_version_ 1809903176563818496
annif_keywords_txtF_mv metodologia pelotteet tietotekniikka menetelmät organisaatiot
annif_uris_txtF_mv http://www.yso.fi/onto/yso/p7509 http://www.yso.fi/onto/yso/p10846 http://www.yso.fi/onto/yso/p5462 http://www.yso.fi/onto/yso/p1913 http://www.yso.fi/onto/yso/p272
author Kuhalampi, Mikko
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology University of Jyväskylä Jyväskylän yliopisto Tietojärjestelmätiede Information Systems Science
author_facet Kuhalampi, Mikko Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology University of Jyväskylä Jyväskylän yliopisto Tietojärjestelmätiede Information Systems Science Kuhalampi, Mikko
author_sort Kuhalampi, Mikko
building Jyväskylän yliopisto JYX-julkaisuarkisto
datasource_str_mv jyx
department_txtF Informaatioteknologia
faculty_txtF Informaatioteknologian tiedekunta
first_indexed 2017-05-17T20:24:10Z
format Kandityö
format_ext_str_mv Opinnäyte Kandityö
free_online_boolean 1
fullrecord <?xml version="1.0"?> <qualifieddc schemaLocation="http://purl.org/dc/terms/ http://dublincore.org/schemas/xmls/qdc/2006/01/06/dcterms.xsd http://purl.org/dc/elements/1.1/ http://dublincore.org/schemas/xmls/qdc/2006/01/06/dc.xsd"><title>Impact of deterrence theory methods on employees' information security behavior</title><creator>Kuhalampi, Mikko</creator><contributor type="tiedekunta" lang="fi">Informaatioteknologian tiedekunta</contributor><contributor type="tiedekunta" lang="en">Faculty of Information Technology</contributor><contributor type="laitos" lang="fi">Informaatioteknologia</contributor><contributor type="laitos" lang="en">Information Technology</contributor><contributor type="yliopisto" lang="en">University of Jyv&#xE4;skyl&#xE4;</contributor><contributor type="yliopisto" lang="fi">Jyv&#xE4;skyl&#xE4;n yliopisto</contributor><contributor type="oppiaine" lang="fi">Tietoj&#xE4;rjestelm&#xE4;tiede</contributor><contributor type="oppiaine" lang="en">Information Systems Science</contributor><subject type="other">deterrence</subject><subject type="other">information security</subject><subject type="other">compliance</subject><subject type="other">behavior</subject><subject type="other">peloteteoria</subject><subject type="other">informaatioturvallisuus</subject><subject type="other">ohjeidenmukaisuus</subject><subject type="other">k&#xE4;ytt&#xE4;ytyminen</subject><available>2017-05-17T10:13:46Z</available><issued>2017</issued><type lang="fi">Kandidaatintutkielma</type><type lang="en">Bachelor's thesis</type><identifier type="uri">https://jyx.jyu.fi/handle/123456789/53983</identifier><identifier type="urn">URN:NBN:fi:jyu-201705172387</identifier><language type="iso">fin</language><rights lang="fi">Julkaisu on tekij&#xE4;noikeuss&#xE4;&#xE4;nn&#xF6;sten alainen. Teosta voi lukea ja tulostaa henkil&#xF6;kohtaista k&#xE4;ytt&#xF6;&#xE4; varten. K&#xE4;ytt&#xF6; kaupallisiin tarkoituksiin on kielletty.</rights><rights lang="en">This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.</rights><rights type="accesslevel" lang="fi">openAccess</rights><permaddress type="urn">http://www.urn.fi/URN:NBN:fi:jyu-201705172387</permaddress><file bundle="ORIGINAL" href="https://jyx.jyu.fi/bitstream/123456789/53983/1/URN%3aNBN%3afi%3ajyu-201705172387.pdf" name="URN:NBN:fi:jyu-201705172387.pdf" type="application/pdf" length="551422" sequence="1"/><recordID>123456789_53983</recordID></qualifieddc>
id jyx.123456789_53983
language fin
last_indexed 2024-09-03T10:53:13Z
main_date 2017-01-01T00:00:00Z
main_date_str 2017
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstream\/123456789\/53983\/1\/URN%3aNBN%3afi%3ajyu-201705172387.pdf","text":"URN:NBN:fi:jyu-201705172387.pdf","source":"jyx","mediaType":"application\/pdf"}
oppiainekoodi_txtF 601
publication_first_indexed 2017-05-17T20:24:10Z
publishDate 2017
record_format qdc
source_str_mv jyx
spellingShingle Kuhalampi, Mikko Impact of deterrence theory methods on employees' information security behavior deterrence information security compliance behavior peloteteoria informaatioturvallisuus ohjeidenmukaisuus käyttäytyminen
subject_txtF Tietojärjestelmätiede
thumbnail https://jyu.finna.fi/Cover/Show?source=Solr&id=jyx.123456789_53983&index=0&size=large
title Impact of deterrence theory methods on employees' information security behavior
title_full Impact of deterrence theory methods on employees' information security behavior
title_fullStr Impact of deterrence theory methods on employees' information security behavior Impact of deterrence theory methods on employees' information security behavior
title_full_unstemmed Impact of deterrence theory methods on employees' information security behavior Impact of deterrence theory methods on employees' information security behavior
title_short Impact of deterrence theory methods on employees' information security behavior
title_sort impact of deterrence theory methods on employees information security behavior
title_txtP Impact of deterrence theory methods on employees' information security behavior
topic deterrence information security compliance behavior peloteteoria informaatioturvallisuus ohjeidenmukaisuus käyttäytyminen
topic_facet behavior compliance deterrence informaatioturvallisuus information security käyttäytyminen ohjeidenmukaisuus peloteteoria
url https://jyx.jyu.fi/handle/123456789/53983 http://www.urn.fi/URN:NBN:fi:jyu-201705172387
work_keys_str_mv AT kuhalampimikko impactofdeterrencetheorymethodsonemployeesinformationsecuritybehavior