dc.contributor.advisor | Siponen, Mikko | |
dc.contributor.author | Lindelä, Mika | |
dc.contributor.author | Ylikauppila, Jonna | |
dc.date.accessioned | 2020-12-16T07:07:39Z | |
dc.date.available | 2020-12-16T07:07:39Z | |
dc.date.issued | 2020 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/73229 | |
dc.description.abstract | Understanding formation of corner stones of information security, implementation, state, reasoning and outcomes of actions in reality in organizations operations is vital. Individual perceptions over organizations information security, information security quality, importance and realization of quality information are key components of this research. Each individual within the company have possibility to impact its information security quality with ones actions, competence, awareness and experiences. Identification and understanding information security needs, perceptions and interpretations of individual’s leads researchers towards understanding how information security quality is formed within social system present in organization and its social sub-systems. Regulatory external factors obvious to organizations operating field relevant to information security can fail to appear within organizations strategy that is expected to lead the way. Instead organizational strategy, forced external factors can find other routes into organizations information security operations through forced regulatory activities that have more impact to the real-life information security assessment, assurance and practical actions. Methods of assessment and assurance can deliver quality information for the information security decision-making only if applied correctly and fit for the purpose. Individual interpretation of the data can lead either to biased information or towards quality information. Therefore competence and overall understanding of the information gathering method and the issue at hand is a must when interpreting information. Themed interviews are good method for information security quality assessment within social systems as those provide individuals perceptions of the overall situation and its pros and cons. The chain of administrative controls such as policies, risk management, guidelines and actual interpretation of desired standards can fail to deliver and lead to situations where individual competence and social systems plays major role in organizations information systems security. Good willed competent employees taking self-reliant actions to improve information security in their work and relevant social systems are heroes of the organizations information security implementation and actualization. | en |
dc.format.extent | 115 | |
dc.format.mimetype | application/pdf | |
dc.language.iso | en | |
dc.subject.other | social systems | |
dc.title | Information security quality assurance : quality information and social perceptions | |
dc.identifier.urn | URN:NBN:fi:jyu-202012167174 | |
dc.type.ontasot | Pro gradu -tutkielma | fi |
dc.type.ontasot | Master’s thesis | en |
dc.contributor.tiedekunta | Informaatioteknologian tiedekunta | fi |
dc.contributor.tiedekunta | Faculty of Information Technology | en |
dc.contributor.laitos | Informaatioteknologia | fi |
dc.contributor.laitos | Information Technology | en |
dc.contributor.yliopisto | Jyväskylän yliopisto | fi |
dc.contributor.yliopisto | University of Jyväskylä | en |
dc.contributor.oppiaine | Tietojärjestelmätiede | fi |
dc.contributor.oppiaine | Information Systems Science | en |
dc.rights.copyright | Julkaisu on tekijänoikeussäännösten alainen. Teosta voi lukea ja tulostaa henkilökohtaista käyttöä varten. Käyttö kaupallisiin tarkoituksiin on kielletty. | fi |
dc.rights.copyright | This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited. | en |
dc.type.publication | masterThesis | |
dc.contributor.oppiainekoodi | 601 | |
dc.subject.yso | tietoturva | |
dc.subject.yso | laatu | |
dc.subject.yso | kyberturvallisuus | |
dc.subject.yso | data security | |
dc.subject.yso | quality | |
dc.subject.yso | cyber security | |
dc.format.content | fulltext | |
dc.rights.accessrights | Tekijä ei ole antanut lupaa avoimeen julkaisuun, joten aineisto on luettavissa vain Jyväskylän yliopiston kirjaston arkistotyösemalta. Ks. https://kirjasto.jyu.fi/fi/tyoskentelytilat/laitteet-ja-tilat.. | fi |
dc.rights.accessrights | The author has not given permission to make the work publicly available electronically. Therefore the material can be read only at the archival workstation at Jyväskylä University Library (https://kirjasto.jyu.fi/en/workspaces/facilities). | en |
dc.type.okm | G2 | |