Skip to main content Accessibility help
×
Hostname: page-component-77c89778f8-sh8wx Total loading time: 0 Render date: 2024-07-17T04:23:30.735Z Has data issue: false hasContentIssue false

5 - Pathways to integrating technical, legal and economic considerations in the design, development and deployment of trusted IM systems

Published online by Cambridge University Press:  08 June 2018

Scott David
Affiliation:
works at the intersections of law and technology, where theory informs practice.
Barbara Endicott-Popovsky
Affiliation:
is Executive Director of the Center for Information Assurance and Cybersecurity at the University of Washington
Get access

Summary

Introduction: the IM problem and solution landscape

This chapter suggests that networked IM (information management) challenges of security, privacy and risk/liability are just symptoms of a single condition. That single condition is the lack of agreement by stakeholders. This condition is acute, since networked IM systems (the ‘cloud’) operate as distributed, socio-technical systems, i.e. those that simultaneously serve and are constituted from both people and technology acting in concert. However, IM systems are typically designed, developed and deployed as if they were systems composed solely of technology and as if the problems with their operation could be fixed by technology alone. This ignores the people operating IM solutions, causing their destabilization.

Technology solutions are a natural focus because their performance is more readily measurable than that of people and institutions. Unfortunately, like the man who is looking for his lost wristwatch only under the streetlight because that is where the light is better, we are unlikely to find the solutions we are looking for just because they are more readily apparent. The actions of individuals and institutions in networked IM systems, not the technology, are the source of most current security, privacy and risk/liability concerns, and focus on technology alone does not adequately address the system operational variables that arise from human behaviours engaged in by IM system stakeholders. That blind spot is revealed through consideration of the fact that the vast majority of data breaches are the result of human, rather than technological, factors. Technological fixes alone are insufficient for improving socio-technical systems where human negligence and intentional misconduct are the chief causes of lack of system integrity. We all need socio-technical processes to evolve socio-technical systems. Markets and other formal and informal rule-making processes generate enforceable ‘agreements’ among people that also reduce risk and offer an additional solution space for networked IM.

The big strides in improving security and privacy, and the introduction of measures to mitigate liability will allow stakeholders to develop their own performance standards which can be measured meaningfully and provide feedback that can be used to police both technological and human failure in systems.

Type
Chapter
Information
Is Digital Different?
How information creation, capture, preservation and discovery are being transformed
, pp. 95 - 128
Publisher: Facet
Print publication year: 2015

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×