fullrecord |
[{"key": "dc.contributor.advisor", "value": "Moilanen, Panu", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Sippo, Markus", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2017-05-16T19:13:01Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2017-05-16T19:13:01Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2017", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/53974", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "T\u00e4m\u00e4n tutkielman tarkoitus on selvitt\u00e4\u00e4, millainen on kotik\u00e4ytt\u00e4j\u00e4, mit\u00e4 tarkoittaa kotik\u00e4ytt\u00e4j\u00e4n tietoturvak\u00e4ytt\u00e4ytyminen ja mist\u00e4 tekij\u00f6ist\u00e4 se koostuu. Lis\u00e4ksi tutkimuksessa tarkastellaan kotik\u00e4ytt\u00e4j\u00e4n tietoturvatietoisuutta, sen rakentumista ja sen vaikutuksia tietoturvak\u00e4ytt\u00e4ytymiseen. Tutkimuksen tuloksena l\u00f6ydettiin useita eri tekij\u00f6it\u00e4, jotka vaikuttavat tietoturvak\u00e4ytt\u00e4ytymiseen ja tietoturvatietoisuuteen. My\u00f6s yhteys tietoturvatietoisuuden ja tietoturvak\u00e4ytt\u00e4ytymisen v\u00e4lill\u00e4 l\u00f6ydettiin. L\u00f6yd\u00f6sten pohjalta muodostettiin uudenlainen malli kotik\u00e4ytt\u00e4j\u00e4n tietoturvak\u00e4ytt\u00e4ytymisen muodostumisesta. Tutkimus on toteutettu kirjallisuuskatsauksena, jonka l\u00e4htein\u00e4 on k\u00e4ytetty tieteellisi\u00e4 julkaisuja ja tutkimuksia, jotka on julkaistu erilaisissa akateemisissa julkaisuissa.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "The purpose of this study is to find out, what is a home user, what home user\u2019s information security behavior is and from what factors it consists of. Additionally, the second purpose of this study is to describe home user\u2019s information security awareness, from what factors it consists of and how it affects information security behavior. Based on the findings of this study, many different factors, that affects information security behavior and information security awareness, were found. The connection between information security awareness and information security behavior was also found. Based on the findings of this study, a new model was created to describe the formation of home user\u2019s information security behavior. This study is a literature review. The sources used in this study are mostly scientific articles and studies published in different academic journals.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted using Plone Publishing form by Markus Sippo (makrsipp) on 2017-05-16 19:13:01.103498. Form: Kandidaatintutkielma -lomake (https://kirjasto.jyu.fi/julkaisut/julkaisulomakkeet/kandin-tutkielma-lomake). JyX data: [jyx_publishing-allowed (fi) =True]", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2017-05-16T19:13:01Z\nNo. of bitstreams: 2\nURN:NBN:fi:jyu-201705162376.pdf: 451155 bytes, checksum: a2b65e4b20d10862920bc63ee856aa60 (MD5)\nlicense.html: 4808 bytes, checksum: 1e23a95cec9cdb90cce20968737120b7 (MD5)", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2017-05-16T19:13:01Z (GMT). No. of bitstreams: 2\nURN:NBN:fi:jyu-201705162376.pdf: 451155 bytes, checksum: a2b65e4b20d10862920bc63ee856aa60 (MD5)\nlicense.html: 4808 bytes, checksum: 1e23a95cec9cdb90cce20968737120b7 (MD5)\n Previous issue date: 2017", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "32", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kotik\u00e4ytt\u00e4j\u00e4", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tietoturvak\u00e4ytt\u00e4ytyminen", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tietoturvatietoisuus", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Kotik\u00e4ytt\u00e4j\u00e4n tietoturvak\u00e4ytt\u00e4ytyminen ja tietoturvatietoisuus", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201705162376", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatintutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.date.updated", "value": "2017-05-16T19:13:01Z", "language": null, "element": "date", "qualifier": "updated", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": "fi", "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|