fullrecord |
[{"key": "dc.contributor.advisor", "value": "Marttiin, Pentti", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Ylitalo, Waltteri", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2021-06-23T06:37:40Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2021-06-23T06:37:40Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2021", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/76790", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Informaatioteknologian valtavirtaistumisen seurauksena yh\u00e4 useammat organisaatiot toimialasta riippumatta hy\u00f6dynt\u00e4v\u00e4t informaatioteknologiaa operatiivisessa ja strategisessa toiminnassaan. Hy\u00f6tyjen ohella informaatioteknologian\nk\u00e4ytt\u00f6 on tuottanut uusia tietoturvaan liittyvi\u00e4 uhkakuvia, joihin organisaatiot\npyrkiv\u00e4t vastaamaan moniulotteisilla ratkaisuilla. Yksi merkitt\u00e4vimmist\u00e4 tunnistetuista tietoturvauhista on ty\u00f6ntekij\u00f6iden tietoturvaohjeistuksen vastainen\ntoiminta, mink\u00e4 seurauksena t\u00e4rke\u00e4ksi kysymykseksi on noussut, miksi ty\u00f6ntekij\u00e4t poikkeavat ohjeista. Lupaavana tuoreena suuntauksena esiintyv\u00e4t neutralisaatiotekniikat, jotka esitt\u00e4v\u00e4t ty\u00f6ntekij\u00f6iden neutralisoivan itselleen haitallisia ohjeistuksen vastaisesta toiminnasta aiheutuvia seurauksia. T\u00e4m\u00e4 tutkielma\ntuottaa kuvailevan kirjallisuuskatsauksen neutralisaatiotekniikoita hy\u00f6dynt\u00e4viin organisaatioiden tietoturvaa tutkiviin tutkimuksiin. Tutkielman avulla tuotetaan vastaus tutkimuskysymyksiin, jotka ovat miten neutralisaatiotekniikoita\non hy\u00f6dynnetty osana organisaatioiden tietoturvatutkimusta ja mink\u00e4laisia tuloksia tutkimukset ovat saavuttaneet koskien neutralisaatiotekniikoita. Tutkielman tulosten perusteella neutralisaatiotekniikoita hy\u00f6dynt\u00e4v\u00e4t julkaisut\njaetaan nelj\u00e4\u00e4n aihepiiriin ja todetaan, ett\u00e4 tutkimusten painopiste on muuttunut viimeisen kymmenen vuoden aikana. Lis\u00e4ksi tutkielman tulosten perusteella todetaan, ett\u00e4 neutralisaatiotekniikat tuottavat vahvaa tukea neutralisaatiotekniikoiden kriittiselle roolille osana tietoturvaa sek\u00e4 neutralisaatiotekniikoiden olevan vahvasti olosuhderiippuvaisia, mik\u00e4 aiheuttaa ongelmia yleistett\u00e4vyydelle. Lopuksi tutkielma esitt\u00e4\u00e4 aihepiirin osalta keskeisi\u00e4 jatkotutkimuksen kohteita, jotka vaihtelevat kokonaisista tutkimussuuntauksista suoriin yksitt\u00e4isiin tutkimuskohteisiin", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Information technology has become a key component in strategic and\noperational functions across most market sectors. Alongside the benefits and\nperks information technology has also brought new threats regarding\ninformation security, which organization have tried to resolve with various\nsolutions. A pivotal threat identified by experts is the human factor of\ncybersecurity and more specifically employee non-compliance towards internal\ninformation security policies. A promising line of research in understanding\nthis phenomenon is the theory of neutralization techniques, which argues that\nemployees are able to break organizational security policies by neutralizing the\nnegative social consequences caused by their actions. This thesis provides a\ndescriptive literature review regarding the use of neutralization techniques\nwithin organizational information security research. More specifically this\nthesis provides an answer to the following research questions, how have\nneutralization techniques been used in organizational information security\nresearch and what types of results have these studies generated regarding the\ntechniques of neutralization. Based on the findings of this thesis existing\nresearch is divided into four groups based on their topic and findings show that\nthe focus of these studies has shifted over the past decade. The findings also\nshow that neutralization techniques are condition dependent, which cause\nproblems in generalization and that existing research finds strong support for\nthe importance of neutralization as a part of cybersecurity. Finally, this thesis\npresents recommendations on future research by offering broader future\nresearch areas and more specific individual research topics.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2021-06-23T06:37:40Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2021-06-23T06:37:40Z (GMT). No. of bitstreams: 0\n Previous issue date: 2021", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "44", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "neutralisaatiotekniikat", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tietoturvak\u00e4ytt\u00e4ytyminen", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tietoturvaohjeistus", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Neutralisaatiotekniikoiden hy\u00f6dynt\u00e4minen osana organisaatioiden tietoturvatutkimusta", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202106233985", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "organisaatiot", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|