fullrecord |
[{"key": "dc.contributor.advisor", "value": "Makkonen, Pekka", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Koskinen, Ida", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2020-05-06T13:02:39Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2020-05-06T13:02:39Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2020", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/68870", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "T\u00e4m\u00e4n tutkielman tarkoituksena oli tutkia sit\u00e4, miten tietoisuus \u00e4lylaitteiden tietoturvauhkista vaikuttaa \u00e4lylaitteiden k\u00e4ytt\u00f6\u00f6n ja tietoturvauhkilta suojautumiseen. \u00c4lylaitteet lis\u00e4\u00e4ntyv\u00e4t jatkuvasti esineiden internetin my\u00f6t\u00e4 ja nyky\u00e4\u00e4n jopa kodinkoneet ovat yhdistettyin\u00e4 internetiin. T\u00e4m\u00e4n my\u00f6t\u00e4 my\u00f6s tietoturvauhkat voivat kohdistua perinteisten tietokoneiden, \u00e4lypuhelimien ja tablettien lis\u00e4ksi my\u00f6s kodinkoneisiin. Tutkimuksen aluksi toteutettiin kirjallisuuskatsaus siit\u00e4, millaisia tietoturvauhkia \u00e4lylaitteisiin kohdistuu. T\u00e4m\u00e4n pohjalta pystyttiin suunnittelemaan tutkimuksen empiirisen osuuden haastattelu, ja haastatteluun valittiin kirjallisuuden mukaan yleisimm\u00e4t \u00e4lylaitteiden tietoturvauhkat. Empiirisen osuuden tutkimus toteutettiin kvalitatiivisena tutkimuksena ja haastattelu puolistrukturoituna haastatteluna. Haastattelussa pyrittiin kartoittamaan haastateltavien tiet\u00e4myst\u00e4 \u00e4lylaitteisiin kohdistuvista tietoturvauhkista ja heid\u00e4n kokemustansa omasta tietoturvastaan. Lis\u00e4ksi haastattelussa esiteltiin muutama yleisin \u00e4lylaitteisiin kohdistuva tietoturvauhka ja tarkisteltiin, miten esitellyt uhkat vaikuttivat haastateltavien vastauksiin. Haastateltaviksi valittiin tavallisia \u00e4lylaitteiden k\u00e4ytt\u00e4ji\u00e4 sek\u00e4 pari IT-alalla ty\u00f6skentelev\u00e4\u00e4, jotta pystyt\u00e4\u00e4n vertailemaan vastauksia kesken\u00e4\u00e4n. Tutkimuksen tulokset osoittavat, ett\u00e4 mit\u00e4 enemm\u00e4n k\u00e4ytt\u00e4j\u00e4ll\u00e4 on osaamista ja tietoa uhkista, sit\u00e4 motivoituneempi h\u00e4n on suojautumaan erilaisilta uhkilta ja k\u00e4ytt\u00e4\u00e4 \u00e4lylaitteita huolellisemmin. Lis\u00e4ksi tutkimuksen tuloksista huomattiin se, ett\u00e4 mit\u00e4 enemm\u00e4n k\u00e4ytt\u00e4j\u00e4ll\u00e4 on tietoa uhkista ja mit\u00e4 enemm\u00e4n h\u00e4n on tehnyt tietoturvaa parantavia toimia, sit\u00e4 huolestuneempi h\u00e4n on omasta tietoturvastaan. Sen sijaan k\u00e4ytt\u00e4j\u00e4t, jotka eiv\u00e4t olleet tehneet mink\u00e4\u00e4nlaisia tietoturvaa parantavia toimia, kokivat omat tietonsa parhaiten turvatuiksi, eiv\u00e4tk\u00e4 n\u00e4in ollen kokeneet tietoturvaratkaisuita tarpeellisiksi.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "The aim of this study was to find out how awareness of information security issues in the internet of things and smart devices affect how devices are used and what actions users have done to improve information security. The number of smart devices is increasing all the time as a result of internet of things. Therefore, not only computers, smart phones and tablets are prone to information security issues, but also household appliances such as fridge and heating system. First step of this study was to write a literature review on what kind of information security issues are there for smart devices. Based on literature review, the interviews could be planned for study\u2019s empirical part. The most common information security threats for smart devices were selected for the interviews from literature. The empirical research was implemented as qualitative research and interviews as semi-structured interviews. The aim of the interview was to take a closer look of how much interviewees know about information security threats for smart devices and what are their experiences about their own information security. Furthermore, during the interviews few most common information security threats were introduced to interviewees and researched how these threats affect to interviewees\u2019 answers. Normal smart device users were selected for the interviews and also a couple of professionals from the IT field were selected so that their answers could be compared to normal users\u2019 answers. The main finding of this study is that the more user has a knowledge of threats, the more motivated he is to do actions to protect his information and the more careful he is when using smart devices. Furthermore, the more user has a knowledge of threats and the more he has done actions to improve his information security, the more concerned he is about his information security. Instead the users who haven\u2019t done any improvements for their information security were thinking that their information is well secured, and they didn\u2019t think they need any actions to improve security.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2020-05-06T13:02:39Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2020-05-06T13:02:39Z (GMT). No. of bitstreams: 0\n Previous issue date: 2020", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "58", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "\u00e4lylaitteet", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tietoturvauhkat", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "k\u00e4ytt\u00e4jien kokemus", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Miten tietoisuus \u00e4lylaitteiden tietoturvauhkista vaikuttaa \u00e4lylaitteiden k\u00e4ytt\u00f6\u00f6n", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202005063081", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "Internet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "esineiden internet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "haittaohjelmat", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietosuoja", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "k\u00e4ytt\u00e4j\u00e4t", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
|