fullrecord |
[{"key": "dc.contributor.advisor", "value": "Koskelainen, Tiina", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Kivel\u00e4, Aleksi", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2016-06-21T10:49:23Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2016-06-21T10:49:23Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2016", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/50514", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Tietoturva on t\u00e4rke\u00e4 aihe, koska internetin k\u00e4ytt\u00e4jien m\u00e4\u00e4r\u00e4 kasvaa yh\u00e4 ja tietoturvauhat eiv\u00e4t ole v\u00e4henem\u00e4ss\u00e4. P\u00e4invastoin, uusia uhkia havaitaan vuosittain tuhansia. Tietoturvan yll\u00e4pit\u00e4misess\u00e4 t\u00e4rke\u00e4 lenkki ohjelmistojen lis\u00e4ksi on tietoj\u00e4rjestelm\u00e4n k\u00e4ytt\u00e4j\u00e4 itse. Paraskaan virustentorjunta ei v\u00e4ltt\u00e4m\u00e4tt\u00e4 pelasta, jos k\u00e4ytt\u00e4j\u00e4 lankeaa kalasteluhy\u00f6kk\u00e4ykseen. T\u00e4st\u00e4 syyst\u00e4 tutkielmassa yritet\u00e4\u00e4n ymm\u00e4rt\u00e4\u00e4 k\u00e4ytt\u00e4ji\u00e4, miten he toimivat ja miksi, jotta tietoturvaa voidaan parantaa ja kaikki voivat nauttia turvallisemmasta internetist\u00e4 tulevaisuudessa. T\u00e4ss\u00e4 tutkielmassa huomataan, ett\u00e4 iso osa k\u00e4ytt\u00e4jist\u00e4 ei varaudu uhkiin erityisen hyvin ja monet suojakeinot j\u00e4\u00e4v\u00e4t k\u00e4ytt\u00e4m\u00e4tt\u00e4. Lis\u00e4ksi k\u00e4ytt\u00e4jilt\u00e4 puuttuu tarvittavat tietotaidot itsens\u00e4 oikeaoppiseen suojelemiseen eiv\u00e4tk\u00e4 k\u00e4ytt\u00e4j\u00e4t vaikuta motivoituneilta opiskelemaan tietoturvaa itsen\u00e4isesti. Tietoturvak\u00e4ytt\u00e4ytymisen teoriat osoittavat, ett\u00e4 k\u00e4ytt\u00e4ytymiseen vaikuttavat tottumukset, suojakeinon kustannukset ja tehokkuus, aiemmat kokemukset, henkil\u00f6kohtainen vastuuntunto, muiden mielipiteet, itseluottamus, tietoturvauhan vakavuus ja alttius uhalle. Tietoturvan parantamiseksi, kirjallisuudessa on ehdotettu tietoturvaportaalia ja erilaisten psykologisten ilmi\u00f6iden ottamista huomioon j\u00e4rjestelmi\u00e4 ja ohjelmistoja suunnitellessa. Tutkimus on suoritettu kirjallisuuskatsauksena k\u00e4ytt\u00e4en enimm\u00e4kseen l\u00e4htein\u00e4 tieteellisi\u00e4 artikkeleita ja konferenssijulkaisuja.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Information security is an important subject because the amount of internet users is still growing and the number security threats is not dropping. Quite the opposite. Thousands of new threats are detected each year. Together with software, the user is one important factor in maintaining information security. Even the best security software might not save you if you fall for a phish. For that reason, in this thesis, I will try to understand users, how they act and why, so that information security can be improved and everyone can enjoy safer internet in the future. In this thesis, I find that majority of users do not utilize the safeguards available to them and therefore they are not well prepared against security threats. Users also lack the necessary know-how to protect themselves and users don\u2019t seem motivated to educate themselves about information security. Security behavior theories have proven that factors affecting behavior include: habit strength, safeguard costs and effectiveness, previous experiences, personal responsibility, self-efficacy, threat severity and threat susceptibility. To improve information security, a security portal has been suggested and better understanding of psychological theories when developing new systems and software has been called for. This research was conducted by means of literature review and most of the used source material is scientific articles and conference publications.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted using Plone Publishing form by Aleksi Kivel\u00e4 (aleekive) on 2016-06-21 10:49:23.029942. Form: Kandidaatintutkielma -lomake (https://kirjasto.jyu.fi/julkaisut/julkaisulomakkeet/kandin-tutkielma-lomake). JyX data: [jyx_publishing-allowed (fi) =True]", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2016-06-21T10:49:23Z\nNo. of bitstreams: 2\nURN:NBN:fi:jyu-201606213272.pdf: 361302 bytes, checksum: 7327a4f0e07772e1639635d375e3536f (MD5)\nlicense.html: 4798 bytes, checksum: 84b7c9dd4e318c96d1960f864a88fa9b (MD5)", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2016-06-21T10:49:23Z (GMT). No. of bitstreams: 2\nURN:NBN:fi:jyu-201606213272.pdf: 361302 bytes, checksum: 7327a4f0e07772e1639635d375e3536f (MD5)\nlicense.html: 4798 bytes, checksum: 84b7c9dd4e318c96d1960f864a88fa9b (MD5)\n Previous issue date: 2016", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "25", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "virustentorjuntaohjelmat", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "haittaohjelmat", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "mobiililaitteet", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "k\u00e4ytt\u00e4ytyminen", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Tietoturvan yll\u00e4pit\u00e4misen haasteet kotikontekstissa", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201606213272", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatintutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.date.updated", "value": "2016-06-21T10:49:24Z", "language": null, "element": "date", "qualifier": "updated", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": "fi", "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|