Coherence in Control of Information Security (COINS)
2011 (English)Conference paper (Other academic)
The paper content is based on experiences from a study Feb. 2008 to Jan. 2011 on aspects how to implement (IPL) the information security (ISC) management (MGT) system standard (ISMS) objectives for Swedish governmental agencies' organizations. The following legend – being written contemporarily but independently of the study's final report – based on this author's experienced interpretation of meaning (MNG) and relevance – expressed through syntaxes (STX) the ISMS A5 … A15 control (CTR) objectives (OBJ). The acronyms sign inten-tions to be operationally (OPE) effectuated (ECT): The paper title associates with 'COINS' for efficient (EFY) use of available (ABY) funds for effective (ECT) abilities. Hence, abilities become treated as real assets (AST) to be authorized (ATH) for an enterprise's (EPR) princip-al executive (EXE) entity's (ETY) mission intentions as quality of service (QoS) performer. Then, the provider – customer 'conditional statement' relations being noted as [P|Q] about necessary/accompanied attributes or realities/imaginaries or affects/effects. Realities are measurable and hence easier for a provider (P) to get pay or credit for in mission trans-actions. But, to identify (IDY) realities it is often difficult, even for a QoS questioning (Q) part. The difficulties have its roots in more or less strength (STR), opportunity (OPU), weak-ness (WEK) or threatening (TRT) environmental events (EVT), culture, (CLT) ethic (ETH), laws or rules (LAW) and objectives (OBJ). The meanings (MNG) have to be messaged (MSG) in technical data communication (DCT) sessions about the OBJ realities; i.e., what QoS real-ties have to be effected (ECT) in when, where, by whom, how and why contexts (CXT). This is what the communicative information (INF) life cycle processes (LCP) deal with: Achieving ECT to get credit for in sustainable socio-technical (SoT) trustworthy Human Right (HUR) emphasizing relations for safety (SAF). Security (SEC) is treated as an achieved dependable SAF state through EFY in efforts to achieve keyword OBJ MNG ECT.
Place, publisher, year, edition, pages
University of Oulu , 2011.
Audit, Authorization, Cognition, Dependability, Account
Research subject Man-Machine-Interaction (MMI)
IdentifiersURN: urn:nbn:se:su:diva-67109OAI: oai:DiVA.org:su-67109DiVA: diva2:469534