fullrecord |
[{"key": "dc.contributor.advisor", "value": "Salo, Markus", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Imberg, Anssi", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Hokkanen, Jan", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2019-05-23T06:21:07Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2019-05-23T06:21:07Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2019", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/64133", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Nyky\u00e4\u00e4n tietokoneiden k\u00e4ytt\u00e4j\u00e4t altistuvat uudenlaisille uhille ja erilaisia uhkia my\u00f6s kohdataan aiempaa useammin. Henkil\u00f6st\u00f6ll\u00e4 on hyvin merkitt\u00e4v\u00e4 rooli koko organisaation tietoj\u00e4rjestelmien ja -verkkojen turvallisuuden muodostumisessa, sill\u00e4 he voivat aiheuttaa suuren uhan organisaatioiden tietoturvallisuudelle \u2014 joko tahallisesti tai tahattomasti. Usein tietoturvallista k\u00e4ytt\u00e4ytymist\u00e4 pyrit\u00e4\u00e4n vahvistamaan lis\u00e4\u00e4m\u00e4ll\u00e4 henkil\u00f6st\u00f6n tietoturvatietoisuutta, eli ymm\u00e4rryst\u00e4 tietoturvasta ja sen mahdollisista ongelmista. Koulutuksella ja harjoituksilla ei kuitenkaan v\u00e4ltt\u00e4m\u00e4tt\u00e4 kyet\u00e4 poistamaan esimerkiksi huolimattomuutta tai piittaamattomuutta, mik\u00e4 saattaa aiheuttaa erilaisia tietoturvaongelmia ja -uhkia. Tutkimuksen tavoitteena oli koostaa malli, jonka avulla voitaisiin havainnoida tietoturvak\u00e4ytt\u00e4ytymist\u00e4 ja sen muutosta. Aiemmissa tutkimuksissa on pyritty verifioimaan p\u00e4\u00e4asiassa vain yleisi\u00e4 ja pysyvi\u00e4 tekij\u00f6it\u00e4, joiden avulla voitaisiin ennustaa tietoturvak\u00e4ytt\u00e4ytymist\u00e4. T\u00e4m\u00e4n vuoksi huomio kiinnittyi erityisesti tietoturvak\u00e4ytt\u00e4ytymisen muutokseen vaikuttaviin tilannetekij\u00f6ihin, joita ei aiemmissa tutkimuksissa ole riitt\u00e4v\u00e4sti huomioitu. Lis\u00e4ksi tutkielmassa tarkasteltiin, kuinka muuttuva tietojenk\u00e4sittely-ymp\u00e4rist\u00f6 ja erityisesti pilvipalveluymp\u00e4rist\u00f6 vaikuttavat tietoturvak\u00e4ytt\u00e4ytymiseen. Viitekehyksen koostamiseksi toteutettiin systemaattinen kirjallisuuskatsaus, jossa tarkasteltiin tieteellisten julkaisujen pohjalta tietoturvak\u00e4ytt\u00e4ytymisen ominaispiirteit\u00e4. Kirjallisuuskatsauksen pohjalta tunnistettiin kahdeksan tietoturvak\u00e4ytt\u00e4ytymisen ominaispiirrett\u00e4 sek\u00e4 sen merkitt\u00e4vimm\u00e4t l\u00e4hik\u00e4sitteet. Kirjallisuuskatsauksessa syvennyttiin my\u00f6s lukuisiin erilaisiin motivaation sis\u00e4lt\u00f6- ja prosessiteorioihin, joiden avulla tietoturvak\u00e4ytt\u00e4ytymisen muutosta voitaisiin mallintaa. Tutkimuksen kohteeksi valittiin ty\u00f6ntekij\u00e4t matkailualan pienyrityksist\u00e4, jotka hy\u00f6dynt\u00e4v\u00e4t liiketoiminnassaan pilvipalvelupohjaista varausj\u00e4rjestelm\u00e4\u00e4. Tutkimus toteutettiin kvalitatiivisena tutkimuksena ja aineisto ker\u00e4ttiin teemahaastatteluiden (n=20) avulla. Tutkimus osoitti, ett\u00e4 lukuisat erilaiset tilannetekij\u00e4t vaikuttavat tietoturvak\u00e4ytt\u00e4ytymiseen ja sen muutokseen. Lis\u00e4ksi pilvipalvelukontekstin havaittiin voivan vaikuttaa niin positiivisesti kuin negatiivisestikin k\u00e4ytt\u00e4jien tietoturvak\u00e4ytt\u00e4ytymiseen. Tutkimuksen pohjalta koostettiin malli, joka n\u00e4ytti kuvaavan hyvin tietoturvak\u00e4ytt\u00e4ytymist\u00e4 ja sen muutosta kohdejoukossa. Jatkotutkimuksissa voitaisiin analysoida mallin toimivuutta erilaisilla toimialoilla sek\u00e4 esimerkiksi tiimiolosuhteissa.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Nowadays, computer users are exposed to new types of threats, and the threats are also faced more often than ever before. Users have a very important role in the security of information systems and networks throughout their organizations, as they can pose a major threat to the organizations\u2019 security - either intentionally or unintentionally. Usually, organizations try to improve the employees\u2019 information security behavior by increasing their information security awareness by developing understanding about the information security and highlighting the potential security problems. However, training and exercises may not be able to eliminate, for example, negligence or recklessness, which may cause various security issues and threats. The aim of the study was to compile a model that could be used to detect information security behavior and its change. Previous studies have mainly attempted to verify only general and permanent factors that could predict information security behavior. Therefore, the focus was especially on the factors affecting information security behavior, which were not sufficiently considered in the previous studies. In addition, the thesis examined how the changing computing environment and cloud services affect information security behavior. To create a reference framework, a systematic literature review was carried out, in which the characteristics of information security behavior were reviewed based on previous scientific publications. Based on the literature review, eight characteristics of information security behavior and its most significant near-term concepts were identified. The literature review also focused on several different motivational content and process theories that could be used to model the change in information security behavior. Employees from small businesses in the tourism industry, who use a cloud-based reservation system in their business, were selected for the research\u2019s target area. The research was carried out as a qualitative study and the material was collected via theme interviews (n = 20). Phenomenological-hermeneutical perspectives and narrative approaches were used to analyze the data. The study showed that numerous different situational factors influence information security behavior and its change. In addition, the cloud service context was found to have both positive and negative effects on users\u2019 information security behavior. Based on the research, a model was built, and it seemed to describe well information security behavior and its change in the target population. Further research could analyze the functionality of the model in different industries and, for example, in team working.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2019-05-23T06:21:07Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2019-05-23T06:21:07Z (GMT). No. of bitstreams: 0\n Previous issue date: 2019", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "117", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.title", "value": "Tietoturvak\u00e4ytt\u00e4ytyminen suomalaisissa matkailualan pienyrityksiss\u00e4", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201905232747", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.collaborator", "value": "business", "language": "", "element": "contractresearch", "qualifier": "collaborator", "schema": "yvv"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "yvv.contractresearch.initiative", "value": "student", "language": "", "element": "contractresearch", "qualifier": "initiative", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "pienyritykset", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "matkailuala", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "motivaatio", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "k\u00e4ytt\u00e4ytyminen", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
|