Näytä suppeat kuvailutiedot

dc.contributor.advisorSiponen, Mikko
dc.contributor.authorLindelä, Mika
dc.contributor.authorYlikauppila, Jonna
dc.date.accessioned2020-12-16T07:07:39Z
dc.date.available2020-12-16T07:07:39Z
dc.date.issued2020
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/73229
dc.description.abstractUnderstanding formation of corner stones of information security, implementation, state, reasoning and outcomes of actions in reality in organizations operations is vital. Individual perceptions over organizations information security, information security quality, importance and realization of quality information are key components of this research. Each individual within the company have possibility to impact its information security quality with ones actions, competence, awareness and experiences. Identification and understanding information security needs, perceptions and interpretations of individual’s leads researchers towards understanding how information security quality is formed within social system present in organization and its social sub-systems. Regulatory external factors obvious to organizations operating field relevant to information security can fail to appear within organizations strategy that is expected to lead the way. Instead organizational strategy, forced external factors can find other routes into organizations information security operations through forced regulatory activities that have more impact to the real-life information security assessment, assurance and practical actions. Methods of assessment and assurance can deliver quality information for the information security decision-making only if applied correctly and fit for the purpose. Individual interpretation of the data can lead either to biased information or towards quality information. Therefore competence and overall understanding of the information gathering method and the issue at hand is a must when interpreting information. Themed interviews are good method for information security quality assessment within social systems as those provide individuals perceptions of the overall situation and its pros and cons. The chain of administrative controls such as policies, risk management, guidelines and actual interpretation of desired standards can fail to deliver and lead to situations where individual competence and social systems plays major role in organizations information systems security. Good willed competent employees taking self-reliant actions to improve information security in their work and relevant social systems are heroes of the organizations information security implementation and actualization.en
dc.format.extent115
dc.format.mimetypeapplication/pdf
dc.language.isoen
dc.subject.othersocial systems
dc.titleInformation security quality assurance : quality information and social perceptions
dc.identifier.urnURN:NBN:fi:jyu-202012167174
dc.type.ontasotPro gradu -tutkielmafi
dc.type.ontasotMaster’s thesisen
dc.contributor.tiedekuntaInformaatioteknologian tiedekuntafi
dc.contributor.tiedekuntaFaculty of Information Technologyen
dc.contributor.laitosInformaatioteknologiafi
dc.contributor.laitosInformation Technologyen
dc.contributor.yliopistoJyväskylän yliopistofi
dc.contributor.yliopistoUniversity of Jyväskyläen
dc.contributor.oppiaineTietojärjestelmätiedefi
dc.contributor.oppiaineInformation Systems Scienceen
dc.rights.copyrightJulkaisu on tekijänoikeussäännösten alainen. Teosta voi lukea ja tulostaa henkilökohtaista käyttöä varten. Käyttö kaupallisiin tarkoituksiin on kielletty.fi
dc.rights.copyrightThis publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.en
dc.type.publicationmasterThesis
dc.contributor.oppiainekoodi601
dc.subject.ysotietoturva
dc.subject.ysolaatu
dc.subject.ysokyberturvallisuus
dc.subject.ysodata security
dc.subject.ysoquality
dc.subject.ysocyber security
dc.format.contentfulltext
dc.rights.accessrightsTekijä ei ole antanut lupaa avoimeen julkaisuun, joten aineisto on luettavissa vain Jyväskylän yliopiston kirjaston arkistotyösemalta. Ks. https://kirjasto.jyu.fi/fi/tyoskentelytilat/laitteet-ja-tilat..fi
dc.rights.accessrightsThe author has not given permission to make the work publicly available electronically. Therefore the material can be read only at the archival workstation at Jyväskylä University Library (https://kirjasto.jyu.fi/en/workspaces/facilities).en
dc.type.okmG2


Aineistoon kuuluvat tiedostot

Thumbnail

Aineisto kuuluu seuraaviin kokoelmiin

Näytä suppeat kuvailutiedot