fullrecord |
[{"key": "dc.contributor.advisor", "value": "Siponen, Mikko", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Sandroos, Lotta", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2021-06-08T10:49:22Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2021-06-08T10:49:22Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2021", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/76351", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "T\u00e4ss\u00e4 tutkielmassa tarkasteltiin yksityishenkil\u00f6ille suunnattua tietoturvaviestint\u00e4\u00e4. Yksityishenkil\u00f6ill\u00e4 ei ole samanlaista ohjaavaa tukiverkostoa tietoturvak\u00e4ytt\u00e4ytymisens\u00e4 tueksi kuin esimerkiksi organisaatioiden j\u00e4senill\u00e4, vaikka my\u00f6s yksityishenkil\u00f6t voivat joutua tietoturvaloukkausten uhriksi. N\u00e4in ollen tietoturvauhista ja toivotusta k\u00e4ytt\u00e4ytymisest\u00e4 tiedottaminen my\u00f6s yksityishenkil\u00f6ille on t\u00e4rke\u00e4\u00e4. Suomessa yksityishenkil\u00f6ille tietoturvasta viestii esimerkiksi kansallinen tietoturvatoimija Kyberturvallisuuskeskus, jonka viestint\u00e4materiaalit muodostivat tutkielman aineiston. Tutkielmassa aineistoja tarkasteltiin suojelumotivaatioteorian sek\u00e4 sosiaalisen markkinoinnin teorian luoman teoreettisen viitekehyksen pohjalta, ja tarkoituksena oli tutkia, miten viestint\u00e4materiaalit pyrkiv\u00e4t vaikuttamaan kohderyhm\u00e4n eli yksityishenkil\u00f6iden tietoturvak\u00e4ytt\u00e4ytymiseen. Analyysi toteutettiin kehysanalyyttisella menetelm\u00e4ll\u00e4, jonka avulla tarkasteltiin aineistossa esiintyneit\u00e4 viestinn\u00e4llisi\u00e4 kehyksi\u00e4. Viestinn\u00e4llisten kehysten tutkiminen on t\u00e4rke\u00e4\u00e4, jotta voidaan ymm\u00e4rt\u00e4\u00e4, miten tietoturvasta puhutaan ja mink\u00e4laista kuvaa siit\u00e4 luodaan. Analyysin keski\u00f6ss\u00e4 oli kaksi kehyst\u00e4: suojelumotivaatioteoriaan perustuva uhkapuheen kehys sek\u00e4 sosiaaliseen markkinointiin nojaava yhteiskunnallisen ulottuvuuden kehys. Analyysissa selvisi, ett\u00e4 molempia kehyksi\u00e4 esiintyi aineistossa l\u00e4hes yht\u00e4 paljon, mutta osittain ep\u00e4tasaisesti eri aineistotyyppien v\u00e4lill\u00e4. Aineistossa vedottiin usein uhkien vakavuuteen, alttiuteen uhille sek\u00e4 min\u00e4pystyvyyteen. Sen sijaan sosiaalisen markkinoinnin teoriaan kuuluvaa ajatusta vaihtokaupasta olisi voitu hy\u00f6dynt\u00e4\u00e4 enemm\u00e4nkin. Tutkimustulokset auttavat tutkijoita ja viestij\u00f6it\u00e4 tunnistamaan tietoturvaviestinn\u00e4ss\u00e4 hy\u00f6dynnett\u00e4vi\u00e4 viestinn\u00e4llisi\u00e4 kehyksi\u00e4 sek\u00e4 sit\u00e4, miten niit\u00e4 pystytt\u00e4isi k\u00e4ytt\u00e4m\u00e4\u00e4n tietoisesti hyv\u00e4ksi toivotun tietoturvak\u00e4ytt\u00e4ytymisen edist\u00e4miseksi.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "This study was about information security communication targeted at private individuals, who often do not have the same guidance available to support their information security behaviour than members of organisations have. However, private individuals face similar threat of becoming victims of cyber incidents. Therefore, it is important to inform private individuals about cyber threats and the desired information security behaviour. In Finland, the information security communication is done by for example the National Cyber Security Centre, and its materials were analysed in this study. The theoretical framework of the study consisted of the Protection Motivation Theory, and the Social Marketing Theory. The aim of the study was to examine how communication materials try to influence the behaviour of the target audience. With the help of frame analysis, the study examined the frames that appeared in the materials. Studying the frames in communication is important because they can increase understanding of how information security is being talked about. Two frames were prominent in the analysis: the frame of threat speech that was based on the Protection Motivation Theory, and the frame of social dimension that was lead from the theory of Social Marketing. The main findings are the following. Firstly, the number of the appearances of both frames in the material were almost equal, but they were split unevenly between the two material types used in the analysis. Secondly, the most used appeals were the severity, the vulnerability, and the self-efficacy. Instead, the idea of exchange that is a part of Social Marketing could have been utilized even more in the materials. The study and its results can help researchers and practitioners to recognise the frames that appear in the information security communication, and how they could be utilized to achieve the desired information security behaviour.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Miia Hakanen (mihakane@jyu.fi) on 2021-06-08T10:49:22Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2021-06-08T10:49:22Z (GMT). No. of bitstreams: 0\n Previous issue date: 2021", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "78", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.title", "value": "\u201dKyberturvallisuus kuuluu kaikille\u201d : viestinn\u00e4lliset kehykset yksityishenkil\u00f6ille suunnatussa tietoturvaviestinn\u00e4ss\u00e4", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202106083565", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Kyberturvallisuus", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Kyberturvallisuus", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "sosiaalinen markkinointi", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kehysanalyysi", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
|