• May 03, 2016 News! IJIET Vol. 5, No. 10 has been indexed by EI (Inspec).   [Click]
  • Oct 25, 2017 News!Vol. 7, No. 11 has been indexed by Crossref.
  • Oct 18, 2017 News!Vol. 7, No. 11 issue has been published online!   [Click]
General Information
    • ISSN: 2010-3689
    • Frequency: Bimonthly (2011-2014); Monthly (Since 2015)
    • DOI: 10.18178/IJIET
    • Editor-in-Chief: Prof. Dr. Steve Thatcher
    • Executive Editor: Ms. Nancy Y. Liu
    • Abstracting/ Indexing: EI (INSPEC, IET), Electronic Journals Library, Google Scholar, Crossref and ProQuest
    • E-mail: ijiet@ejournal.net
Editor-in-chief
Prof. Dr. Steve Thatcher
University of South Australia, Australia
It is my honor to be the editor-in-chief of IJIET. The journal publishes good papers which focous on the advanced researches in the field of information and education technology. Hopefully, IJIET will become a recognized journal among the scholars in the filed of information and education technology.
IJIET 2012 Vol.2(2): 94-102 ISSN: 2010-3689
DOI: 10.7763/IJIET.2012.V2.89

How to Model a Secure Information System (IS): A Case Study

Youseef Alotaibi and Fei Liu

Abstract—The existing information system (IS) developments methods are not met the requirements to resolve the security related (IS) problems and they fail to provide a successful integration of security and systems engineering during all development process stages. Hence, the security should be considered during the whole software development process and identified with the requirements specification. This paper aims to propose an integrated security and IS engineering approach in all software development process stages by using i* language. This proposed framework categorizes into three separate parts: modelling business environment part, modelling information technology system part and modelling IS security part. Booking hotel room management process is used as a case study to validate the proposed framework. The results show that considering security IS goals in the whole system development process can have a positive influence on system implementation and better meet business expectations.

Index Terms—Case study, information system, requirement engineering, software development process, security goals.

A. Y. Author is with La Trobe University, Bundoora, VIC, 3086, Australia (phone: +61 405099952; e-mail: yaalotaibi@students.latrobe.edu.au).
F. L. Author is with La Trobe University, Bundoora, VIC, 3086, Australia (phone: +61 3 9479 1949; e-mail: f.liu@latrobe.edu.au).

[PDF]

Cite: Youseef Alotaibi and Fei Liu, "How to Model a Secure Information System (IS): A Case Study," International Journal of Information and Education Technology vol. 2, no. 2, pp. 94-102, 2012.

Copyright © 2008-2017. International Journal of Information and Education Technology. All rights reserved.
E-mail: ijiet@ejournal.net