_version_ 1809902372686659584
annif_keywords_txtF_mv data security behaviour users attitudes information technology
annif_uris_txtF_mv http://www.yso.fi/onto/yso/p5479 http://www.yso.fi/onto/yso/p3625 http://www.yso.fi/onto/yso/p16550 http://www.yso.fi/onto/yso/p5619 http://www.yso.fi/onto/yso/p5462
author Rantonen, Kimmo
author2 Faculty of Information Technology Informaatioteknologian tiedekunta Tietojenkäsittelytieteiden laitos Department of Computer Science and Information Systems University of Jyväskylä Jyväskylän yliopisto Information Systems Science Tietojärjestelmätiede 601
author_facet Rantonen, Kimmo Faculty of Information Technology Informaatioteknologian tiedekunta Tietojenkäsittelytieteiden laitos Department of Computer Science and Information Systems University of Jyväskylä Jyväskylän yliopisto Information Systems Science Tietojärjestelmätiede 601 Rantonen, Kimmo
author_sort Rantonen, Kimmo
building Jyväskylän yliopisto JYX-julkaisuarkisto
datasource_str_mv jyx
department_txtF Informaatioteknologia
faculty_txtF Informaatioteknologian tiedekunta
first_indexed 2023-03-22T09:57:28Z
format Pro gradu
format_ext_str_mv Opinnäyte Maisterivaiheen työ
free_online_boolean 1
fullrecord <?xml version="1.0"?> <qualifieddc schemaLocation="http://purl.org/dc/terms/ http://dublincore.org/schemas/xmls/qdc/2006/01/06/dcterms.xsd http://purl.org/dc/elements/1.1/ http://dublincore.org/schemas/xmls/qdc/2006/01/06/dc.xsd"><title>Explaining information security behavior : case of the home user</title><creator>Rantonen, Kimmo</creator><contributor type="tiedekunta" lang="en">Faculty of Information Technology</contributor><contributor type="tiedekunta" lang="fi">Informaatioteknologian tiedekunta</contributor><contributor type="laitos" lang="fi">Tietojenk&#xE4;sittelytieteiden laitos</contributor><contributor type="laitos" lang="en">Department of Computer Science and Information Systems</contributor><contributor type="yliopisto" lang="en">University of Jyv&#xE4;skyl&#xE4;</contributor><contributor type="yliopisto" lang="fi">Jyv&#xE4;skyl&#xE4;n yliopisto</contributor><contributor type="oppiaine" lang="en">Information Systems Science</contributor><contributor type="oppiaine" lang="fi">Tietoj&#xE4;rjestelm&#xE4;tiede</contributor><contributor type="oppiainekoodi">601</contributor><subject type="other">Information security behavior</subject><subject type="other">home user</subject><subject type="other">threat appraisal</subject><subject type="other">self efficacy</subject><subject type="other">attitudes</subject><subject type="other">subjective norms</subject><subject type="yso">tietoturva</subject><subject type="yso">asenteet</subject><subject type="yso">k&#xE4;ytt&#xE4;ytyminen</subject><subject type="yso">tietotekniikka</subject><available>2015-05-12T16:53:29Z</available><issued>2014</issued><type lang="en">Master&#x2019;s thesis</type><type lang="fi">Pro gradu -tutkielma</type><identifier type="other">oai:jykdok.linneanet.fi:1473557</identifier><identifier type="uri">https://jyx.jyu.fi/handle/123456789/45877</identifier><identifier type="urn">URN:NBN:fi:jyu-201505121832</identifier><language type="iso">eng</language><rights lang="en">This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.</rights><rights lang="fi">Julkaisu on tekij&#xE4;noikeuss&#xE4;&#xE4;nn&#xF6;sten alainen. Teosta voi lukea ja tulostaa henkil&#xF6;kohtaista k&#xE4;ytt&#xF6;&#xE4; varten. K&#xE4;ytt&#xF6; kaupallisiin tarkoituksiin on kielletty.</rights><permaddress type="urn">http://www.urn.fi/URN:NBN:fi:jyu-201505121832</permaddress><file bundle="ORIGINAL" href="https://jyx.jyu.fi/bitstream/123456789/45877/1/URN%3aNBN%3afi%3ajyu-201505121832.pdf" name="URN:NBN:fi:jyu-201505121832.pdf" type="application/pdf" length="574817" sequence="1"/><recordID>123456789_45877</recordID></qualifieddc>
id jyx.123456789_45877
language eng
last_indexed 2024-09-03T10:49:53Z
main_date 2014-01-01T00:00:00Z
main_date_str 2014
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstream\/123456789\/45877\/1\/URN%3aNBN%3afi%3ajyu-201505121832.pdf","text":"URN:NBN:fi:jyu-201505121832.pdf","source":"jyx","mediaType":"application\/pdf"}
oppiainekoodi_txtF 601
publication_first_indexed 2014-03-22T09:57:28Z
publishDate 2014
record_format qdc
source_str_mv jyx
spellingShingle Rantonen, Kimmo Explaining information security behavior : case of the home user Information security behavior home user threat appraisal self efficacy attitudes subjective norms tietoturva asenteet käyttäytyminen tietotekniikka
subject_txtF Kognitiotiede
thumbnail https://jyu.finna.fi/Cover/Show?source=Solr&id=jyx.123456789_45877&index=0&size=large
title Explaining information security behavior : case of the home user
title_full Explaining information security behavior : case of the home user
title_fullStr Explaining information security behavior : case of the home user Explaining information security behavior : case of the home user
title_full_unstemmed Explaining information security behavior : case of the home user Explaining information security behavior : case of the home user
title_short Explaining information security behavior
title_sort explaining information security behavior case of the home user
title_sub case of the home user
title_txtP Explaining information security behavior : case of the home user
topic Information security behavior home user threat appraisal self efficacy attitudes subjective norms tietoturva asenteet käyttäytyminen tietotekniikka
topic_facet Information security behavior asenteet attitudes home user käyttäytyminen self efficacy subjective norms threat appraisal tietotekniikka tietoturva
url https://jyx.jyu.fi/handle/123456789/45877 http://www.urn.fi/URN:NBN:fi:jyu-201505121832
work_keys_str_mv AT rantonenkimmo explaininginformationsecuritybehaviorcaseofthehomeuser