Change search
ReferencesLink to record
Permanent link

Direct link
Coherence in Control of Information Security (COINS)
Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
2011 (English)Conference paper (Other academic)
Abstract [en]

The paper content is based on experiences from a study Feb. 2008 to Jan. 2011 on aspects how to implement (IPL) the information security (ISC) management (MGT) system standard (ISMS) objectives for Swedish governmental agencies' organizations. The following legend – being written contemporarily but independently of the study's final report – based on this author's experienced interpretation of meaning (MNG) and relevance – expressed through syntaxes (STX) the ISMS A5 … A15 control (CTR) objectives (OBJ). The acronyms sign inten-tions to be operationally (OPE) effectuated (ECT): The paper title associates with 'COINS' for efficient (EFY) use of available (ABY) funds for effective (ECT) abilities. Hence, abilities become treated as real assets (AST) to be authorized (ATH) for an enterprise's (EPR) princip-al executive (EXE) entity's (ETY) mission intentions as quality of service (QoS) performer. Then, the provider – customer 'conditional statement' relations being noted as [P|Q] about necessary/accompanied attributes or realities/imaginaries or affects/effects. Realities are measurable and hence easier for a provider (P) to get pay or credit for in mission trans-actions. But, to identify (IDY) realities it is often difficult, even for a QoS questioning (Q) part. The difficulties have its roots in more or less strength (STR), opportunity (OPU), weak-ness (WEK) or threatening (TRT) environmental events (EVT), culture, (CLT) ethic (ETH), laws or rules (LAW) and objectives (OBJ). The meanings (MNG) have to be messaged (MSG) in technical data communication (DCT) sessions about the OBJ realities; i.e., what QoS real-ties have to be effected (ECT) in when, where, by whom, how and why contexts (CXT). This is what the communicative information (INF) life cycle processes (LCP) deal with: Achieving ECT to get credit for in sustainable socio-technical (SoT) trustworthy Human Right (HUR) emphasizing relations for safety (SAF). Security (SEC) is treated as an achieved dependable SAF state through EFY in efforts to achieve keyword OBJ MNG ECT.

Place, publisher, year, edition, pages
University of Oulu , 2011.
Keyword [en]
Audit, Authorization, Cognition, Dependability, Account
National Category
Information Systems
Research subject
Man-Machine-Interaction (MMI)
URN: urn:nbn:se:su:diva-67109OAI: diva2:469534
Session G1.3Available from: 2011-12-26 Created: 2011-12-26

Open Access in DiVA

fulltext(432 kB)67 downloads
File information
File name FULLTEXT01.pdfFile size 432 kBChecksum SHA-512
Type fulltextMimetype application/pdf

By organisation
Department of Computer and Systems Sciences
Information Systems

Search outside of DiVA

GoogleGoogle Scholar
Total: 67 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

Total: 28 hits
ReferencesLink to record
Permanent link

Direct link