Information security goals in a Swedish hospital

One of the problems highlighted within the area of information security is that internatonal standards are implemented in organisations without adopting them to special organisational settings. Thi ...

[1]  R. Baskerville,et al.  An information security meta‐policy for emergent organizations , 2002 .

[2]  H. Davies,et al.  Implementing culture change in health care: theory and practice. , 2003, International journal for quality in health care : journal of the International Society for Quality in Health Care.

[3]  Rose-Mharie Åhlfeldt,et al.  Information Security in a Distributed Healthcare Domain : Exploring the Problems and Needs of Different Healthcare Providers , 2006 .

[4]  Rossouw von Solms,et al.  Management of risk in the information age , 2005, Comput. Secur..

[5]  Gurpreet Dhillon,et al.  Technical opinion: Information system security management in the new millennium , 2000, CACM.

[6]  Detmar W. Straub,et al.  Effective IS Security: An Empirical Study , 1990, Inf. Syst. Res..

[7]  Per Oscarson,et al.  Actual and Perceived Information Systems Security , 2007 .

[8]  Jack Tsai,et al.  A comparison of electronic records to paper records in mental health centers. , 2007, International journal for quality in health care : journal of the International Society for Quality in Health Care.

[9]  G. Dhillon Managing information system security , 1997 .

[10]  R. Solms,et al.  Cultivating an organizational information security culture , 2006 .

[11]  Gurpreet Dhillon,et al.  Principles of information systems security - text and cases , 2006 .

[12]  Edward H. Freeman Holistic Information Security: ISO 27001 and Due Care , 2007, Inf. Secur. J. A Glob. Perspect..

[13]  Karin Hedström,et al.  The values of IT in elderly care , 2007, Inf. Technol. People.

[14]  Sebastiaan H. von Solms,et al.  Information Security - The Third Wave? , 2000, Comput. Secur..

[15]  Rossouw von Solms,et al.  Towards an Information Security Competence Maturity Model , 2006 .

[16]  Sebastiaan H. von Solms,et al.  Information Security - The Fourth Wave , 2006, Comput. Secur..

[17]  Jean-Noël Ezingeard,et al.  Anchoring information security governance research: sociological groundings and future directions , 2006 .

[18]  Rossouw von Solms,et al.  From policies to culture , 2004, Comput. Secur..

[19]  Rossouw von Solms,et al.  From information security to ... business security? , 2005, Comput. Secur..

[20]  Richard Baskerville,et al.  A New Paradigm for Adding Security Into IS Development Methods , 2001, Conference on Information Security Management & Small Systems Security.

[21]  Eric S. K. Yu,et al.  Modeling organizations for information systems requirements engineering , 1993, [1993] Proceedings of the IEEE International Symposium on Requirements Engineering.

[22]  Rossouw von Solms,et al.  Towards information security behavioural compliance , 2004, Comput. Secur..

[23]  Gurpreet Dhillon,et al.  Value‐focused assessment of information system security in organizations , 2006, Inf. Syst. J..

[24]  James M. Anderson,et al.  Why we need a new definition of information security , 2003, Comput. Secur..

[25]  Rolf Moulton,et al.  Applying information security governance , 2003, Comput. Secur..