University of Waterloo Centre for Information Integrity & Information Systems Assurance

2012 ◽  
Vol 13 (3) ◽  
pp. 182-183
2020 ◽  
Vol 6 (2) ◽  
pp. 66-71
Author(s):  
Alexander V. Pushkarev ◽  
Sergei N. Novikov

The relevance of the work lies in the fact that the number of information systems with optical communication channels is increasing. However, for such systems, the optimal method for ensuring the integrity of information has not been identified. The purpose of the work is to identify the best method for ensuring the integrity of information in information systems with optical communication channels. This article discusses methods for ensuring the integrity of information at the stages of storage and transmission of information. The main method for ensuring the integrity of information at the storage stage is the data backup method. Parallel information transfer is the main method at the stage of information transfer. As a result of the study, the following conclusion was made: to ensure maximum security of information integrity, it is necessary to apply an integrated approach and use immediately both data backup and protection methods at the stage of information transfer.


2019 ◽  
Vol 17 (1) ◽  
pp. 87-97 ◽  
Author(s):  
Simon Rogerson ◽  
Keith W. Miller ◽  
Jenifer Sunrise Winter ◽  
David Larson

Purpose The purpose of this paper is to explore the ethical issues surrounding information systems (IS) practice with a view to encouraging greater involvement in this aspect of IS research. Information integrity relies upon the development and operation of computer-based information systems. Those who undertake the planning, development and operation of these information systems have obligations to assure information integrity and overall to contribute to the public good. This ethical dimension of information systems has attracted mixed attention in the IS academic discipline. Design/methodology/approach The authors are a multidisciplinary team providing a rich, diverse experience which includes professional and information ethics, management information systems, software engineering, data repositories and information systems development. Each author has used this experience to review the IS ethics landscape, which provides four complimentary perspectives. These are synthesised to tease out trends and future pointers. Findings It is confirmed that there is a serious lack of research being undertaken relating to the ethical dimension of the Information Systems field. There is limited crossover between the well-established multidisciplinary community of Computer Ethics research and the traditional Information Systems research community. Originality/value An outline framework is offered which could provide an opportunity for rich and valuable dialogue across the two communities. This is proposed as the starting point for a proactive research and practice action plan for information systems ethics.


1984 ◽  
Vol 1 (1) ◽  
pp. 175-185
Author(s):  
Michael E. D. Koenig

2020 ◽  
Vol 64 (1) ◽  
pp. 6-16 ◽  
Author(s):  
Sarah M. Meeßen ◽  
Meinald T. Thielsch ◽  
Guido Hertel

Abstract. Digitalization, enhanced storage capacities, and the Internet of Things increase the volume of data in modern organizations. To process and make use of these data and to avoid information overload, management information systems (MIS) are introduced that collect, process, and analyze relevant data. However, a precondition for the application of MIS is that users trust them. Extending accounts of trust in automation and trust in technology, we introduce a new model of trust in MIS that addresses the conceptual ambiguities of existing conceptualizations of trust and integrates initial empirical work in this field. In doing so, we differentiate between perceived trustworthiness of an MIS, experienced trust in an MIS, intentions to use an MIS, and actual use of an MIS. Moreover, we consider users’ perceived risks and contextual factors (e. g., autonomy at work) as moderators. The introduced model offers guidelines for future research and initial suggestions to foster trust-based MIS use.


Sign in / Sign up

Export Citation Format

Share Document