Analysis of the Next Evolution of Security Audit Criteria
Nykänen, R., Kelo, T., & Kärkkäinen, T. (2023). Analysis of the Next Evolution of Security Audit Criteria. Journal of Information Warfare, 22(4), 25-39. https://www.jinfowar.com/journal/volume-22-issue-4/analysis-next-evolution-security-audit-criteria
Julkaistu sarjassa
Journal of Information WarfarePäivämäärä
2023Tekijänoikeudet
© 2024 the Authors
Security assessments are performed for multiple reasons, including compliance with the information security regulation. Amongst other objectives, regulatory requirements are created to increase the resilience of national infrastructure and protect against information and cybersecurity threats. When the regulatory requirements are revised, the security audit criteria also need to be updated and validated. This was also the case with the Julkri, criteria developed for the conformance assessments of the renewed Finnish information security regulation. In this article, a comparative evaluation based on Design Science Research is performed to determine whether the new Julkri criteria improve existing criteria and control catalogues.
Julkaisija
ArmisteadTECISSN Hae Julkaisufoorumista
1445-3312Asiasanat
Alkuperäislähde
https://www.jinfowar.com/journal/volume-22-issue-4/analysis-next-evolution-security-audit-criteriaJulkaisu tutkimustietojärjestelmässä
https://converis.jyu.fi/converis/portal/detail/Publication/207657282
Metadata
Näytä kaikki kuvailutiedotKokoelmat
Lisenssi
Samankaltainen aineisto
Näytetään aineistoja, joilla on samankaltainen nimeke tai asiasanat.
-
Measuring users' level of information security awareness : research and development of sample questions
Mäkitalo, Hermanni (2017)Tämän gradun tarkoituksena on käsiteanalyysin avulla hahmottaa tärkeimpiä omaisuuksia tietoturvatietoisuudesta ja tavoista levittää sitä, tutustua niihin tarkemmin, ja muodostaa näistä perusteltuja ja käyttäjille olennaisia ... -
Common Misunderstandings of Deterrence Theory in Information Systems Research and Future Research Directions
Siponen, Mikko; Soliman, Wael; Vance, Anthony (ACM, 2022)In the 1980s, information systems (IS) borrowed deterrence theory (DT) from the field of criminology to explain information security behaviors (or intention). Today, DT is among the most commonly used theories in IS security ... -
Immersive Virtual Reality Education Application : Four Development Iterations along Design Science Research Methodology
Holopainen, Jani; Lähtevänoja, Antti; Tuunanen, Tuure (University of Hawaii at Manoa, 2022)This study introduces a research and development process of an immersive Virtual Reality (VR) education application. Altogether four application development iterations are showcased along the Design Science Research ... -
The Design Science Research Process : A Model for Producing and Presenting Information Systems Research
Peffers, Ken; Tuunanen, Tuure; Gengler, Charles E.; Rossi, Matti; Hui, Wendy; Virtanen, Ville; Bragge, Johanna (Claremont Graduate University, 2006)The authors design and demonstrate a process for carrying out design science (DS) research in information systems and demonstrate use of the process to conduct research in two case studies. Several IS researchers have ... -
Design science research genres : introduction to the special issue on exemplars and criteria for applicable design science research
Peffers, Ken; Tuunanen, Tuure; Niehaves, Björn (Taylor and Francis, 2018)We propose the definition of genres in IS design science research (DSR). In recent years DSR has become a well-accepted research paradigm within IS; however, now the diversity of purpose, methodology, and mental models has ...
Ellei toisin mainittu, julkisesti saatavilla olevia JYX-metatietoja (poislukien tiivistelmät) saa vapaasti uudelleenkäyttää CC0-lisenssillä.