Document Type

Conference Proceeding


School of Computer and Information Science, Edith Cowan University


Faculty of Computing, Health and Science


School of Computer and Information Science




This is an Author's Accepted Manuscript of: Kasinath, G. , & Armstrong, L. (2007). Importance of verification and validation of data sources in attaining information superiority. Proceedings of Australian Information Security Management Conference. (pp. 127-134). Perth. School of Computer and Information Science, Edith Cowan University.


Information superiority has been defined as a state that is achieved when a competitive advantage is derived from the ability to exploit a superior information position. To achieve such a superior information position enterprises and nations, alike, must not only collect and record correct, accurate, timely and useful information but also ensure that information recorded is not lost to competitors due to lack of comprehensive security and leaks. Further, enterprises that aim to attain information superiority must also ensure mechanisms of validating and verifying information to reduce the chances of mis-information. Although, research has been carried out into ways to increase the security of information and detect leaks, not enough focus has been given to the key elements of information, namely data and context. This paper outlines the importance of data in contributing to information superiority and highlights the lack of data centric approach in attaining information superiority. The paper also discusses the importance of verification and back tracking of information to ascertain the data, its source and context in validating information for its correctness, validity and accuracy. A brief list of consequences of information leaks is also provided in the document to emphasize the importance of information security in the context of data collected. Further, this paper examines the McCumber model, which outlines the various states and elements of information, to accommodate a data centric, quantitative approach. Outlining simple protocols for verification of data in the information superiority context, this paper also highlights a few steps that can be taken to verify the sources of data.

Access Rights