Information security policy development : considering the practices of making rules
Information security policies (ISPs) are at the core of organizations’ information security efforts. They set objectives for protecting information assets and direct employees to achieve these goals. Advice for ISP development is available both in research and best practice literature. A common approach to describing ISP development is a lifecycle model that depicts inputs such as assessments, the ISP creation, and outputs that are implemented and maintained until the cycle starts again. However, ISP development needs to be planned to support the business requirements by adapting the method and the resulting policy to fit the context. The rules that are created in this process must be well considered so that employees are able to follow them in their daily work without conflicts with their other duties.
This dissertation presents an action research study on ISP development. Its theoretical base is constructed around the idea that the ISP subject is a moral thinker who will make decisions about complying with rules by weighing options to reach the best possible results. This has implications for the ISP development process. The policy developers must be able to critically assess the alternatives for new rules based on their knowledge of the operations of the organization. In the study, the researcher helped a consultant firm to reconfigure their ISP development service to one that serves the client organization’s information security needs better. A set of 11 critical considerations were introduced to support critical thinking during the development process. They were based on previous research and needs expressed by companies. The critical considerations were used to highlight issues in the ISP development that needed new practices to foster critical thinking. During four cycles of action research, new practices were formed in the ISP development process to improve the gathering of facts and employee opinions in the client organization.
This dissertation contributes to the current research on ISP development by presenting a way to convert general guidelines to local practices. The critical considerations can be used to further study the success of ISP development, and they can be easily implemented by practitioners in new contexts
...
Publisher
Jyväskylän yliopistoISBN
978-951-39-9297-2ISSN Search the Publication Forum
2489-9003Metadata
Show full item recordCollections
- JYU Dissertations [859]
- Väitöskirjat [3583]
License
Related items
Showing items with similar title or keywords.
-
Review of the methods for the development of information security policies at organizations
Wu, Shan (2016)This thesis aims to have an overview of the current studies in the development of information security policy. The research is based on a systematical literature review. The study focuses on the development process of ... -
Developing Organization-Specific Information Security Policies by using Critical Thinking
Kinnunen, Hanna; Siponen, Mikko (Association for Information Systems, 2018) -
State of the Art in Information Security Policy Development
Paananen, Hanna; Lapke, Michael; Siponen, Mikko (Elsevier Advanced Technology, 2020)Despite the prevalence of research that exists under the label of “information security policies” (ISPs), there is no consensus on what an ISP means or how ISPs should be developed. This article reviews state-of-the-art ... -
National Policies that Connect ICT-Based Education Reform to Economic and Social Development
Kozma, Robert B. (University of Jyväskylä, Agora Center, 2005)Information and communication technology (ICT) is a principal driver of economic development and social change, worldwide. In many countries, the need for economic and social development is used to justify investments ... -
Abductive innovations in information security policy development : an ethnographic study
Niemimaa, Marko; Niemimaa, Elina (Taylor & Francis, 2019)Developing organisational information security (InfoSec) policies that account for international best practices but are contextual is as much an opportunity for improving InfoSec as it is a challenge. Previous research ...