). In turn, scholars and SIS design method developers should ensure that future SIS design methods offer comprehensive modeling support. Finally, empirical studies should be conducted to explore the usability of the current conceptual models of secure systems design methods in practice.