Information security quality assurance quality information and social perceptions

Understanding formation of corner stones of information security, implementation, state, reasoning and outcomes of actions in reality in organizations operations is vital. Individual perceptions over organizations information security, information security quality, importance and realization of qual...

Full description

Bibliographic Details
Main Authors: Lindelä, Mika, Ylikauppila, Jonna
Other Authors: Informaatioteknologian tiedekunta, Faculty of Information Technology, Informaatioteknologia, Information Technology, Jyväskylän yliopisto, University of Jyväskylä
Format: Master's thesis
Language:eng
Published: 2020
Subjects:
Online Access: https://jyx.jyu.fi/handle/123456789/73229
_version_ 1826225692849733632
author Lindelä, Mika Ylikauppila, Jonna
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_facet Lindelä, Mika Ylikauppila, Jonna Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Lindelä, Mika Ylikauppila, Jonna Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_sort Lindelä, Mika
datasource_str_mv jyx
description Understanding formation of corner stones of information security, implementation, state, reasoning and outcomes of actions in reality in organizations operations is vital. Individual perceptions over organizations information security, information security quality, importance and realization of quality information are key components of this research. Each individual within the company have possibility to impact its information security quality with ones actions, competence, awareness and experiences. Identification and understanding information security needs, perceptions and interpretations of individual’s leads researchers towards understanding how information security quality is formed within social system present in organization and its social sub-systems. Regulatory external factors obvious to organizations operating field relevant to information security can fail to appear within organizations strategy that is expected to lead the way. Instead organizational strategy, forced external factors can find other routes into organizations information security operations through forced regulatory activities that have more impact to the real-life information security assessment, assurance and practical actions. Methods of assessment and assurance can deliver quality information for the information security decision-making only if applied correctly and fit for the purpose. Individual interpretation of the data can lead either to biased information or towards quality information. Therefore competence and overall understanding of the information gathering method and the issue at hand is a must when interpreting information. Themed interviews are good method for information security quality assessment within social systems as those provide individuals perceptions of the overall situation and its pros and cons. The chain of administrative controls such as policies, risk management, guidelines and actual interpretation of desired standards can fail to deliver and lead to situations where individual competence and social systems plays major role in organizations information systems security. Good willed competent employees taking self-reliant actions to improve information security in their work and relevant social systems are heroes of the organizations information security implementation and actualization.
first_indexed 2020-12-16T21:03:09Z
format Pro gradu
fullrecord [{"key": "dc.contributor.advisor", "value": "Siponen, Mikko", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Lindel\u00e4, Mika", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Ylikauppila, Jonna", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2020-12-16T07:07:39Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2020-12-16T07:07:39Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2020", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/73229", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Understanding formation of corner stones of information security, implementation, state, reasoning and outcomes of actions in reality in organizations operations is vital. Individual perceptions over organizations information security, information security quality, importance and realization of quality information are key components of this research. Each individual within the company have possibility to impact its information security quality with ones actions, competence, awareness and experiences. Identification and understanding information security needs, perceptions and interpretations of individual\u2019s leads researchers towards understanding how information security quality is formed within social system present in organization and its social sub-systems. Regulatory external factors obvious to organizations operating field relevant to information security can fail to appear within organizations strategy that is expected to lead the way. Instead organizational strategy, forced external factors can find other routes into organizations information security operations through forced regulatory activities that have more impact to the real-life information security assessment, assurance and practical actions. Methods of assessment and assurance can deliver quality information for the information security decision-making only if applied correctly and fit for the purpose. Individual interpretation of the data can lead either to biased information or towards quality information. Therefore competence and overall understanding of the information gathering method and the issue at hand is a must when interpreting information. Themed interviews are good method for information security quality assessment within social systems as those provide individuals perceptions of the overall situation and its pros and cons. The chain of administrative controls such as policies, risk management, guidelines and actual interpretation of desired standards can fail to deliver and lead to situations where individual competence and social systems plays major role in organizations information systems security. Good willed competent employees taking self-reliant actions to improve information security in their work and relevant social systems are heroes of the organizations information security implementation and actualization.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2020-12-16T07:07:39Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2020-12-16T07:07:39Z (GMT). No. of bitstreams: 0\n Previous issue date: 2020", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "115", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "eng", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "social systems", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Information security quality assurance : quality information and social perceptions", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202012167174", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "restrictedAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "laatu", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "data security", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "quality", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "cyber security", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "The author has not given permission to make the work publicly available electronically. Therefore the material can be read only at the archival workstation at Jyv\u00e4skyl\u00e4 University Library (https://kirjasto.jyu.fi/en/workspaces/facilities).", "language": "en", "element": "rights", "qualifier": "accessrights", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "Tekij\u00e4 ei ole antanut lupaa avoimeen julkaisuun, joten aineisto on luettavissa vain Jyv\u00e4skyl\u00e4n yliopiston kirjaston arkistoty\u00f6semalta. Ks. https://kirjasto.jyu.fi/fi/tyoskentelytilat/laitteet-ja-tilat..", "language": "fi", "element": "rights", "qualifier": "accessrights", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
id jyx.123456789_73229
language eng
last_indexed 2025-02-18T10:55:05Z
main_date 2020-01-01T00:00:00Z
main_date_str 2020
publishDate 2020
record_format qdc
source_str_mv jyx
spellingShingle Lindelä, Mika Ylikauppila, Jonna Information security quality assurance : quality information and social perceptions social systems Tietojärjestelmätiede Information Systems Science 601 tietoturva laatu kyberturvallisuus data security quality cyber security
title Information security quality assurance : quality information and social perceptions
title_full Information security quality assurance : quality information and social perceptions
title_fullStr Information security quality assurance : quality information and social perceptions Information security quality assurance : quality information and social perceptions
title_full_unstemmed Information security quality assurance : quality information and social perceptions Information security quality assurance : quality information and social perceptions
title_short Information security quality assurance
title_sort information security quality assurance quality information and social perceptions
title_sub quality information and social perceptions
title_txtP Information security quality assurance : quality information and social perceptions
topic social systems Tietojärjestelmätiede Information Systems Science 601 tietoturva laatu kyberturvallisuus data security quality cyber security
topic_facet 601 Information Systems Science Tietojärjestelmätiede cyber security data security kyberturvallisuus laatu quality social systems tietoturva
url https://jyx.jyu.fi/handle/123456789/73229 http://www.urn.fi/URN:NBN:fi:jyu-202012167174
work_keys_str_mv AT lindelämika informationsecurityqualityassurancequalityinformationandsocialperceptions