The determinants affecting on the investment proposals adoption

Tietoturvallisuuden tutkimuksessa ei ole kyetty tunnistamaan tekijöitä, jotka vaikuttavat tietoturvallisuusaloitteiden onnistumiseen. Teoreettinen tutkimus lähestyy haastetta tarkastelemalla olemassa olevia tietotekniikan ja tietojärjestelmien tutkimusta yritysympäristössä. Aloitteiden hyväksymiseen...

Täydet tiedot

Bibliografiset tiedot
Päätekijä: Hirvonen, Pauliina
Muut tekijät: Faculty of Information Technology, Informaatioteknologian tiedekunta, Tietojenkäsittelytieteiden laitos, Department of Computer Science and Information Systems, University of Jyväskylä, Jyväskylän yliopisto
Aineistotyyppi: Pro gradu
Kieli:eng
Julkaistu: 2016
Aiheet:
Linkit: https://jyx.jyu.fi/handle/123456789/51591
_version_ 1826225712978198529
author Hirvonen, Pauliina
author2 Faculty of Information Technology Informaatioteknologian tiedekunta Tietojenkäsittelytieteiden laitos Department of Computer Science and Information Systems University of Jyväskylä Jyväskylän yliopisto
author_facet Hirvonen, Pauliina Faculty of Information Technology Informaatioteknologian tiedekunta Tietojenkäsittelytieteiden laitos Department of Computer Science and Information Systems University of Jyväskylä Jyväskylän yliopisto Hirvonen, Pauliina Faculty of Information Technology Informaatioteknologian tiedekunta Tietojenkäsittelytieteiden laitos Department of Computer Science and Information Systems University of Jyväskylä Jyväskylän yliopisto
author_sort Hirvonen, Pauliina
datasource_str_mv jyx
description Tietoturvallisuuden tutkimuksessa ei ole kyetty tunnistamaan tekijöitä, jotka vaikuttavat tietoturvallisuusaloitteiden onnistumiseen. Teoreettinen tutkimus lähestyy haastetta tarkastelemalla olemassa olevia tietotekniikan ja tietojärjestelmien tutkimusta yritysympäristössä. Aloitteiden hyväksymiseen vaikuttavat tekijät määritettiin kolmeksi kategoriaksi. Tietoturvallisuusaloitteisiin vaikuttavien tekijöiden tunnistamisen ohella tutkimusmenetelmän vaikutus tuloksiin on käsitelty. Useita suosituksia ilmiön jatkotutkimukselle sekä tutkimusmenetelmän kehittämiselle on esitetty. Information security field lacks of understanding of how to succeed with in-vestments proposals. This theoretical study approaches the underinvestment challenge through existing information technology and information system studies. Three main categories were recognized to affect on investment pro-posals adaption in a company context. However, the main contribution for these study is the discussion of the leveragability of the research method for examing the phenomenon from this specific perspective. Among the findings related to key determinants affecting on investment proposals, the impact of the research method for the findings are considered. Several suggestions for further research of investment studies and the development of the research method are discussed.
first_indexed 2023-03-22T09:57:39Z
format Pro gradu
free_online_boolean 1
fullrecord [{"key": "dc.contributor.advisor", "value": "Siponen, Mikko", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.advisor", "value": "Lehto, Martti", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Hirvonen, Pauliina", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2016-10-11T14:55:13Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2016-10-11T14:55:13Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2016", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.other", "value": "oai:jykdok.linneanet.fi:1575569", "language": null, "element": "identifier", "qualifier": "other", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/51591", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Tietoturvallisuuden tutkimuksessa ei ole kyetty tunnistamaan tekij\u00f6it\u00e4, jotka vaikuttavat tietoturvallisuusaloitteiden onnistumiseen. Teoreettinen tutkimus l\u00e4hestyy haastetta tarkastelemalla olemassa olevia tietotekniikan ja tietoj\u00e4rjestelmien tutkimusta yritysymp\u00e4rist\u00f6ss\u00e4. Aloitteiden hyv\u00e4ksymiseen vaikuttavat tekij\u00e4t m\u00e4\u00e4ritettiin kolmeksi kategoriaksi. Tietoturvallisuusaloitteisiin vaikuttavien tekij\u00f6iden tunnistamisen ohella tutkimusmenetelm\u00e4n vaikutus tuloksiin on k\u00e4sitelty. Useita suosituksia ilmi\u00f6n jatkotutkimukselle sek\u00e4 tutkimusmenetelm\u00e4n kehitt\u00e4miselle on esitetty.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Information security field lacks of understanding of how to succeed with in-vestments proposals. This theoretical study approaches the underinvestment challenge through existing information technology and information system studies. Three main categories were recognized to affect on investment pro-posals adaption in a company context. However, the main contribution for these study is the discussion of the leveragability of the research method for examing the phenomenon from this specific perspective. Among the findings related to key determinants affecting on investment proposals, the impact of the research method for the findings are considered. Several suggestions for further research of investment studies and the development of the research method are discussed.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted using Plone Publishing form by Pauliina Hirvonen (anpahirv) on 2016-10-11 14:55:13.224094. Form: Pro gradu -lomake (https://kirjasto.jyu.fi/julkaisut/julkaisulomakkeet/pro-gradu-lomake). JyX data: [jyx_publishing-allowed (fi) =True]", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2016-10-11T14:55:13Z\nNo. of bitstreams: 2\nURN:NBN:fi:jyu-201610114338.pdf: 1179570 bytes, checksum: 4296f1b3ead9aba305ee70c4bfb7f847 (MD5)\nlicense.html: 4828 bytes, checksum: b80aa0009447987abda2217a6b6e4dd4 (MD5)", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2016-10-11T14:55:13Z (GMT). No. of bitstreams: 2\nURN:NBN:fi:jyu-201610114338.pdf: 1179570 bytes, checksum: 4296f1b3ead9aba305ee70c4bfb7f847 (MD5)\nlicense.html: 4828 bytes, checksum: b80aa0009447987abda2217a6b6e4dd4 (MD5)\n Previous issue date: 2016", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "1 verkkoaineisto (64 sivua)", "language": null, "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "eng", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "information security", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "information technology", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "information system", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "investment proposals", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "adoption", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "theoretical research", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "systematic literature review", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "The determinants affecting on the investment proposals adoption", "language": null, "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201610114338", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Tietojenk\u00e4sittelytieteiden laitos", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Department of Computer Science and Information Systems", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Cyber Security", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Kyberturvallisuus", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.method", "value": "Teoreettinen tutkimus", "language": null, "element": "subject", "qualifier": "method", "schema": "dc"}, {"key": "dc.subject.method", "value": "Kirjallisuuskatsaus", "language": null, "element": "subject", "qualifier": "method", "schema": "dc"}, {"key": "dc.date.updated", "value": "2016-10-11T14:55:14Z", "language": null, "element": "date", "qualifier": "updated", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": null, "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": "fi", "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": null, "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietotekniikka", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoj\u00e4rjestelm\u00e4t", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "investoinnit", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
id jyx.123456789_51591
language eng
last_indexed 2025-02-18T10:54:32Z
main_date 2016-01-01T00:00:00Z
main_date_str 2016
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstreams\/b03d99f6-ca65-4e0c-b3bc-6a32fc1550f9\/download","text":"URN:NBN:fi:jyu-201610114338.pdf","source":"jyx","mediaType":"application\/pdf"}
publishDate 2016
record_format qdc
source_str_mv jyx
spellingShingle Hirvonen, Pauliina The determinants affecting on the investment proposals adoption information security information technology information system investment proposals adoption theoretical research systematic literature review Cyber Security Kyberturvallisuus Teoreettinen tutkimus Kirjallisuuskatsaus 601 tietoturva tietotekniikka tietojärjestelmät investoinnit
title The determinants affecting on the investment proposals adoption
title_full The determinants affecting on the investment proposals adoption
title_fullStr The determinants affecting on the investment proposals adoption The determinants affecting on the investment proposals adoption
title_full_unstemmed The determinants affecting on the investment proposals adoption The determinants affecting on the investment proposals adoption
title_short The determinants affecting on the investment proposals adoption
title_sort determinants affecting on the investment proposals adoption
title_txtP The determinants affecting on the investment proposals adoption
topic information security information technology information system investment proposals adoption theoretical research systematic literature review Cyber Security Kyberturvallisuus Teoreettinen tutkimus Kirjallisuuskatsaus 601 tietoturva tietotekniikka tietojärjestelmät investoinnit
topic_facet 601 Cyber Security Kirjallisuuskatsaus Kyberturvallisuus Teoreettinen tutkimus adoption information security information system information technology investment proposals investoinnit systematic literature review theoretical research tietojärjestelmät tietotekniikka tietoturva
url https://jyx.jyu.fi/handle/123456789/51591 http://www.urn.fi/URN:NBN:fi:jyu-201610114338
work_keys_str_mv AT hirvonenpauliina determinantsaffectingontheinvestmentproposalsadoption AT hirvonenpauliina thedeterminantsaffectingontheinvestmentproposalsadoption