fullrecord |
[{"key": "dc.contributor.author", "value": "Huotari, Outi", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2012-06-26T05:42:08Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2012-06-26T05:42:08Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2012", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/38101", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Huotari, Outi\r\nPeloteteorian vaikutus tietoturvak\u00e4yt\u00e4nt\u00f6jen noudattamiseen\r\nJyv\u00e4skyl\u00e4: Jyv\u00e4skyl\u00e4n yliopisto, 2012, 24 s.\r\nTietoj\u00e4rjestelm\u00e4tiede, kandidaatin tutkielma\r\nOhjaaja: Sepp\u00e4nen, Ville\r\nSuurin osa yritysten tietoturvarikkeist\u00e4 on ty\u00f6ntekij\u00f6iden aiheuttamia.\r\nTy\u00f6ntekij\u00f6iden vastuuta yrityksen tietoturvasta ei tulisi kuitenkaan v\u00e4hent\u00e4\u00e4,\r\nsill\u00e4 heid\u00e4n osallistumisellaan voidaan parantaa koko organisaation\r\ntietoturvariskienhallintaa. Ty\u00f6ntekij\u00e4t t\u00e4ytyisikin saada motivoitua\r\nnoudattamaan tietoturvak\u00e4yt\u00e4nt\u00f6j\u00e4.\r\nT\u00e4m\u00e4n tutkielman tarkoituksena on pyrki\u00e4 kirjallisuuskatsauksen avulla\r\nymm\u00e4rt\u00e4m\u00e4\u00e4n, miten ty\u00f6ntekij\u00e4t saataisiin noudattamaan yrityksen\r\ntietoturvak\u00e4yt\u00e4nt\u00f6j\u00e4. Tutkielma pohjautuu peloteteoriaan, jota on k\u00e4ytetty\r\npaljon ty\u00f6ntekij\u00f6iden tietoturvak\u00e4yt\u00e4nt\u00f6jen noudattamista tutkittaessa ja\r\nedistett\u00e4ess\u00e4. Teorian mukaan ty\u00f6ntekij\u00e4 pid\u00e4tt\u00e4ytyy tietokonerikkeiden\r\ntekemisest\u00e4, jos h\u00e4n kokee rangaistuksen saamisen todenn\u00e4k\u00f6isyyden ja\r\nrangaistuksen ankaruuden liian suuriksi. Tutkielman tutkimuskysymykset ovat\r\n1) Miten peloteteorian oppeja voidaan k\u00e4ytt\u00e4\u00e4 apuna, jotta ty\u00f6ntekij\u00e4t\r\nnoudattaisivat yrityksen tietoturvak\u00e4yt\u00e4nt\u00f6j\u00e4? ja 2) Millaisia tutkimustuloksia\r\nteorian toimivuudesta on saatu?\r\nPeloteteorian k\u00e4ytt\u00e4mist\u00e4 voidaan tarkastella yrityksen koko\r\ntietoturvak\u00e4yt\u00e4nn\u00f6n tasolla, kuten teoriasta saadut tutkimustulokset ovat usein\r\npyrkineet tekem\u00e4\u00e4n. Tietoturvak\u00e4yt\u00e4nt\u00f6jen noudattamisen parantamiseksi\r\nyrityksen t\u00e4ytyy luoda kyseisist\u00e4 k\u00e4yt\u00e4nn\u00f6ist\u00e4 selv\u00e4 ja yksityiskohtainen\r\ntietoturvapolitiikka, ja ty\u00f6ntekij\u00e4t on saatava tietoisiksi k\u00e4yt\u00e4nn\u00f6ist\u00e4,\r\nesimerkiksi koulutuksen avulla. Lis\u00e4ksi on t\u00e4rke\u00e4\u00e4 seurata ty\u00f6ntekij\u00f6iden\r\nk\u00e4ytt\u00e4ytymist\u00e4 ja rankaista k\u00e4yt\u00e4nt\u00f6j\u00e4 rikkovia. T\u00e4m\u00e4 luo pelotevaikutusta,\r\njoka est\u00e4\u00e4 potentiaalisia v\u00e4\u00e4rink\u00e4ytt\u00e4ji\u00e4 tekem\u00e4st\u00e4 rikkeit\u00e4.\r\nPeloteteorian toimivuudesta on saatu ristiriitaisia tuloksia. Peloteteoriaa\r\non kritisoitu vahvasti, sill\u00e4 se ei huomioi kaikkia ty\u00f6ntekij\u00f6iden toimintaan\r\nvaikuttavia tekij\u00f6it\u00e4. Teoriaa voidaan kritiikist\u00e4 huolimatta k\u00e4ytt\u00e4\u00e4\r\nty\u00f6ntekij\u00f6iden tietoturvak\u00e4yt\u00e4nt\u00f6jen noudattamisen parantamiseen, kunhan\r\nyritykset huomioivat teorian lis\u00e4ksi muitakin tekij\u00f6it\u00e4.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Seija Paananen (sepaanan@jyu.fi) on 2012-06-26T05:42:08Z\nNo. of bitstreams: 1\nOuti Huotari.pdf: 188142 bytes, checksum: 566f3cb5f4f9c33909fe219a31d3ac9a (MD5)", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2012-06-26T05:42:08Z (GMT). No. of bitstreams: 1\nOuti Huotari.pdf: 188142 bytes, checksum: 566f3cb5f4f9c33909fe219a31d3ac9a (MD5)\n Previous issue date: 2012", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "peloteteoria", "language": "fi", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tietoturvapolitiikka", "language": "fi", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tietoturvak\u00e4yt\u00e4nn\u00f6t", "language": "fi", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tietoturvarikkeet", "language": "fi", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Peloteteorian vaikutus tietoturvak\u00e4yt\u00e4nt\u00f6jen noudattamiseen", "language": null, "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201206261960", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.dcmitype", "value": "Text", "language": "en", "element": "type", "qualifier": "dcmitype", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatintutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "restrictedAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "This material has a restricted access due to copyright reasons.", "language": "en", "element": "rights", "qualifier": "accessrights", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "Luettavissa tekij\u00e4noikeudellisista syist\u00e4 vain Jyv\u00e4skyl\u00e4n yliopiston Tietojenk\u00e4sittelytieteiden laitoksella.", "language": "fi", "element": "rights", "qualifier": "accessrights", "schema": "dc"}]
|