fullrecord |
[{"key": "dc.contributor.advisor", "value": "Woods, Naomi", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Temonen, Saku", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2020-12-03T08:40:08Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2020-12-03T08:40:08Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2020", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/72940", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Ihmisten tietoturva kautta maailman riippuu salasanojen varassa, mutta salasana todennusmenetelm\u00e4n\u00e4 toimii tarkoitetulla tavalla vain, jos k\u00e4ytt\u00e4j\u00e4t noudattavat turvallisia salasanak\u00e4yt\u00e4nteit\u00e4. Siit\u00e4 huolimatta tietoturvan kannalta heikot salasanat ovat yleisi\u00e4, koska salasanojen uudelleenk\u00e4ytt\u00f6 ja turvallisten k\u00e4yt\u00e4nteiden kiert\u00e4minen on helpompaa kuin lukuisien monimutkaisten salasanojen muistaminen. T\u00e4m\u00e4n k\u00e4ytett\u00e4vyyden ja tietoturvan v\u00e4lisen ristiriidan ymm\u00e4rt\u00e4minen on t\u00e4rke\u00e4\u00e4, jotta salasanasta voidaan kehitt\u00e4\u00e4 tietoturvan kannalta tehokkaampi todennusmenetelm\u00e4. Salasanojen laajasta tieteellisest\u00e4 tutkimuksesta huolimatta on viel\u00e4 ep\u00e4selv\u00e4\u00e4, mitk\u00e4 kaikki tekij\u00e4t vaikuttavat k\u00e4ytt\u00e4jien salasanojen k\u00e4ytt\u00f6\u00f6n, hallintaan ja niihin liittyviin asenteisiin. T\u00e4m\u00e4n tutkimuksen tavoitteena on tutkia t\u00e4t\u00e4 aukkoa tieteellisess\u00e4 kirjallisuudessa tarkastelemalla asiantuntijak\u00e4ytt\u00e4jien salasanojen k\u00e4ytt\u00f6\u00e4. Toteutetun empiirisen kyselytutkimuksen tarkoitus oli selvitt\u00e4\u00e4, onko kahden eri osaamisalueen omaavan asiantuntijak\u00e4ytt\u00e4j\u00e4ryhm\u00e4n v\u00e4lill\u00e4 merkitt\u00e4v\u00e4\u00e4 eroa salasanojen k\u00e4yt\u00f6n, hallinnan ja asenteiden suhteen. Kyselytutkimuksen tulosten analyysin pohjalta vaikuttaa silt\u00e4, ett\u00e4 tarkasteltujen ryhmien v\u00e4lill\u00e4 on eroa eri tilityyppien t\u00e4rkeyden tulkinnassa sek\u00e4 salasanojen muistiinkirjoittamisessa.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Information security of people around the world is reliant on password authentication, an imperfect security mechanism which is effective only when users follow guidelines and secure practices. Yet insecure practices are widespread among users, as reusing passwords and circumventing guidelines is easier than memorizing a wide array of unique and complex passwords. Understanding this conflict between usability and security is vital for designing better password guidelines and thus improving the effectiveness of password authentication as a security mechanism. While password usage has been subject to much research, there remains a clear research gap on which factors affect user\u2019s password usage, management, and perceptions. The purpose of this study is to explore this research gap by studying password behaviour of expert users, particularly if having a different area of expertise within the field of information technology results in a difference in password behaviour. An empirical study was conducted using a survey study, with participants from two different groups of expert users with different areas of expertise participating in the survey. Analysis of the survey responses suggests there are differences between the groups, particularly when it comes to the perceived importance of account types and writing down one\u2019s passwords.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2020-12-03T08:40:08Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2020-12-03T08:40:08Z (GMT). No. of bitstreams: 0\n Previous issue date: 2020", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "72", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "eng", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "memorability", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "muistettavuus", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Password usage, management, and perceptions of expert users", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202012036897", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "k\u00e4ytett\u00e4vyys", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "salasanat", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "data security", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "usability", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "passwords", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
|