Impact of deterrence theory methods on employees' information security behavior

Peloteteoria (Deterrence theory) on alun perin psykologiassa ja kriminologiassa käytetty termi, ja sen mukaan rangaistuksen pelko estää yksilöä toimimasta vastoin lakia ja sääntöjä. Digitalisoituvassa maailmassa on viimeisen kahdenkymmenen vuoden aikana tehty paljon tutkimusta, jossa peloteteoriaa o...

Full description

Bibliographic Details
Main Author: Kuhalampi, Mikko
Other Authors: Informaatioteknologian tiedekunta, Faculty of Information Technology, Informaatioteknologia, Information Technology, University of Jyväskylä, Jyväskylän yliopisto
Format: Bachelor's thesis
Language:fin
Published: 2017
Subjects:
Online Access: https://jyx.jyu.fi/handle/123456789/53983
_version_ 1826225814715236352
author Kuhalampi, Mikko
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology University of Jyväskylä Jyväskylän yliopisto
author_facet Kuhalampi, Mikko Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology University of Jyväskylä Jyväskylän yliopisto Kuhalampi, Mikko Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology University of Jyväskylä Jyväskylän yliopisto
author_sort Kuhalampi, Mikko
datasource_str_mv jyx
description Peloteteoria (Deterrence theory) on alun perin psykologiassa ja kriminologiassa käytetty termi, ja sen mukaan rangaistuksen pelko estää yksilöä toimimasta vastoin lakia ja sääntöjä. Digitalisoituvassa maailmassa on viimeisen kahdenkymmenen vuoden aikana tehty paljon tutkimusta, jossa peloteteoriaa on sovellettu tietojärjestelmien sekä tietoturvakäyttäytymisen kontekstiin. Tutkielma käsittelee käytössä olevia peloteteorian keinoja tässä kontekstissa sekä nii-den vaikutuksia työntekijöiden tietoturvakäyttäytymiseen. Tutkielma on toteutettu kirjallisuuskatsauksena ja sen tarkoitus on määritellä peloteteorian käsitettä tietojärjestelmien ja tietoturvakäyttäytymisen kontekstissa sekä tutkia olemassa olevia keinoja ja niiden vaikutuksia. Tutkimuksen tuloksina voidaan todeta, ettei ole olemassa absoluuttista totuutta peloteteori-an keinojen vaikutuksista työntekijöiden käyttäytymiseen. Tämä johtuu siitä, että tuloksiin vaikuttavat myös esimerkiksi yksilön ominaisuudet, toimintaympäristö ja kulttuuri. Peloteteoria on edelleen tutkituimpia teorioita työntekijöiden tietoturvakäyttäytymisen kontekstissa, ja aiheen tutkimus jatkuu varmasti myös tulevaisuudessa. Deterrence theory is originally a term used in psychology and criminology. According to the theory sanction fear prevents individuals from committing illicit acts against the rules. As the corporate world digitalizes, there has been a lot of research on the topic in the context of information systems and security policy compliance in the last 20 years. This study examines the deterrence theory methods and their impacts in employees’ information security behavior. This study is implemented as a literary review and its purpose is to define de-terrence theory in the context of information systems and information security compliance as well as study the existing methods and their impacts on employee behavior. The results of the study suggest that there is no absolute truth about the impacts of the deterrence theory methods in the information security behavior of the employees. This is because there are other variables that influence the results, such as qualities of the employees, working environment and culture. Deterrence theory is one of the most-used theories in the context of information security behavior, and research on the topic will surely continue in the future.
first_indexed 2017-05-17T20:24:10Z
format Kandityö
free_online_boolean 1
fullrecord [{"key": "dc.contributor.advisor", "value": "Moilanen, Panu", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Kuhalampi, Mikko", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2017-05-17T10:13:46Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2017-05-17T10:13:46Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2017", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/53983", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Peloteteoria (Deterrence theory) on alun perin psykologiassa ja kriminologiassa k\u00e4ytetty termi, ja sen mukaan rangaistuksen pelko est\u00e4\u00e4 yksil\u00f6\u00e4 toimimasta vastoin lakia ja s\u00e4\u00e4nt\u00f6j\u00e4. Digitalisoituvassa maailmassa on viimeisen kahdenkymmenen vuoden aikana tehty paljon tutkimusta, jossa peloteteoriaa on sovellettu tietoj\u00e4rjestelmien sek\u00e4 tietoturvak\u00e4ytt\u00e4ytymisen kontekstiin. Tutkielma k\u00e4sittelee k\u00e4yt\u00f6ss\u00e4 olevia peloteteorian keinoja t\u00e4ss\u00e4 kontekstissa sek\u00e4 nii-den vaikutuksia ty\u00f6ntekij\u00f6iden tietoturvak\u00e4ytt\u00e4ytymiseen.\n\nTutkielma on toteutettu kirjallisuuskatsauksena ja sen tarkoitus on m\u00e4\u00e4ritell\u00e4 peloteteorian k\u00e4sitett\u00e4 tietoj\u00e4rjestelmien ja tietoturvak\u00e4ytt\u00e4ytymisen kontekstissa sek\u00e4 tutkia olemassa olevia keinoja ja niiden vaikutuksia. Tutkimuksen tuloksina voidaan todeta, ettei ole olemassa absoluuttista totuutta peloteteori-an keinojen vaikutuksista ty\u00f6ntekij\u00f6iden k\u00e4ytt\u00e4ytymiseen. T\u00e4m\u00e4 johtuu siit\u00e4, ett\u00e4 tuloksiin vaikuttavat my\u00f6s esimerkiksi yksil\u00f6n ominaisuudet, toimintaymp\u00e4rist\u00f6 ja kulttuuri. Peloteteoria on edelleen tutkituimpia teorioita ty\u00f6ntekij\u00f6iden tietoturvak\u00e4ytt\u00e4ytymisen kontekstissa, ja aiheen tutkimus jatkuu varmasti my\u00f6s tulevaisuudessa.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Deterrence theory is originally a term used in psychology and criminology. According to the theory sanction fear prevents individuals from committing illicit acts against the rules. As the corporate world digitalizes, there has been a lot of research on the topic in the context of information systems and security policy compliance in the last 20 years. This study examines the deterrence theory methods and their impacts in employees\u2019 information security behavior. \n\nThis study is implemented as a literary review and its purpose is to define de-terrence theory in the context of information systems and information security compliance as well as study the existing methods and their impacts on employee behavior. The results of the study suggest that there is no absolute truth about the impacts of the deterrence theory methods in the information security behavior of the employees. This is because there are other variables that influence the results, such as qualities of the employees, working environment and culture. Deterrence theory is one of the most-used theories in the context of information security behavior, and research on the topic will surely continue in the future.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted using Plone Publishing form by Mikko Kuhalampi (mivikuha) on 2017-05-17 10:13:45.751454. Form: Kandidaatintutkielma -lomake (https://kirjasto.jyu.fi/julkaisut/julkaisulomakkeet/kandin-tutkielma-lomake). JyX data: [jyx_publishing-allowed (fi) =True]", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2017-05-17T10:13:46Z\nNo. of bitstreams: 2\nURN:NBN:fi:jyu-201705172387.pdf: 551422 bytes, checksum: be8b60cdb99eb5625df8876ff7254dc4 (MD5)\nlicense.html: 4826 bytes, checksum: 09f217231626fd2e8a20cb32efddea87 (MD5)", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2017-05-17T10:13:46Z (GMT). No. of bitstreams: 2\nURN:NBN:fi:jyu-201705172387.pdf: 551422 bytes, checksum: be8b60cdb99eb5625df8876ff7254dc4 (MD5)\nlicense.html: 4826 bytes, checksum: 09f217231626fd2e8a20cb32efddea87 (MD5)\n Previous issue date: 2017", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "29", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "deterrence", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "information security", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "compliance", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "behavior", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "peloteteoria", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "informaatioturvallisuus", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "ohjeidenmukaisuus", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "k\u00e4ytt\u00e4ytyminen", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Impact of deterrence theory methods on employees' information security behavior", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201705172387", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatintutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.date.updated", "value": "2017-05-17T10:13:46Z", "language": null, "element": "date", "qualifier": "updated", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": "fi", "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
id jyx.123456789_53983
language fin
last_indexed 2025-02-18T10:56:09Z
main_date 2017-01-01T00:00:00Z
main_date_str 2017
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstreams\/ff30f549-47a1-43c1-b48b-b6fde93bffda\/download","text":"URN:NBN:fi:jyu-201705172387.pdf","source":"jyx","mediaType":"application\/pdf"}
publishDate 2017
record_format qdc
source_str_mv jyx
spellingShingle Kuhalampi, Mikko Impact of deterrence theory methods on employees' information security behavior deterrence information security compliance behavior peloteteoria informaatioturvallisuus ohjeidenmukaisuus käyttäytyminen Tietojärjestelmätiede Information Systems Science
title Impact of deterrence theory methods on employees' information security behavior
title_full Impact of deterrence theory methods on employees' information security behavior
title_fullStr Impact of deterrence theory methods on employees' information security behavior Impact of deterrence theory methods on employees' information security behavior
title_full_unstemmed Impact of deterrence theory methods on employees' information security behavior Impact of deterrence theory methods on employees' information security behavior
title_short Impact of deterrence theory methods on employees' information security behavior
title_sort impact of deterrence theory methods on employees information security behavior
title_txtP Impact of deterrence theory methods on employees' information security behavior
topic deterrence information security compliance behavior peloteteoria informaatioturvallisuus ohjeidenmukaisuus käyttäytyminen Tietojärjestelmätiede Information Systems Science
topic_facet Information Systems Science Tietojärjestelmätiede behavior compliance deterrence informaatioturvallisuus information security käyttäytyminen ohjeidenmukaisuus peloteteoria
url https://jyx.jyu.fi/handle/123456789/53983 http://www.urn.fi/URN:NBN:fi:jyu-201705172387
work_keys_str_mv AT kuhalampimikko impactofdeterrencetheorymethodsonemployeesinformationsecuritybehavior