Title: Security policy model for an MIS designed for the defence sector

Authors: Fotios Petropoulos, Elli Pagourtzi, Nikolaos Bougioukos, Konstantinos Nikolopoulos, Vassilios Assimakopoulos

Addresses: Forecasting Systems Unit, School of Electrical & Computer Engineering, National Technical University of Athens, 9 Iroon Polytexneiou Str., Zografou, 15780, Greece. ' Forecasting Systems Unit, School of Electrical & Computer Engineering, National Technical University of Athens, 9 Iroon Polytexneiou Str., Zografou, 15780, Greece. ' Forecasting Systems Unit, School of Electrical & Computer Engineering, National Technical University of Athens, 9 Iroon Polytexneiou Str., Zografou, 15780, Greece. ' Department of Economics, University of Peloponnese, Tripolis, 22100, Greece; Forecasting Systems Unit, School of Electrical & Computer Engineering, National Technical University of Athens, 9 Iroon Polytexneiou Str., Zografou, 15780, Greece. ' Ministry of Economy and Finance, 5-7 Nikis Str., 10180, Athens, Greece; Forecasting Systems Unit, School of Electrical & Computer Engineering, National Technical University of Athens, 9 Iroon Polytexneiou Str., Zografou, 15780, Greece

Abstract: The design of a management information system (MIS) for the purposes of a defence industry could be rather difficult and complex as the managed data are of prime importance for the strategic planning of the country. Therefore, a large amount of parameters should be considered in order to build a solid and proof system with a specific security policy and standards. This paper studies the design and the security policy for a MIS referring to an industry specialised in the repair of telecommunication parts for the Ministry of Defence.

Keywords: security policy; standards; management information systems; MIS; defence industry; services; strategic planning; telecommunications repair.

DOI: 10.1504/IJSS.2008.020056

International Journal of Services and Standards, 2008 Vol.4 No.4, pp.407 - 414

Published online: 22 Aug 2008 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article