The 5 waves of Information Security - From Kristian Beckman to the present

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

11 Citations (Scopus)

Abstract

This paper gives an overview of the development of Information Security from the early 1980s up to the present time. The paper makes use of two papers by the author, Information Security - the Third Wave (von Solms, 2000) and Information Security - the Fourth Wave (von Solms, 2006), as well as a paper in preparation, Information Security - The Fifth Wave (von Solms, 2010). In the paper in 2000, the First Wave of Information Security was defined as lasting up to the early 1980s. In May 1983 the First International Conference on Information Security (IFIP/Sec 83) took place in Sweden, and was organized by Kristian Beckman. Kristian Beckman was subsequently elected as the first Chairperson of the newly created Technical Committee 11 of IFIP. He died in 1984. Kristian Beckman can therefore be seen to have lived during the First Wave of Information Security, which provides the motivation for the sub title of this paper.

Original languageEnglish
Title of host publicationSecurity and Privacy - Silver Linings in the Cloud - 25th IFIP TC 11 International InformationSecurity Conference, SEC 2010 Held as Part of WCC 2010, Proceedings
Pages1-8
Number of pages8
DOIs
Publication statusPublished - 2010
Event25th IFIP TC 11 International Information Security Conference, SEC 2010 - Brisbane QLD, Australia
Duration: 20 Sept 201023 Sept 2010

Publication series

NameIFIP Advances in Information and Communication Technology
Volume330
ISSN (Print)1868-4238

Conference

Conference25th IFIP TC 11 International Information Security Conference, SEC 2010
Country/TerritoryAustralia
CityBrisbane QLD
Period20/09/1023/09/10

Keywords

  • Information Security
  • Kristian Beckman

ASJC Scopus subject areas

  • Information Systems
  • Computer Networks and Communications
  • Information Systems and Management

Fingerprint

Dive into the research topics of 'The 5 waves of Information Security - From Kristian Beckman to the present'. Together they form a unique fingerprint.

Cite this