dc.contributor.advisor | Siponen, Mikko | |
dc.contributor.author | Wu, Shan | |
dc.date.accessioned | 2016-10-27T08:12:35Z | |
dc.date.available | 2016-10-27T08:12:35Z | |
dc.date.issued | 2016 | |
dc.identifier.other | oai:jykdok.linneanet.fi:1576632 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/51700 | |
dc.description.abstract | This thesis aims to have an overview of the current studies in the development of information security policy. The research is based on a systematical literature review. The study focuses on the development process of information security policy and other relevant issues in information security policy development within organizations. There are four research questions are proposed based on this topic: 1) what are the functions of information security policy; 2) what kind of stakeholders should be involved in the development of information security policy; 3) what is the information security policy lifecycle; 4) what are the methods in development of information security policy.
The research references were gathered based on a literature research searching strategy. There are eighty-three reference gathered include scientific papers, company documents, and actual information security policy documents used in organizations. A conceptual analyze in multiple dimensions is accomplished to answer the research questions. Key conceptual descriptions with similar opinions are gathered together for further processed.
The study summarized eight general functions which all the information security policy should achieve within an organization: represent the security strategy, plan the security requirements, define roles and responsibilities, define rules and protocols, state punishment, reduce risk, assist decision making, and provide the secured environment. Nine stakeholders should be involved in information security policy development phases: the user community, executive management, legal& regulatory, the ICT specialist, security specialists, human resources, business unit representatives, public unit representatives, public relations, and external representatives. A key outcome of this thesis is an integrated information security policy development lifecycle from twenty-nine development suggestions from different articles. According to the material analyzing, there are five development stages in information security policy development: formulate a security group, assessment, plan, deliver, and operate. Another essential contribution of this thesis is that the research gaps which should be fulfilled but missing in current research are pointed out for the future study. | en |
dc.format.extent | 1 verkkoaineisto (70 sivua) | |
dc.format.mimetype | application/pdf | |
dc.language.iso | eng | |
dc.rights | This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited. | en |
dc.rights | Julkaisu on tekijänoikeussäännösten alainen. Teosta voi lukea ja tulostaa henkilökohtaista käyttöä varten. Käyttö kaupallisiin tarkoituksiin on kielletty. | fi |
dc.subject.other | information security policy | |
dc.subject.other | development methods | |
dc.subject.other | development lifecycle | |
dc.subject.other | functions of information security policy | |
dc.subject.other | stakeholders of information security policy | |
dc.title | Review of the methods for the development of information security policies at organizations | |
dc.identifier.urn | URN:NBN:fi:jyu-201610274457 | |
dc.type.ontasot | Master’s thesis | en |
dc.type.ontasot | Pro gradu -tutkielma | fi |
dc.contributor.tiedekunta | Faculty of Information Technology | en |
dc.contributor.tiedekunta | Informaatioteknologian tiedekunta | fi |
dc.contributor.laitos | Tietojenkäsittelytieteiden laitos | fi |
dc.contributor.laitos | Department of Computer Science and Information Systems | en |
dc.contributor.yliopisto | University of Jyväskylä | en |
dc.contributor.yliopisto | Jyväskylän yliopisto | fi |
dc.contributor.oppiaine | Information Systems Science | en |
dc.contributor.oppiaine | Tietojärjestelmätiede | fi |
dc.date.updated | 2016-10-27T08:12:35Z | |
dc.rights.accesslevel | openAccess | fi |
dc.type.publication | masterThesis | |
dc.contributor.oppiainekoodi | 601 | |
dc.subject.yso | yritykset | |
dc.subject.yso | tietoturva | |
dc.subject.yso | tietoturvapolitiikka | |
dc.subject.yso | kehittäminen | |
dc.subject.yso | elinkaari | |
dc.format.content | fulltext | |
dc.type.okm | G2 | |