fullrecord |
[{"key": "dc.contributor.advisor", "value": "Siponen, Mikko", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Aunola, Miika", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2020-11-12T07:35:52Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2020-11-12T07:35:52Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2020", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/72575", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Salasanoja k\u00e4ytet\u00e4\u00e4n yleisesti p\u00e4\u00e4asiallisena todentamismenetelm\u00e4n\u00e4 ja siksi ne ovat n\u00e4yttelevt suurta roolia k\u00e4ytt\u00e4j\u00e4n tietoturvassa. Ep\u00e4turvalliset salasanat voivat monin tavoin vaarantaa k\u00e4ytt\u00e4j\u00e4n tietoturvan. T\u00e4ss\u00e4 tutkielmassa pyrit\u00e4\u00e4n selvitt\u00e4m\u00e4\u00e4n miten subjektiiviset normit vaikuttavat k\u00e4ytt\u00e4j\u00e4n salasanavalintaan. Subjektiivinen normi on osatekij\u00e4 useissa k\u00e4ytt\u00e4ytymistieteiden teorioissa ja sill\u00e4 tarkoitetaan sosiaalisen ymp\u00e4rist\u00f6n luomia odotuksia, joita yksil\u00f6 kokee sek\u00e4 t\u00e4m\u00e4n motivaatiota toimia n\u00e4iden odotusen mukaisesti (Fishbein & Ajzen, 1975). Subjektiivisen normin merkityst\u00e4 kyseenalaistettu (Ahtola 1976) ja sit\u00e4 koskeva tutkimus on tuottanut vaihtelevia tuloksia (Sommestad et al. 2014). T\u00e4ss\u00e4 tutkielmassa tarkasteltiin subjektiivisten normien merkityst\u00e4 salasanan valintaan kirjallisuuskatsauksella sek\u00e4 t\u00e4t\u00e4 seuranneella k\u00e4sitteellis-analyyttisell\u00e4 tutkimuksmenetelm\u00e4ll\u00e4. K\u00e4sitteellis-analyyttisess\u00e4 osiossa kirjallisuuskatsauksen l\u00f6yd\u00f6ksi\u00e4 analysoitiin kolmen erillisen skenaarion kautta. \nTutkimuksessa ilmeni ett\u00e4 subjektiivisten normien merkitt\u00e4vyys salasanan valintaa selitt\u00e4v\u00e4n\u00e4 osatekij\u00e4n\u00e4 on kyseenalainen. Aikaisempi tutkimusn\u00e4ytt\u00f6 sen merkityksest\u00e4 on vaihtelevaa ja osittain ristiriitaista. Subjektiivisten normien merkitys n\u00e4ytt\u00e4\u00e4 riippuvan vahvasti my\u00f6s asiayhteydest\u00e4 sek\u00e4 tilanteesta. N\u00e4ist\u00e4 seikoista johtuen tutkielman johtop\u00e4\u00e4t\u00f6ksiss\u00e4 todetaan ett\u00e4 subjektiivinen normi voi joissain olosuhteissa vaikuttaa salasanan valintaan, mutta se ei useimmiten ole luotettavin tai merkitt\u00e4vin osatekij\u00e4.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Passwords play a significant role in users\u2019 information security and serve as the primary means of authentication. Insecure choice of passwords can compromise information security in several ways. This study aimed to increase the understanding of how can subjective norm, a construct of several behavioural models and theories that has also been used to explain information security related behaviour, affect individuals\u2019 selection of passwords. \nSubjective norm is defined a \u201cperceived expectations of the specific referent individuals or groups, and by the person\u2019s motivation to comply with those expectations\u201d(Fishbein & Ajzen, 1975, p. 302). The use of subjective norm as a construct has been questioned (Ahtola, 1976) and the use of it in studies has yielded varying results (Sommestad et al. 2014). This paper studied the role of subjective norm in password selection by a literature review that considered the results of over 40 previous studies of which 10 were chosen for an in-depth examination. The literature review was followed by a conceptual analysis. In this phase the findings of the literature review were analysed in three different scenarios.\nThis study found that the use of subjective norm as a construct and a predictor for password selection can be seen questionable due to varying and sometimes contradicting results in previous studies. The significance of subjective norm in password selection appeared to differ considerably depending on the context in which it was used. Therefore, this study concluded that while under certain circumstances subjective norm can be used to explain individuals\u2019 selection of passwords, it is often not the relevant predictor.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2020-11-12T07:35:52Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2020-11-12T07:35:52Z (GMT). No. of bitstreams: 0\n Previous issue date: 2020", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "64", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "eng", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "subjective norm", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "normative beliefs", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "TBA", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "TAM", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "UTAUT", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "TRA", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Subjective norm in password selection", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202011126609", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietojenk\u00e4sittelytiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Computer Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "k\u00e4siteanalyysi", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kirjallisuuskatsaukset", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "salasanat", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "concept analysis", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "literature surveys", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "data security", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "passwords", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
|