-9- Persistence of Techno-Centrism

Fundamental Conceptions Of Information As Applied to Identity Logistics – Chapter 9. © Carlos Trigoso 2012-2013 The Fundamental Conceptions In several places in this book I described the Four Security Perspectives, a model which guides my work in Security and Identity management. The fact there are four aspects may not be surprising for IT specialists, … Continue reading -9- Persistence of Techno-Centrism

-6- The Cloud Transforms the Network

Fundamental Conceptions Of Information As Applied to Identity Logistics – Chapter 6. © Carlos Trigoso 2012-2013Identity in the CloudThe rise of Cloud Computing in the recent past is history repeating itself. This is often the case in the technology markets, where old concepts reappear wrapped in funny names and marketing campaigns. In the case of … Continue reading -6- The Cloud Transforms the Network

-5- Identity Services and Programme Delivery

Fundamental Conceptions Of Information As Applied to Identity Logistics – Chapter 5. © Carlos Trigoso 2012-2013Surveying the Landscape of FailureThis is perhaps the most difficult chapter of this book, not because of the theories involved, and also not because it reveals conceptual problems in the Security disciplines (which we have covered to some extent), but … Continue reading -5- Identity Services and Programme Delivery

-4- The Context: Identity becomes Data

Fundamental Conceptions Of Information As Applied to Identity Logistics – Chapter 4. © Carlos Trigoso 2012-2013Data-Centric SecuritySecurity architects and practitioners need to develop an integrated data model that will enable end-to-end user management and access control. I proposed this approach in 2006 and advocated a data model that could become the basis for the next … Continue reading -4- The Context: Identity becomes Data

-3- Security and Information: Access Management

Fundamental Conceptions Of Information As Applied to Identity Logistics – Chapter 3. © Carlos Trigoso 2012-2013Dependency of Information SecurityIn our study of Information Security and Identity Management the most important idea should be “information,” not “security.” Security is the predicate of information: we say that information is “secure,” not that we practice some security “for” … Continue reading -3- Security and Information: Access Management

-2- Freeing Security from “Risk Avoidance”

Fundamental Conceptions Of Information As Applied to Identity Logistics – Chapter 2. © Carlos Trigoso 2012-2013A Key IssueA key issue for all organisations is the result or “value” gained from their investments.i This is especially relevant considering the large proportion of capital investments that go each year to information technologies.ii In the 1980s researchers found … Continue reading -2- Freeing Security from “Risk Avoidance”

-1- Security as a Problem

Fundamental Conceptions Of Information As Applied to Identity Logistics – Chapter 1. © Carlos Trigoso 2012-2013Approach to Security ManagementThis book brings together many years of work in the IT and Security industry in public and private organisations. My experience and research have revealed several interlinked problems that result in low quality and performance levels in … Continue reading -1- Security as a Problem

-7- Quantitative Identity Management

Fundamental Conceptions Of Information As Applied to Identity Logistics – Chapter 7. © Carlos Trigoso 2012-2013Information value and flowAs Identity becomes data with the global changes in Information Technology and organisational transformation, so the emphasis moves from Identity as a security item, to performing Identity data exchanges. It is a commonly accepted notion that information … Continue reading -7- Quantitative Identity Management

-10 – The Cloud Transition

Fundamental Conceptions Of Information As Applied to Identity Logistics – Chapter 10. © Carlos Trigoso 2012-201310.The Cloud TransitionSecurity Arguments are PhilosophicalHow moral is a technical dilemma? How technical can a moral argument be? Philosophical questions are rare in Security-focused debates unless people are trying to make a “political” point, i.e. a critical point about technical … Continue reading -10 – The Cloud Transition