Reference Hub1
Analyzing Information Security Goals

Analyzing Information Security Goals

Ella Kolkowska, Karin Hedström, Fredrik Karlsson
ISBN13: 9781466609785|ISBN10: 1466609788|EISBN13: 9781466609792
DOI: 10.4018/978-1-4666-0978-5.ch005
Cite Chapter Cite Chapter

MLA

Kolkowska, Ella, et al. "Analyzing Information Security Goals." Threats, Countermeasures, and Advances in Applied Information Security, edited by Manish Gupta, et al., IGI Global, 2012, pp. 91-110. https://doi.org/10.4018/978-1-4666-0978-5.ch005

APA

Kolkowska, E., Hedström, K., & Karlsson, F. (2012). Analyzing Information Security Goals. In M. Gupta, J. Walp, & R. Sharman (Eds.), Threats, Countermeasures, and Advances in Applied Information Security (pp. 91-110). IGI Global. https://doi.org/10.4018/978-1-4666-0978-5.ch005

Chicago

Kolkowska, Ella, Karin Hedström, and Fredrik Karlsson. "Analyzing Information Security Goals." In Threats, Countermeasures, and Advances in Applied Information Security, edited by Manish Gupta, John Walp, and Raj Sharman, 91-110. Hershey, PA: IGI Global, 2012. https://doi.org/10.4018/978-1-4666-0978-5.ch005

Export Reference

Mendeley
Favorite

Abstract

One of the problems highlighted within the area of information security is that international standards are implemented in organisations without adopting them to special organisational settings. In this chapter the authors analyse information security goals found in hospital settings. They found that the CIA-triad fails to cover organisational specific information security goals in hospital settings. They found also that information security goals held by information security managers and business managers are not the same, implying that both these groups should be involved in designing of information security goals, in order to find information security goals relevant for the organisation. Finally, the authors found goal maps used in this study for analysis of empirical data, to be a useful tool for analysis and communication of information security goals in an organisation.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.