fullrecord |
[{"key": "dc.contributor.advisor", "value": "Salo, Markus", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Hokkanen, Jan", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2020-08-28T10:04:21Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2020-08-28T10:04:21Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2020", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/71540", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Viime vuosien aikana tietojenk\u00e4sittely-ymp\u00e4rist\u00f6 on kokenut voimakkaita\nmuutoksia. N\u00e4kyvin\u00e4 esimerkkein\u00e4 tapahtuneesta muutoksesta ovat muun\nmuassa pilvipalveluiden k\u00e4yt\u00f6n arkip\u00e4iv\u00e4istyminen ja verkkoon kytkeytyvien\nlaitteiden m\u00e4\u00e4r\u00e4n valtava kasvu. My\u00f6s omien laitteiden k\u00e4ytt\u00f6 ty\u00f6paikalla on\nyh\u00e4 tavanomaisempaa. Tietojenk\u00e4sittely-ymp\u00e4rist\u00f6n muutokset tuovat\nmukanaan moninaisempia ty\u00f6skentelytapoja ja tuottavat monia hy\u00f6tyj\u00e4 niin\nhenkil\u00f6st\u00f6lle kuin organisaatiolle. Samanaikaisesti tietojenk\u00e4sittely-ymp\u00e4rist\u00f6n\nmuutokset tuovat kuitenkin mukanaan my\u00f6s uudenlaisia tietoturvauhkia.\nSuojautuessaan ilmenevi\u00e4 uhkia vastaan organisaatiot investoivat yh\u00e4\nenemm\u00e4n uusiin tietoturvateknologioihin ja asettavat alati laajemmalla\nulottuvia tietoturvavaatimuksia, joilla pyrit\u00e4\u00e4n ohjaamaan henkil\u00f6st\u00f6n\ntoimintaa. Henkil\u00f6st\u00f6n merkityst\u00e4 organisaation tietoturvalle ei tule aliarvioida,\nsill\u00e4 aiemmat tutkimukset ovat osoittaneet, ett\u00e4 henkil\u00f6st\u00f6n tekem\u00e4t\nlaiminly\u00f6nnit voivat merkitt\u00e4v\u00e4sti heikent\u00e4\u00e4 organisaation tietoturvaa.\nAiemmissa tutkimuksissa on lis\u00e4ksi havaittu, ett\u00e4 altistuminen stressille saattaa\nmuuttaa henkil\u00f6st\u00f6n tietoturvak\u00e4ytt\u00e4ytymist\u00e4 tietoturvaa heikent\u00e4v\u00e4\u00e4n\nsuuntaan. Tutkielmassa pyrittiin teoreettisk\u00e4sitteellisell\u00e4 l\u00e4hestymistavalla\nmuodostamaan aiempaa kokonaisvaltaisempi ymm\u00e4rrys tutkimusalueesta.\nKeskeisimp\u00e4n\u00e4 tutkimustavoitteena oli muodostaa synteesi\ntietoturvak\u00e4ytt\u00e4ytymiseen vaikuttavista yksil\u00f6tason stressinhallintakeinoista.\nTutkielmassa pyrittiin my\u00f6s muodostamaan aiemman kirjallisuuden pohjalta\nkokonaisvaltainen n\u00e4kemys niist\u00e4 organisaatiotason tekij\u00f6ist\u00e4, jotka vaikuttavat\nvahingollisten stressitekij\u00f6iden ennaltaehk\u00e4isyyn ja tietoturvak\u00e4ytt\u00e4ytymiselle\nhaitallisten yksil\u00f6tason stressinhallintakeinojen lievent\u00e4miseen. Tutkielmassa\ntunnistettiin lis\u00e4ksi keskeisi\u00e4 tutkimusalueita, joiden tarkastelu\njatkotutkimuksissa on ensiarvoisen t\u00e4rke\u00e4\u00e4 syv\u00e4llisemm\u00e4n ymm\u00e4rryksen\nsaavuttamiseksi. Tutkielmassa esitet\u00e4\u00e4n my\u00f6s lukuisia johtop\u00e4\u00e4t\u00f6ksi\u00e4\nk\u00e4yt\u00e4nn\u00f6n kannalta, jotka voivat edesauttaa organisaatioita v\u00e4ltt\u00e4m\u00e4\u00e4n\nnegatiivisia yksil\u00f6tason ja organisaatiotason seuraamuksia.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "In recent years, the computing environment has undergone drastic changes.\nVisible examples of the change include the increasing usage of cloud services\nand the huge increase in the number of devices connected to the internet. In\naddition, BYOD or \u201cbring your own device\u201d is ever more popular phenomenon\nat workplaces. Changes in the computing environment enable more diverse\nways of working and bring benefits to both employees and the organization.\nHowever, at the same time these changes may expose organizations to new\ntypes of security threats. As organizations protect themselves against emerging\nthreats, they increasingly invest in security technologies and impose everexpanding security requirements. Previous research has shown the importance\nof employees for organizations information security. In addition, previous\nstudies have found that exposure to stress may have impairing effect on\ninformation security behavior. The aim of the thesis was to use a theoretical\nconceptual approach to develop a more holistic understanding of the research\narea. The main research goal was to form a synthesis of individual-level stress\nmanagement measures influencing information security behavior. In addition,\nthe thesis sought to form a holistic view of the organizational level factors that\ncontribute to the prevention of harmful stressors and the mitigation of\nindividual-level stress management measures that are detrimental to\ninformation security behavior. Thesis also identified key research areas that\nneed to be addressed in further research to achieve a deeper understanding. In\naddition, thesis presents numerous conclusions from a practical point of view\nwhich can help organizations to avoid negative consequences caused by\nstressors and individual-level stress management measures.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2020-08-28T10:04:21Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2020-08-28T10:04:21Z (GMT). No. of bitstreams: 0\n Previous issue date: 2020", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "105", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "tietoturvak\u00e4ytt\u00e4ytyminen", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "turvallisuusstressi", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "teknostressi", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "selviytymiskeinot", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Stressil\u00e4ht\u00f6inen n\u00e4k\u00f6kulma tietoturvak\u00e4ytt\u00e4ytymiseen", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202008285670", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "stressi", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "stressinhallinta", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
|