dc.contributor.author | Paananen, Hanna | |
dc.contributor.author | Lapke, Michael | |
dc.contributor.author | Siponen, Mikko | |
dc.date.accessioned | 2019-10-07T11:16:42Z | |
dc.date.available | 2019-10-07T11:16:42Z | |
dc.date.issued | 2020 | |
dc.identifier.citation | Paananen, H., Lapke, M., & Siponen, M. (2020). State of the Art in Information Security Policy Development. <i>Computers and Security</i>, <i>88</i>, Article 101608. <a href="https://doi.org/10.1016/j.cose.2019.101608" target="_blank">https://doi.org/10.1016/j.cose.2019.101608</a> | |
dc.identifier.other | CONVID_32800681 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/65748 | |
dc.description.abstract | Despite the prevalence of research that exists under the label of “information security policies” (ISPs), there is no consensus on what an ISP means or how ISPs should be developed. This article reviews state-of-the-art ISP development by examining a diverse sample of literature on the subject. The definition and function of an ISP is studied first, revealing a rich tapestry of different notions behind the same term. When looking at the broad picture of the research on ISP development methods, we find different phases and levels of detail. Analyzing the different views on the content, context, and strategy alignment provides for further understanding on the complexity of the matter. As an outcome, we raise issues in ISP definitions and development methods that should be addressed in future research and practical applications. This review concludes that for state-of-the-art ISP development, the focus should shift more toward organization-specific information security needs, as the direction of the current research is still lacking contributions that would show how contextual factors could be successfully integrated into ISP development. | en |
dc.format.mimetype | application/pdf | |
dc.language | eng | |
dc.language.iso | eng | |
dc.publisher | Elsevier Advanced Technology | |
dc.relation.ispartofseries | Computers and Security | |
dc.rights | CC BY-NC-ND 4.0 | |
dc.subject.other | information security policy | |
dc.subject.other | literature review | |
dc.subject.other | policy development | |
dc.subject.other | development method | |
dc.subject.other | concept definition | |
dc.title | State of the Art in Information Security Policy Development | |
dc.type | review article | |
dc.identifier.urn | URN:NBN:fi:jyu-201910074330 | |
dc.contributor.laitos | Informaatioteknologian tiedekunta | fi |
dc.contributor.laitos | Faculty of Information Technology | en |
dc.type.uri | http://purl.org/eprint/type/JournalArticle | |
dc.type.coar | http://purl.org/coar/resource_type/c_dcae04bc | |
dc.description.reviewstatus | peerReviewed | |
dc.relation.issn | 0167-4048 | |
dc.relation.volume | 88 | |
dc.type.version | acceptedVersion | |
dc.rights.copyright | © 2019 Elsevier Ltd. | |
dc.rights.accesslevel | openAccess | fi |
dc.type.publication | article | |
dc.relation.grantnumber | 1732/31/2015 | |
dc.subject.yso | tietoturva | |
dc.subject.yso | kehittäminen | |
dc.subject.yso | käsiteanalyysi | |
dc.subject.yso | tietoturvapolitiikka | |
dc.format.content | fulltext | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p5479 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p4230 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p19406 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p25795 | |
dc.rights.url | https://creativecommons.org/licenses/by-nc-nd/4.0/ | |
dc.relation.doi | 10.1016/j.cose.2019.101608 | |
dc.relation.funder | TEKES | en |
dc.relation.funder | TEKES | fi |
jyx.fundinginformation | This research was partly funded by project grant from European regional development fund and Business Finland. | |
dc.type.okm | A2 | |