Henkilöstön motivoinnin keinot tieturvapolitiikan vahvistamiseksi

Organisaatiot joutuvat enenevässä määrin suojautumaan niiden tietojärjes-telmiin kohdistuvilta uhilta. Pelkät tekniset suojausratkaisut eivät kuitenkaan riitä, sillä henkilöstö saattaa tahattomasti tai tahallisesti kiertää nämä tietoturva-työkalut helpottaakseen omaa työtään. Organisaation tietoturv...

Full description

Bibliographic Details
Main Author: Salmi, Niko
Other Authors: Informaatioteknologian tiedekunta, Faculty of Information Technology, Informaatioteknologia, Information Technology, University of Jyväskylä, Jyväskylän yliopisto
Format: Bachelor's thesis
Language:fin
Published: 2015
Subjects:
Online Access: https://jyx.jyu.fi/handle/123456789/46330
_version_ 1826225813599551488
author Salmi, Niko
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology University of Jyväskylä Jyväskylän yliopisto
author_facet Salmi, Niko Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology University of Jyväskylä Jyväskylän yliopisto Salmi, Niko Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology University of Jyväskylä Jyväskylän yliopisto
author_sort Salmi, Niko
datasource_str_mv jyx
description Organisaatiot joutuvat enenevässä määrin suojautumaan niiden tietojärjes-telmiin kohdistuvilta uhilta. Pelkät tekniset suojausratkaisut eivät kuitenkaan riitä, sillä henkilöstö saattaa tahattomasti tai tahallisesti kiertää nämä tietoturva-työkalut helpottaakseen omaa työtään. Organisaation tietoturvapolitiikka pyr-kii estämään nämä tahattomat työkalujen kiertämiset antamalla henkilöstölle ohjenuorat, joita seuraamalla he voivat turvata käsittelemänsä tiedon. Tietotur-vapolitiikan suurimpana ongelmana on se, ettei sitä noudateta henkilöstön toi-mesta, jolloin tulevaisuudessa tärkeäksi osaksi tietoturvan johtamista muodos-tuu henkilöstön motivointi tietoturvapolitiikan noudattamiseen. Tämä tutkiel-ma keräsi kirjallisuudesta viisi eri motivoinnin osa-aluetta, joihin tietoturvajoh-tamisen tulisi tulevaisuudessa keskittyä: koulutus, valvonta, organisaation kult-tuurin muokkaaminen, palkkiot ja rangaistukset. Näiden osa-alueiden ymmär-täminen ja implementointi organisaation toimintaan varmistaa henkilöstön mo-tivoinnin onnistumisen ja sitä kautta tietoturvan kehittymisen. Organizations have to protect their information assets from outsider threats. Sadly technical solutions don’t provide enough protection, as the organizations’ employees tend to turn them off. The information security policy tries to stop the employees from turning off the technical security tools. This is done by giv-ing them information and precepts of how to protect the information they have access to. The biggest problem with the information security policy is that the employees don’t follow it. Employee non-compliance increases the future need of compliance management in organizations. By studying the corresponding literature this thesis was able to point out five sections that these compliance managers should focus on: training, surveillance, improving organization cul-ture, rewards and sanctions. By understanding and implementing these sec-tions to the organization’s everyday activities it will ensure the improved com-pliance of employees and additionally better overall information security.
first_indexed 2015-06-16T20:06:07Z
format Kandityö
free_online_boolean 1
fullrecord [{"key": "dc.contributor.advisor", "value": "Moilanen, Panu", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Salmi, Niko", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2015-06-16T05:57:54Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2015-06-16T05:57:54Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2015", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/46330", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Organisaatiot joutuvat enenev\u00e4ss\u00e4 m\u00e4\u00e4rin suojautumaan niiden tietoj\u00e4rjes-telmiin kohdistuvilta uhilta. Pelk\u00e4t tekniset suojausratkaisut eiv\u00e4t kuitenkaan riit\u00e4, sill\u00e4 henkil\u00f6st\u00f6 saattaa tahattomasti tai tahallisesti kiert\u00e4\u00e4 n\u00e4m\u00e4 tietoturva-ty\u00f6kalut helpottaakseen omaa ty\u00f6t\u00e4\u00e4n. Organisaation tietoturvapolitiikka pyr-kii est\u00e4m\u00e4\u00e4n n\u00e4m\u00e4 tahattomat ty\u00f6kalujen kiert\u00e4miset antamalla henkil\u00f6st\u00f6lle ohjenuorat, joita seuraamalla he voivat turvata k\u00e4sittelem\u00e4ns\u00e4 tiedon. Tietotur-vapolitiikan suurimpana ongelmana on se, ettei sit\u00e4 noudateta henkil\u00f6st\u00f6n toi-mesta, jolloin tulevaisuudessa t\u00e4rke\u00e4ksi osaksi tietoturvan johtamista muodos-tuu henkil\u00f6st\u00f6n motivointi tietoturvapolitiikan noudattamiseen. T\u00e4m\u00e4 tutkiel-ma ker\u00e4si kirjallisuudesta viisi eri motivoinnin osa-aluetta, joihin tietoturvajoh-tamisen tulisi tulevaisuudessa keskitty\u00e4: koulutus, valvonta, organisaation kult-tuurin muokkaaminen, palkkiot ja rangaistukset. N\u00e4iden osa-alueiden ymm\u00e4r-t\u00e4minen ja implementointi organisaation toimintaan varmistaa henkil\u00f6st\u00f6n mo-tivoinnin onnistumisen ja sit\u00e4 kautta tietoturvan kehittymisen.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Organizations have to protect their information assets from outsider threats. Sadly technical solutions don\u2019t provide enough protection, as the organizations\u2019 employees tend to turn them off. The information security policy tries to stop the employees from turning off the technical security tools. This is done by giv-ing them information and precepts of how to protect the information they have access to. The biggest problem with the information security policy is that the employees don\u2019t follow it. Employee non-compliance increases the future need of compliance management in organizations. By studying the corresponding literature this thesis was able to point out five sections that these compliance managers should focus on: training, surveillance, improving organization cul-ture, rewards and sanctions. By understanding and implementing these sec-tions to the organization\u2019s everyday activities it will ensure the improved com-pliance of employees and additionally better overall information security.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted using Plone Publishing form by Niko Salmi (nihesalm) on 2015-06-16 05:57:53.965464. Form: Kandidaatintutkielma -lomake (https://kirjasto.jyu.fi/julkaisut/julkaisulomakkeet/kandin-tutkielma-lomake). JyX data: [jyx_publishing-allowed (fi) =True]", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2015-06-16T05:57:54Z\nNo. of bitstreams: 2\nURN:NBN:fi:jyu-201506162336.pdf: 376549 bytes, checksum: 9e1449665a2a24e80d78455afc57f45c (MD5)\nlicense.html: 4804 bytes, checksum: 2ae46442075afee96da4f8efbbab4b1b (MD5)", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2015-06-16T05:57:54Z (GMT). No. of bitstreams: 2\nURN:NBN:fi:jyu-201506162336.pdf: 376549 bytes, checksum: 9e1449665a2a24e80d78455afc57f45c (MD5)\nlicense.html: 4804 bytes, checksum: 2ae46442075afee96da4f8efbbab4b1b (MD5)\n Previous issue date: 2015", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "27", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "tietoturvapolitiikka", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "motivointi", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tietoturva", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "noudattaminen", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Henkil\u00f6st\u00f6n motivoinnin keinot tieturvapolitiikan vahvistamiseksi", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201506162336", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.dcmitype", "value": "Text", "language": "en", "element": "type", "qualifier": "dcmitype", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatintutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.date.updated", "value": "2015-06-16T05:57:55Z", "language": null, "element": "date", "qualifier": "updated", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": "fi", "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
id jyx.123456789_46330
language fin
last_indexed 2025-02-18T10:54:35Z
main_date 2015-01-01T00:00:00Z
main_date_str 2015
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstreams\/d86a00f1-d268-4616-994b-52594bcbfa73\/download","text":"URN:NBN:fi:jyu-201506162336.pdf","source":"jyx","mediaType":"application\/pdf"}
publishDate 2015
record_format qdc
source_str_mv jyx
spellingShingle Salmi, Niko Henkilöstön motivoinnin keinot tieturvapolitiikan vahvistamiseksi tietoturvapolitiikka motivointi tietoturva noudattaminen Tietojärjestelmätiede Information Systems Science
title Henkilöstön motivoinnin keinot tieturvapolitiikan vahvistamiseksi
title_full Henkilöstön motivoinnin keinot tieturvapolitiikan vahvistamiseksi
title_fullStr Henkilöstön motivoinnin keinot tieturvapolitiikan vahvistamiseksi Henkilöstön motivoinnin keinot tieturvapolitiikan vahvistamiseksi
title_full_unstemmed Henkilöstön motivoinnin keinot tieturvapolitiikan vahvistamiseksi Henkilöstön motivoinnin keinot tieturvapolitiikan vahvistamiseksi
title_short Henkilöstön motivoinnin keinot tieturvapolitiikan vahvistamiseksi
title_sort henkilöstön motivoinnin keinot tieturvapolitiikan vahvistamiseksi
title_txtP Henkilöstön motivoinnin keinot tieturvapolitiikan vahvistamiseksi
topic tietoturvapolitiikka motivointi tietoturva noudattaminen Tietojärjestelmätiede Information Systems Science
topic_facet Information Systems Science Tietojärjestelmätiede motivointi noudattaminen tietoturva tietoturvapolitiikka
url https://jyx.jyu.fi/handle/123456789/46330 http://www.urn.fi/URN:NBN:fi:jyu-201506162336
work_keys_str_mv AT salminiko henkilöstönmotivoinninkeinottieturvapolitiikanvahvistamiseksi