Subjective norm in password selection

Salasanoja käytetään yleisesti pääasiallisena todentamismenetelmänä ja siksi ne ovat näyttelevt suurta roolia käyttäjän tietoturvassa. Epäturvalliset salasanat voivat monin tavoin vaarantaa käyttäjän tietoturvan. Tässä tutkielmassa pyritään selvittämään miten subjektiiviset normit vaikuttavat käyttä...

Full description

Bibliographic Details
Main Author: Aunola, Miika
Other Authors: Informaatioteknologian tiedekunta, Faculty of Information Technology, Informaatioteknologia, Information Technology, Jyväskylän yliopisto, University of Jyväskylä
Format: Master's thesis
Language:eng
Published: 2020
Subjects:
Online Access: https://jyx.jyu.fi/handle/123456789/72575
_version_ 1826225755548286976
author Aunola, Miika
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_facet Aunola, Miika Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Aunola, Miika Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_sort Aunola, Miika
datasource_str_mv jyx
description Salasanoja käytetään yleisesti pääasiallisena todentamismenetelmänä ja siksi ne ovat näyttelevt suurta roolia käyttäjän tietoturvassa. Epäturvalliset salasanat voivat monin tavoin vaarantaa käyttäjän tietoturvan. Tässä tutkielmassa pyritään selvittämään miten subjektiiviset normit vaikuttavat käyttäjän salasanavalintaan. Subjektiivinen normi on osatekijä useissa käyttäytymistieteiden teorioissa ja sillä tarkoitetaan sosiaalisen ympäristön luomia odotuksia, joita yksilö kokee sekä tämän motivaatiota toimia näiden odotusen mukaisesti (Fishbein & Ajzen, 1975). Subjektiivisen normin merkitystä kyseenalaistettu (Ahtola 1976) ja sitä koskeva tutkimus on tuottanut vaihtelevia tuloksia (Sommestad et al. 2014). Tässä tutkielmassa tarkasteltiin subjektiivisten normien merkitystä salasanan valintaan kirjallisuuskatsauksella sekä tätä seuranneella käsitteellis-analyyttisellä tutkimuksmenetelmällä. Käsitteellis-analyyttisessä osiossa kirjallisuuskatsauksen löydöksiä analysoitiin kolmen erillisen skenaarion kautta. Tutkimuksessa ilmeni että subjektiivisten normien merkittävyys salasanan valintaa selittävänä osatekijänä on kyseenalainen. Aikaisempi tutkimusnäyttö sen merkityksestä on vaihtelevaa ja osittain ristiriitaista. Subjektiivisten normien merkitys näyttää riippuvan vahvasti myös asiayhteydestä sekä tilanteesta. Näistä seikoista johtuen tutkielman johtopäätöksissä todetaan että subjektiivinen normi voi joissain olosuhteissa vaikuttaa salasanan valintaan, mutta se ei useimmiten ole luotettavin tai merkittävin osatekijä. Passwords play a significant role in users’ information security and serve as the primary means of authentication. Insecure choice of passwords can compromise information security in several ways. This study aimed to increase the understanding of how can subjective norm, a construct of several behavioural models and theories that has also been used to explain information security related behaviour, affect individuals’ selection of passwords. Subjective norm is defined a “perceived expectations of the specific referent individuals or groups, and by the person’s motivation to comply with those expectations”(Fishbein & Ajzen, 1975, p. 302). The use of subjective norm as a construct has been questioned (Ahtola, 1976) and the use of it in studies has yielded varying results (Sommestad et al. 2014). This paper studied the role of subjective norm in password selection by a literature review that considered the results of over 40 previous studies of which 10 were chosen for an in-depth examination. The literature review was followed by a conceptual analysis. In this phase the findings of the literature review were analysed in three different scenarios. This study found that the use of subjective norm as a construct and a predictor for password selection can be seen questionable due to varying and sometimes contradicting results in previous studies. The significance of subjective norm in password selection appeared to differ considerably depending on the context in which it was used. Therefore, this study concluded that while under certain circumstances subjective norm can be used to explain individuals’ selection of passwords, it is often not the relevant predictor.
first_indexed 2020-11-12T21:01:11Z
format Pro gradu
free_online_boolean 1
fullrecord [{"key": "dc.contributor.advisor", "value": "Siponen, Mikko", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Aunola, Miika", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2020-11-12T07:35:52Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2020-11-12T07:35:52Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2020", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/72575", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Salasanoja k\u00e4ytet\u00e4\u00e4n yleisesti p\u00e4\u00e4asiallisena todentamismenetelm\u00e4n\u00e4 ja siksi ne ovat n\u00e4yttelevt suurta roolia k\u00e4ytt\u00e4j\u00e4n tietoturvassa. Ep\u00e4turvalliset salasanat voivat monin tavoin vaarantaa k\u00e4ytt\u00e4j\u00e4n tietoturvan. T\u00e4ss\u00e4 tutkielmassa pyrit\u00e4\u00e4n selvitt\u00e4m\u00e4\u00e4n miten subjektiiviset normit vaikuttavat k\u00e4ytt\u00e4j\u00e4n salasanavalintaan. Subjektiivinen normi on osatekij\u00e4 useissa k\u00e4ytt\u00e4ytymistieteiden teorioissa ja sill\u00e4 tarkoitetaan sosiaalisen ymp\u00e4rist\u00f6n luomia odotuksia, joita yksil\u00f6 kokee sek\u00e4 t\u00e4m\u00e4n motivaatiota toimia n\u00e4iden odotusen mukaisesti (Fishbein & Ajzen, 1975). Subjektiivisen normin merkityst\u00e4 kyseenalaistettu (Ahtola 1976) ja sit\u00e4 koskeva tutkimus on tuottanut vaihtelevia tuloksia (Sommestad et al. 2014). T\u00e4ss\u00e4 tutkielmassa tarkasteltiin subjektiivisten normien merkityst\u00e4 salasanan valintaan kirjallisuuskatsauksella sek\u00e4 t\u00e4t\u00e4 seuranneella k\u00e4sitteellis-analyyttisell\u00e4 tutkimuksmenetelm\u00e4ll\u00e4. K\u00e4sitteellis-analyyttisess\u00e4 osiossa kirjallisuuskatsauksen l\u00f6yd\u00f6ksi\u00e4 analysoitiin kolmen erillisen skenaarion kautta. \nTutkimuksessa ilmeni ett\u00e4 subjektiivisten normien merkitt\u00e4vyys salasanan valintaa selitt\u00e4v\u00e4n\u00e4 osatekij\u00e4n\u00e4 on kyseenalainen. Aikaisempi tutkimusn\u00e4ytt\u00f6 sen merkityksest\u00e4 on vaihtelevaa ja osittain ristiriitaista. Subjektiivisten normien merkitys n\u00e4ytt\u00e4\u00e4 riippuvan vahvasti my\u00f6s asiayhteydest\u00e4 sek\u00e4 tilanteesta. N\u00e4ist\u00e4 seikoista johtuen tutkielman johtop\u00e4\u00e4t\u00f6ksiss\u00e4 todetaan ett\u00e4 subjektiivinen normi voi joissain olosuhteissa vaikuttaa salasanan valintaan, mutta se ei useimmiten ole luotettavin tai merkitt\u00e4vin osatekij\u00e4.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Passwords play a significant role in users\u2019 information security and serve as the primary means of authentication. Insecure choice of passwords can compromise information security in several ways. This study aimed to increase the understanding of how can subjective norm, a construct of several behavioural models and theories that has also been used to explain information security related behaviour, affect individuals\u2019 selection of passwords. \nSubjective norm is defined a \u201cperceived expectations of the specific referent individuals or groups, and by the person\u2019s motivation to comply with those expectations\u201d(Fishbein & Ajzen, 1975, p. 302). The use of subjective norm as a construct has been questioned (Ahtola, 1976) and the use of it in studies has yielded varying results (Sommestad et al. 2014). This paper studied the role of subjective norm in password selection by a literature review that considered the results of over 40 previous studies of which 10 were chosen for an in-depth examination. The literature review was followed by a conceptual analysis. In this phase the findings of the literature review were analysed in three different scenarios.\nThis study found that the use of subjective norm as a construct and a predictor for password selection can be seen questionable due to varying and sometimes contradicting results in previous studies. The significance of subjective norm in password selection appeared to differ considerably depending on the context in which it was used. Therefore, this study concluded that while under certain circumstances subjective norm can be used to explain individuals\u2019 selection of passwords, it is often not the relevant predictor.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2020-11-12T07:35:52Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2020-11-12T07:35:52Z (GMT). No. of bitstreams: 0\n Previous issue date: 2020", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "64", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "eng", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "subjective norm", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "normative beliefs", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "TBA", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "TAM", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "UTAUT", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "TRA", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Subjective norm in password selection", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202011126609", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietojenk\u00e4sittelytiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Computer Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "k\u00e4siteanalyysi", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kirjallisuuskatsaukset", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "salasanat", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "concept analysis", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "literature surveys", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "data security", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "passwords", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
id jyx.123456789_72575
language eng
last_indexed 2025-02-18T10:54:58Z
main_date 2020-01-01T00:00:00Z
main_date_str 2020
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstreams\/432dd5a2-6ce3-4ef5-b6e1-c8ceac909af2\/download","text":"URN:NBN:fi:jyu-202011126609.pdf","source":"jyx","mediaType":"application\/pdf"}
publishDate 2020
record_format qdc
source_str_mv jyx
spellingShingle Aunola, Miika Subjective norm in password selection subjective norm normative beliefs TBA TAM UTAUT TRA Tietojenkäsittelytiede Computer Science 601 käsiteanalyysi kirjallisuuskatsaukset tietoturva salasanat concept analysis literature surveys data security passwords
title Subjective norm in password selection
title_full Subjective norm in password selection
title_fullStr Subjective norm in password selection Subjective norm in password selection
title_full_unstemmed Subjective norm in password selection Subjective norm in password selection
title_short Subjective norm in password selection
title_sort subjective norm in password selection
title_txtP Subjective norm in password selection
topic subjective norm normative beliefs TBA TAM UTAUT TRA Tietojenkäsittelytiede Computer Science 601 käsiteanalyysi kirjallisuuskatsaukset tietoturva salasanat concept analysis literature surveys data security passwords
topic_facet 601 Computer Science TAM TBA TRA Tietojenkäsittelytiede UTAUT concept analysis data security kirjallisuuskatsaukset käsiteanalyysi literature surveys normative beliefs passwords salasanat subjective norm tietoturva
url https://jyx.jyu.fi/handle/123456789/72575 http://www.urn.fi/URN:NBN:fi:jyu-202011126609
work_keys_str_mv AT aunolamiika subjectivenorminpasswordselection