in all of the frameworks. On the one hand, it can be
said that the evaluated frameworks cannot support the
risk management of application systems in integrated
care networks. However, on the other hand, a transfer
to a network view would be worthwhile due to the
high autonomy of participants in these networks, for
which e. g. ISO 27005 is an adequate guideline.
Further research needs to focus on two aspects:
Firstly, the scenario presented should be completed
by investigating the risk management of the second
hospital and the network itself as well as matching
this with the presented results. Secondly, the findings
of this paper could improve the design process to
develop a risk management framework focussing on
(integrated care) networks. Therefore, strengths of
established frameworks need to be combined and
extended by the requirements provided. A
combination of ISO’s clear structure supplemented
by detailed explanations from COBIT and ITIL’s best
practices could be a good basis.
As a fully integrated IT enables integrated care
concepts, a helpful framework for inter-
organisational care networks can lead to improved
care supply, not only in Germany.
ACKNOWLEDGEMENTS
I thank Hannes Schlieter for his feedback on the topic
and Jeannette Stark for helping me improving the
paper.
REFERENCES
Agrawal, R. C. (2009). Risk Management. ABD Publishers.
Alreemy, Z., Chang, V., Walters, R., & Wills, G. (2016).
Critical success factors (CSFs) for information
technology governance (ITG). International Journal of
Information Management, 36(6), 907–916.
Amelung, V., Hildebrandt, H., & Wolf, S. (2012).
Integrated care in Germany—A stony but necessary
road! International Journal of Integrated Care, 12(1),
1–5.
AXELOS. (2013). ITIL Service Design. The Stationery
Office, London.
Bannerman, P. L. (2008). Risk and risk management in
software projects: A reassessment. Journal of Systems
and Software, 81(12), 2118–2133. https://doi.org/
10.1016/j.jss.2008.03.059
Bistarelli, S., Fioravanti, F., Peretti, P., & Santini, F. (2012).
Evaluation of complex security scenatios using defence
trees and economic indexes. Journal of Experimental &
Theroretical Artificial Intelligence, 24(2), 161–192.
Bogenstahl, C. (2012). Management von Netzwerken: Eine
Analyse der Gestaltung interorganisationaler
Leistungsaustauschbeziehungen. Gabler.
BSI. (2011). IT-Grundschutz: Gefährdungskataloge.
Bundesamt Für Sicherheit in Der Informationstechnik.
https://www.bsi.bund.de/DE/Themen/ITGrundschutz/I
TGrundschutzKataloge/Inhalt/_content/g/g00/g00.htm
l
De Haes, S., Van Grembergen, W., & Debreceny, R. S.
(2013). COBIT 5 and Enterprise Governance of
Information Technology: Building Blocks and
Research Opportunities. Journal of Information
Systems, 27(1), 307–324. https://doi.org/10.2308/isys-
50422
European Commission. (2017). ANNEX to the European
Interoperability Framework—Implementation Strategy
COM (2017) 134 final.
Fenz, S., Heurix, J., Neubauer, T., & Pechstein, F. (2014).
Current challenges in information security risk
management. Information Management & Computer
Security, 22(5), 410–430.
Ferstl, O. K., & Sinz, E. J. (2013). Grundlagen der
Wirtschaftsinformatik. Oldenbourg Verlag.
Gaulke, M. (2014). Praxiswissen COBIT - Grundlagen und
praktische Anwendung in der Unternehmens-IT.
dpunkt. Verlag.
Gröne, O., Garcia-Barbero, M., & WHO European Office
for Integrated Health Care Services. (2001). Integrated
care: A position paper of the WHO European Office for
Integrated Health Care Services. International Journal
of Integrated Care
, 1, e21–e21. PubMed.
Häfner, C., & Felden, C. (2009). Building a framework for
an efficient IT governance (Vol. 231). Techn. Univ.
Berakademie.
Henriksen, E., Burkow, T., Johnsen, E., & Vognild, L.
(2013). Privacy and information security risks in a
technology platform for home-based chronic desease
rehabilitation and education. BMC Medical Informatics
and Decision Making, 13(85), 1–13.
ISACA. (2012). COBIT 5—A Business Framework for the
Governance and Management of Enterprise IT.
ISO. (2011). International Standard ISO/IEC
27005:2011(E)—Information technology; Security
techniques; Information security risk management.
Johnston, R. H., & Vitale, M. R. (1988). Creating
Competitive Advantage With Interorganizational
Information Systems. MIS Quarterly, 12(2), 153–165.
Koch, O. (2005). Unterstützung von einrichtungsüber-
greifenden Kommunikationsprozessen in der
integrierten Gesundheitsversorgung. In
Telemedizinführer Deutschland (pp. 106–109).
Mayring, P. (2000). Qualitative Content Analysis. Forum:
Qualitative Social Research, 2(1), 1–10.
Raupp, M. (2002). Informationsmanagement und
strategische Unternehmensführung. Lang.
Sahibudin, S., Sharifi, M., & Ayat, M. (2008). Combining
ITIL, COBIT and ISO/IEC 27002 in Order to Design a
Comprehensive IT Framework in Organizations. 749–
753.