fullrecord |
[{"key": "dc.contributor.advisor", "value": "Siponen, Mikko", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "M\u00e4kitalo, Hermanni", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2017-04-24T13:27:12Z", "language": "", "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2017-04-24T13:27:12Z", "language": "", "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2017", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.other", "value": "oai:jykdok.linneanet.fi:1695367", "language": null, "element": "identifier", "qualifier": "other", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/53662", "language": "", "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "T\u00e4m\u00e4n gradun tarkoituksena on k\u00e4siteanalyysin avulla hahmottaa t\u00e4rkeimpi\u00e4 omaisuuksia tietoturvatietoisuudesta ja tavoista levitt\u00e4\u00e4 sit\u00e4, tutustua niihin tarkemmin, ja muodostaa n\u00e4ist\u00e4 perusteltuja ja k\u00e4ytt\u00e4jille olennaisia kysymyksi\u00e4 joilla selvitt\u00e4\u00e4 k\u00e4ytt\u00e4j\u00e4n tietoturvatietoisuutta. Aiheen tarkempi l\u00e4pik\u00e4ynti on t\u00e4rke\u00e4\u00e4, sill\u00e4 aiemmissa tutkimuksissa on havaittu, ett\u00e4 k\u00e4ytt\u00e4j\u00e4t kertovat noudattavansa tietoturvapolitiikoita, vaikka tarkemmin tutkittaessa eiv\u00e4t tienneet tai ymm\u00e4rt\u00e4neet tietoturvapolitiikoiden sis\u00e4lt\u00f6\u00e4. Kysymysten muodostamisessa otetaan huomioon my\u00f6s muita k\u00e4siteanalyysi vaiheessa selvinneit\u00e4 piirteit\u00e4, joilla tehd\u00e4 kysymyksist\u00e4 parempia. Tuloksena esitet\u00e4\u00e4n 20 esimerkkikysymyst\u00e4, sek\u00e4 ehdotuksia kysymysten muodostamiseen sek\u00e4 niiden k\u00e4ytt\u00e4miseen.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "The purpose of this thesis is to develop questions to measure level of users\u2019 understating of information security awareness. Researching the subject is important, because earlier studies have discovered that users who respond positively to questions about whether they follow information security policies might not actually even know what those policies consist of, which may be result of not understanding them. This is achieved by using concept analysis to identify features of information security awareness, which are then studied further to gain better understanding of whether they are relevant for users or not, and to make well-argued questions. We will also utilize other identified ways to make questions better. Thus, we will present 20 example questions, and suggestions on how to develop them to achieve best results.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted using Plone Publishing form by Hermanni M\u00e4kitalo (jehemaki) on 2017-04-24 13:27:11.952557. Form: Pro gradu -lomake (https://kirjasto.jyu.fi/julkaisut/julkaisulomakkeet/pro-gradu-lomake). JyX data: [jyx_publishing-allowed (fi) =True]", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2017-04-24T13:27:12Z\r\nNo. of bitstreams: 2\r\nURN:NBN:fi:jyu-201704242058.pdf: 833319 bytes, checksum: cf16d64fa06c94837bc121b88f6f8276 (MD5)\r\nlicense.html: 4871 bytes, checksum: 61bd4f0c73faed6ea6404f856b371357 (MD5)", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2017-04-24T13:27:12Z (GMT). No. of bitstreams: 2\r\nURN:NBN:fi:jyu-201704242058.pdf: 833319 bytes, checksum: cf16d64fa06c94837bc121b88f6f8276 (MD5)\r\nlicense.html: 4871 bytes, checksum: 61bd4f0c73faed6ea6404f856b371357 (MD5)\r\n Previous issue date: 2017", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "1 verkkoaineisto (60 sivua)", "language": null, "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "eng", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "information security awareness", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "information security", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "concept analysis", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Measuring users' level of information security awareness : research and development of sample questions", "language": null, "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201704242058", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietojenk\u00e4sittelytiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.method", "value": "K\u00e4siteanalyysi", "language": null, "element": "subject", "qualifier": "method", "schema": "dc"}, {"key": "dc.date.updated", "value": "2017-04-24T13:27:13Z", "language": "", "element": "date", "qualifier": "updated", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": "fi", "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": null, "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturvapolitiikka", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
|