Agile Security For Information Warfare: A Call For Research

The context of information security is changing dramatically. Networking technologies have driven the global expansion of electronic commerce. Electronic commerce is increasingly engaging sophisticated advances like digital agents and web services. As a result of such advances, the information systems architectures that must be secured are becoming dynamic: shifting landscapes of changing vulnerabilities. At the same time, the threats in these landscapes are also becoming more sophisticated and dynamic. Information warfare is raising the stakes in information security by leveling intensive and highly novel threats against civilian systems. Information security researchers need to develop organizational approaches and methodologies that respond to this new context. The conflation of information warfare and short cycle development theories promises new information security practices. These approaches and methodologies would effectively lead to agile information security development. Agile information security development anticipates threats and rapidly deploys necessary safeguards in the context of shifting systems landscapes amid pervasive systems threats.

[1]  Richard Baskerville,et al.  Growing systems in an emergent organization , 2001 .

[2]  Francisco J. Varela Two Principles for Self-Organization , 1984 .

[3]  Gerald L. Kovacich,et al.  Everything You Wanted to Know about Information Warfare but Were Afraid to Ask, Part 1 , 2002, Inf. Secur. J. A Glob. Perspect..

[4]  Jan Pries-Heje,et al.  Short cycle time systems development , 2004, Inf. Syst. J..

[5]  Ashish Garg,et al.  Quantifying the financial impact of IT security breaches , 2003, Inf. Manag. Comput. Secur..

[6]  Steven Walczak Information security for agent‐based WWW medical information retrieval , 2002 .

[7]  Jan H. P. Eloff,et al.  TOPM: a formal approach to the optimization of information technology risk management , 1994, Comput. Secur..

[8]  Jacobus E. van der Merwe,et al.  Electronic commerce with secure intelligent trade agent , 1997, ICICS.

[9]  Mikko T. Siponen,et al.  An Analysis of the Recent IS Security Development Approaches: Descriptive and Prescriptive Implications , 2001 .

[10]  Richard Baskerville,et al.  Growing systems in emergent organizations , 1999, CACM.

[11]  Gordon A. Manson,et al.  An intelligent approach to prevent distributed systems attacks , 2002, Inf. Manag. Comput. Secur..

[12]  Dorothy E. Denning,et al.  Information Warfare And Security , 1998 .

[13]  Kathy Crilley Information warfare: new battle fields Terrorists, propaganda and the Internet , 2001 .

[14]  W. Bergquist,et al.  The Postmodern Organization: Mastering the Art of Irreversible Change , 1993 .

[15]  Richard Baskerville,et al.  Deep structure or emergence theory: contrasting theoretical foundations for information systems development , 1998, Inf. Syst. J..

[16]  L. Crombie,et al.  Everything you wanted to know about … , 1982, Nature.

[17]  Gilles Van Nederveen Stray Voltage: War in the Information Age , 2005 .

[18]  Sebastiaan H. von Solms,et al.  Refereed paper: Electronic commerce with secure intelligent trade agents , 1998 .

[19]  M. Vatis Cyber Attacks During the War on Terrorism: A Predictive Analysis , 2001 .

[20]  Neelam Bhalla Is the mouse click mighty enough to bring society to its knees? , 2003, Comput. Secur..

[21]  Bruce D. Berkowitz,et al.  The New Face of War: How War Will Be Fought in the 21st Century , 2003 .

[22]  Alistair Cockburn,et al.  Agile Software Development , 2001 .

[23]  Jan Pries-Heje,et al.  Is Internet-Speed Software Development Different? , 2003, IEEE Softw..

[24]  Richard Baskerville,et al.  Amethodical systems development: the deferred meaning of systems development methods , 2000 .