fullrecord |
[{"key": "dc.contributor.advisor", "value": "Moilanen, Panu", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Kuhalampi, Mikko", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2017-05-17T10:13:46Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2017-05-17T10:13:46Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2017", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/53983", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Peloteteoria (Deterrence theory) on alun perin psykologiassa ja kriminologiassa k\u00e4ytetty termi, ja sen mukaan rangaistuksen pelko est\u00e4\u00e4 yksil\u00f6\u00e4 toimimasta vastoin lakia ja s\u00e4\u00e4nt\u00f6j\u00e4. Digitalisoituvassa maailmassa on viimeisen kahdenkymmenen vuoden aikana tehty paljon tutkimusta, jossa peloteteoriaa on sovellettu tietoj\u00e4rjestelmien sek\u00e4 tietoturvak\u00e4ytt\u00e4ytymisen kontekstiin. Tutkielma k\u00e4sittelee k\u00e4yt\u00f6ss\u00e4 olevia peloteteorian keinoja t\u00e4ss\u00e4 kontekstissa sek\u00e4 nii-den vaikutuksia ty\u00f6ntekij\u00f6iden tietoturvak\u00e4ytt\u00e4ytymiseen.\n\nTutkielma on toteutettu kirjallisuuskatsauksena ja sen tarkoitus on m\u00e4\u00e4ritell\u00e4 peloteteorian k\u00e4sitett\u00e4 tietoj\u00e4rjestelmien ja tietoturvak\u00e4ytt\u00e4ytymisen kontekstissa sek\u00e4 tutkia olemassa olevia keinoja ja niiden vaikutuksia. Tutkimuksen tuloksina voidaan todeta, ettei ole olemassa absoluuttista totuutta peloteteori-an keinojen vaikutuksista ty\u00f6ntekij\u00f6iden k\u00e4ytt\u00e4ytymiseen. T\u00e4m\u00e4 johtuu siit\u00e4, ett\u00e4 tuloksiin vaikuttavat my\u00f6s esimerkiksi yksil\u00f6n ominaisuudet, toimintaymp\u00e4rist\u00f6 ja kulttuuri. Peloteteoria on edelleen tutkituimpia teorioita ty\u00f6ntekij\u00f6iden tietoturvak\u00e4ytt\u00e4ytymisen kontekstissa, ja aiheen tutkimus jatkuu varmasti my\u00f6s tulevaisuudessa.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Deterrence theory is originally a term used in psychology and criminology. According to the theory sanction fear prevents individuals from committing illicit acts against the rules. As the corporate world digitalizes, there has been a lot of research on the topic in the context of information systems and security policy compliance in the last 20 years. This study examines the deterrence theory methods and their impacts in employees\u2019 information security behavior. \n\nThis study is implemented as a literary review and its purpose is to define de-terrence theory in the context of information systems and information security compliance as well as study the existing methods and their impacts on employee behavior. The results of the study suggest that there is no absolute truth about the impacts of the deterrence theory methods in the information security behavior of the employees. This is because there are other variables that influence the results, such as qualities of the employees, working environment and culture. Deterrence theory is one of the most-used theories in the context of information security behavior, and research on the topic will surely continue in the future.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted using Plone Publishing form by Mikko Kuhalampi (mivikuha) on 2017-05-17 10:13:45.751454. Form: Kandidaatintutkielma -lomake (https://kirjasto.jyu.fi/julkaisut/julkaisulomakkeet/kandin-tutkielma-lomake). JyX data: [jyx_publishing-allowed (fi) =True]", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2017-05-17T10:13:46Z\nNo. of bitstreams: 2\nURN:NBN:fi:jyu-201705172387.pdf: 551422 bytes, checksum: be8b60cdb99eb5625df8876ff7254dc4 (MD5)\nlicense.html: 4826 bytes, checksum: 09f217231626fd2e8a20cb32efddea87 (MD5)", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2017-05-17T10:13:46Z (GMT). No. of bitstreams: 2\nURN:NBN:fi:jyu-201705172387.pdf: 551422 bytes, checksum: be8b60cdb99eb5625df8876ff7254dc4 (MD5)\nlicense.html: 4826 bytes, checksum: 09f217231626fd2e8a20cb32efddea87 (MD5)\n Previous issue date: 2017", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "29", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "deterrence", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "information security", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "compliance", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "behavior", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "peloteteoria", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "informaatioturvallisuus", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "ohjeidenmukaisuus", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "k\u00e4ytt\u00e4ytyminen", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Impact of deterrence theory methods on employees' information security behavior", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201705172387", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatintutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.date.updated", "value": "2017-05-17T10:13:46Z", "language": null, "element": "date", "qualifier": "updated", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": "fi", "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|