fullrecord |
[{"key": "dc.contributor.advisor", "value": "Siponen, Mikko", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.advisor", "value": "R\u00f6nkk\u00f6, Mikko", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Per\u00e4m\u00e4ki, Henri", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Sulander, Juha-Matti", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2018-08-29T07:16:36Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2018-08-29T07:16:36Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2018", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/59362", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "T\u00e4ss\u00e4 Pro Gradu -tutkielmassa tutkittiin ty\u00f6asemien lukitsemiseen vaikuttamista s\u00e4hk\u00f6postitse l\u00e4hetettyjen interventioviestien avulla. Ty\u00f6aseman lukitseminen on t\u00e4rke\u00e4 k\u00e4ytt\u00e4j\u00e4n vastuulla oleva tietoturvatoimi ja sen laiminly\u00f6minen voi mahdollistaa ulkopuolisen p\u00e4\u00e4syn j\u00e4rjestelmiin ja tietoon. Aiempi tietoturvak\u00e4ytt\u00e4ytymisen tutkimus on keskittynyt suurelta osin kyselytutkimuksiin, joilla on selvitetty k\u00e4ytt\u00e4ytymisen aietta. Todellista k\u00e4ytt\u00e4ytymist\u00e4 oikeassa organisaatioymp\u00e4rist\u00f6ss\u00e4 havainnoivia ja siihen vaikuttamaan pyrkivi\u00e4 tutkimuksia on tehty hyvin v\u00e4h\u00e4n. T\u00e4ss\u00e4 ty\u00f6ss\u00e4 raportoidussa tutkimuksessa organisaation henkil\u00f6kunnalle l\u00e4hetettiin s\u00e4hk\u00f6postitse interventioviesti, jonka tarkoituksena oli lis\u00e4t\u00e4 ty\u00f6asemien lukitsemista. Viestin l\u00e4hetys toistettiin yhteens\u00e4 kolme kertaa ja viestien vaikutusta todelliseen lukitsemisk\u00e4ytt\u00e4ytymiseen havainnoitiin yhteens\u00e4 noin vuoden ajan. \n\nViestien sis\u00e4ll\u00f6n vaikutusta tutkittiin viestej\u00e4 manipuloimalla. Kirjallisuuskatsauksen perusteella viestien pohjaksi valittiin kaksi eri teoriaa: suojelumotivaatioteoria sek\u00e4 prospektiteorian mukainen viitekehyksen vaikutus. Suojelumotivaatioteoriaan perustuvia viestej\u00e4 manipuloimalla pyrittiin vaikuttamaan uhka-arvioon ja selviytymisarvioon. Viitekehyksen huomioivissa viesteiss\u00e4 k\u00e4ytettiin negatiivista ja positiivista kehyst\u00e4mist\u00e4. Molempien teoriapohjien osalta manipuloitiin my\u00f6s uhkan henkil\u00f6kohtaisen relevanssin painotusta sek\u00e4 kuvailun tarkkuuden tasoa. \n\nInterventioilla saatiin vaikutettua positiivisesti ty\u00f6asemien lukitsemiseen. Kaksi ensimm\u00e4ist\u00e4 interventiota lis\u00e4si ty\u00f6asemien p\u00e4ivitt\u00e4ist\u00e4 lukitsemista keskim\u00e4\u00e4rin yhteens\u00e4 l\u00e4hes 30 % kolmannen intervention vaikutuksen j\u00e4\u00e4dess\u00e4 v\u00e4h\u00e4isemm\u00e4ksi. Ei yht\u00e4\u00e4n lukitusta sis\u00e4lt\u00e4neiden kirjautumissessioiden p\u00e4ivitt\u00e4inen osuus kaikista sessioista laski havaintojakson aikana yhteens\u00e4 noin 40 %. \n\nEnsimm\u00e4isen intervention osalta selitt\u00e4vien tekij\u00f6iden vaikutusta tutkittiin regressioanalyysin ja marginaalivaikutusten avulla. Tutkimuksessa havaittiin viitekehysvaikutuksen olevan suojelumotivaatioteoriaa tehokkaampi. Suojelumotivaatioteorian uhkan korostaminen tehosi jo ennest\u00e4\u00e4n paljon lukitseviin k\u00e4ytt\u00e4jiin ja selviytymisarvioon vaikuttaminen puolestaan v\u00e4h\u00e4n lukitseviin. Viitekehysvaikutuksen osalta positiivinen kehys oli negatiivista tehokkaampi. Henkil\u00f6kohtaisen relevanssin korostaminen saattoi hieman lis\u00e4t\u00e4 intervention vaikutusta v\u00e4h\u00e4n lukitsevilla. Kuvailun tarkkuuden tasoilla ei havaittu tehoeroa.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "In this Master's Thesis the efficacy of an email intervention in improving the locking of workstations was investigated. Locking the workstation is a crucially important security measure that the user is responsible for. Neglecting this could result in unauthorized access to the information systems by a 3rd party. Previous research on information security behavior has focused mainly on survey studies that have used behavioral intention as the dependent variable. Studies observing actual behavior in a real organizational context have received significantly less attention. In this experiment an email message was sent to the staff of an organization in attempt to increase the locking of workstations. The intervention was repeated three times in total and the actual behavior was observed for a period of one year. \n\nThe effect of message content was studied by manipulating the messages according to two different theories. The theories used in this study were Protection Motivation Theory (PMT) and Prospect Theory based message framing effect. Regarding PMT, the aim was to affect the cognitive threat appraisal and coping appraisal processes. With message framing both positive and negative framing was used. In addition, personal relevance of the threat and the amount of details included in the messages were manipulated. \n\nThe interventions had a positive effect on the locking of workstations. The first two interventions increased the amount of daily locks by approximately 30 % combined. A small but positive change was observed for the third intervention. The relative daily amount of sessions with no lock events decreased by 40 percent. \n\nMultiple linear regression and average marginal effects were used to study the relationship between the manipulations made to the messages and the observed change in the locking of workstations in the first intervention. Messages that were based on framing effect were found more effective than messages based on PMT. Emphasizing the threat was effective on users who locked workstations more than an average user, whereas affecting the coping appraisal was effective on users who locked workstations less. Positive message framing was more effective than negative message framing. Emphasizing the personal relevance increased the effect of the intervention on those who locked workstations less than an average user. Manipulating the amount of detail did not have a noticeable effect.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2018-08-29T07:16:35Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2018-08-29T07:16:36Z (GMT). No. of bitstreams: 0\n Previous issue date: 2018", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "140", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "tietoturvak\u00e4ytt\u00e4ytyminen", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "ty\u00f6aseman lukitseminen", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "viitekehysvaikutus", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "suojelumotivaatioteoria", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Ty\u00f6asemien lukitsemiseen vaikuttaminen : pitkitt\u00e4inen interventiotutkimus", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201808293956", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "interventio", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "ty\u00f6asemat", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "Windows", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|