dc.contributor.author | Larno, Sara | |
dc.contributor.author | Seppänen, Ville | |
dc.contributor.author | Nurmi, Jarkko | |
dc.date.accessioned | 2019-11-08T10:42:16Z | |
dc.date.available | 2019-11-08T10:42:16Z | |
dc.date.issued | 2019 | |
dc.identifier.citation | Larno, S., Seppänen, V., & Nurmi, J. (2019). Method Framework for Developing Enterprise Architecture Security Principles. <i>Complex Systems Informatics and Modeling Quarterly</i>, <i>117</i>(20), 57-71. <a href="https://doi.org/10.7250/csimq.2019-20.03" target="_blank">https://doi.org/10.7250/csimq.2019-20.03</a> | |
dc.identifier.other | CONVID_33484934 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/66269 | |
dc.description.abstract | Organizations need to consider many facets of information security in their daily operations – among others, the rapidly increasing use of IT, emerging technologies and digitalization of organizations’ core resources provoke new threats that can be difficult to anticipate. It has been argued that the security and privacy considerations should be embedded in all the areas of organizational activities instead of only relying technical security mechanisms provided by the underlying systems and software. Enterprise Architecture Management (EAM) offers a holistic approach for managing different dimensions of an organization, and can be conceived as a coherent and consistent set of principles that guide how the enterprise must be designed. This article contributes with a method framework for integrating information security with EAM, aimed at providing support for the decision-making related to formulating context-aware EA security principles. The presented method framework is a result of a constructive research based on both the theoretical body of knowledge and the empirical evidence, obtained by interviewing 35 Finnish EA and information security practitioners. | en |
dc.format.mimetype | application/pdf | |
dc.language | eng | |
dc.language.iso | eng | |
dc.publisher | RTU Press | |
dc.relation.ispartofseries | Complex Systems Informatics and Modeling Quarterly | |
dc.relation.uri | https://csimq-journals.rtu.lv/article/view/csimq.2019-20.03 | |
dc.rights | CC BY 4.0 | |
dc.subject.other | enterprise architecture management | |
dc.subject.other | enterprise architecture principle | |
dc.subject.other | information security | |
dc.subject.other | information security policy | |
dc.subject.other | method framework | |
dc.subject.other | constructive research | |
dc.title | Method Framework for Developing Enterprise Architecture Security Principles | |
dc.type | article | |
dc.identifier.urn | URN:NBN:fi:jyu-201911084787 | |
dc.contributor.laitos | Informaatioteknologian tiedekunta | fi |
dc.contributor.laitos | Faculty of Information Technology | en |
dc.contributor.oppiaine | Tietojärjestelmätiede | fi |
dc.contributor.oppiaine | Information Systems Science | en |
dc.type.uri | http://purl.org/eprint/type/JournalArticle | |
dc.type.coar | http://purl.org/coar/resource_type/c_2df8fbb1 | |
dc.description.reviewstatus | peerReviewed | |
dc.format.pagerange | 57-71 | |
dc.relation.issn | 2255-9922 | |
dc.relation.numberinseries | 20 | |
dc.relation.volume | 117 | |
dc.type.version | publishedVersion | |
dc.rights.copyright | © 2019 Sara Larno et al | |
dc.rights.accesslevel | openAccess | fi |
dc.subject.yso | kokonaisarkkitehtuuri | |
dc.subject.yso | tietoturva | |
dc.subject.yso | yritykset | |
dc.subject.yso | tietoturvapolitiikka | |
dc.subject.yso | tietojärjestelmät | |
dc.format.content | fulltext | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p20654 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p5479 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p3128 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p25795 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p3927 | |
dc.rights.url | https://creativecommons.org/licenses/by/4.0/ | |
dc.relation.doi | 10.7250/csimq.2019-20.03 | |
dc.type.okm | A1 | |