fullrecord |
[{"key": "dc.contributor.advisor", "value": "Siponen, Mikko", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.advisor", "value": "R\u00f6nkk\u00f6, Mikko", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Sepp\u00e4nen, Pyry", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2019-02-04T07:07:14Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2019-02-04T07:07:14Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2018", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/62670", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "T\u00e4ss\u00e4 pro gradu \u2013tutkielmassa k\u00e4sitell\u00e4\u00e4n \u00e4lypuhelink\u00e4ytt\u00e4jien aikomusta k\u00e4yt-t\u00e4\u00e4 \u00e4lypuhelinten tietoturvaominaisuuksia henkil\u00f6kohtaisen \u00e4lypuhelimensa suojauksessa. Tutkielma selvitt\u00e4\u00e4 millaisia uhkia \u00e4lypuhelimiin ja niiden sis\u00e4lt\u00e4miin tietoihin kohdistuu. Uhkien lis\u00e4ksi esitell\u00e4\u00e4n \u00e4lypuhelimiin kuuluvia tietoturvaominaisuuksia, joita k\u00e4ytt\u00e4m\u00e4ll\u00e4 k\u00e4ytt\u00e4j\u00e4 voi itse vaikuttaa laitteensa tietoturvaan.\nUhkien ja ominaisuuksien lis\u00e4ksi k\u00e4ytt\u00e4jien tietoturvak\u00e4yt\u00f6st\u00e4 ja siihen liittyv\u00e4\u00e4 aikomusta tarkastellaan tietoturvak\u00e4yt\u00e4nteiden noudattamisen yhten\u00e4ismallin, eli Unified Model of Information Security Policy Compliance:n avulla, jonka avulla on tarkoitus selvitt\u00e4\u00e4, mitk\u00e4 tekij\u00e4t vaikuttavat kyseiseen aikomukseen. T\u00e4m\u00e4n lis\u00e4ksi aikomukseen liittyv\u00e4\u00e4 teoriaa t\u00e4ydennet\u00e4\u00e4n aiemmalla tutkimuksella aiheeseen liittyen, jotta malli saadaan asetettua \u00e4lypuhelinkontekstiin.\nUMISPC-mallin ja aiemman tutkimuksen perusteella on luotu m\u00e4\u00e4r\u00e4llinen kyselytutkimus, jonka avulla mallin soveltuvuutta \u00e4lypuhelinkontekstiin testataan. Mallin testaamisen lis\u00e4ksi tavoitteena on vastata tutkimuskysymykseen \u201dMitk\u00e4 ennalta m\u00e4\u00e4ritellyt tekij\u00e4t vaikuttavat \u00e4lypuhelink\u00e4ytt\u00e4j\u00e4n tietoturva-aikomukseen?\u201d", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "This master\u2019s thesis discusses the intention of a smartphone user using the in-formation security features in securing their personal smartphone. The thesis examines the threats smartphones and the personalized data within them are facing. Along with the introduction of threats towards smartphone security, features that help the users in securing their phones against such threats are examined.\nAlong with threats and smartphone security features, the users\u2019 intentions of securing their devices are studied through the Unified Model of Information Security Policy Compliance. The model helps to clarify the factors that influence the users\u2019 intention of engaging in safe information security behavior. In addition, prior research on the topic of intention is examined in order to make the UMISPC fit better in the context of smartphone users.\nAn online survey was created using the model, its theories and prior studies which all were used as the basis of the survey. The aim of the survey is to test the validity of the UMISPC. In addition, the goal is to answer the research question: \u201cWhich predefined factors affect the smartphone user\u2019s intention of security compliance?\u201d", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2019-02-04T07:07:14Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2019-02-04T07:07:14Z (GMT). No. of bitstreams: 0\n Previous issue date: 2018", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "75", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "user", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "compliance", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "data", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "aikomus", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "A\u0308lypuhelinka\u0308ytta\u0308ja\u0308n tietoturva-aikomus henkilo\u0308kohtaisen datan suojaamisessa", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201902041384", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "\u00e4lypuhelimet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "k\u00e4ytt\u00e4j\u00e4t", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "laitteet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "Android", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "haittaohjelmat", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "mobiililaitteet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
|