What affects the intention to change information security behavior when using biometric authentication in mobile payments?

Mobiilimaksut ja mobiilimaksusovellusten käyttö ovat lisääntyneet merkittävästi viime vuosina. Käyttäjät käyttävät erityyppisiä tunnistautumismenetelmiä mobiilimaksujen suorittamiseen, mukaan lukien biometrinen tunnistautuminen. Yleisimmät mobiilimaksamisen biometriset tunnistustavat ovat sormenjälk...

Täydet tiedot

Bibliografiset tiedot
Päätekijä: Väli-Klemelä, Ainohelena
Muut tekijät: Informaatioteknologian tiedekunta, Faculty of Information Technology, Informaatioteknologia, Information Technology, Jyväskylän yliopisto, University of Jyväskylä
Aineistotyyppi: Pro gradu
Kieli:eng
Julkaistu: 2021
Aiheet:
Linkit: https://jyx.jyu.fi/handle/123456789/77358
_version_ 1826225754912849920
author Väli-Klemelä, Ainohelena
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_facet Väli-Klemelä, Ainohelena Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Väli-Klemelä, Ainohelena Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_sort Väli-Klemelä, Ainohelena
datasource_str_mv jyx
description Mobiilimaksut ja mobiilimaksusovellusten käyttö ovat lisääntyneet merkittävästi viime vuosina. Käyttäjät käyttävät erityyppisiä tunnistautumismenetelmiä mobiilimaksujen suorittamiseen, mukaan lukien biometrinen tunnistautuminen. Yleisimmät mobiilimaksamisen biometriset tunnistustavat ovat sormenjälki- ja kasvojentunnistus. Käyttäjien määrän lisääntymisen myötä myös tietoturvauhat mobiilimaksuille ja biometriseen tunnistamiseen ovat lisääntyneet. Tämä johtaa siihen, että käyttäjien on pakko muuttaa tietoturvakäyttäytymistään vastaavasti. Tämän pro-gradu -tutkielman tarkoituksena oli tutkia, mitkä ovat tärkeimmät tekijät, jotka vaikuttavat tietoturvakäyttäytymisen muutoksiin, kun käytetään biometristä tunnistautumista mobiilimaksaessa. Lisäksi selvitettiin, onko tietoturva-alan ammattilaisten ja muiden kuin turvallisuusalan ammattilaisten välillä eroa. Tämä tutkielma koostuu kirjallisuuskatsauksesta ja empiirisestä tutkimuksesta, joka tehtiin kvalitatiivisena tutkimuksena. Tämän tutkimuksen tiedot kerättiin tekemällä puolistrukturoituja haastatteluja tietoturva-alan ammattilaisten ja ei-ammattilaisten kanssa. Tiedot analysoitiin haastatteluissa havaittujen seitsemän eri teeman avulla: käytettävyys, luottamus ja itsevarmuus, tietoturvatietoisuus, muiden käyttäytyminen, uusi näkökulma elämään, uudet lainsäädännöt ja määräykset sekä havaitut riskit, uhat, haavoittuvuudet ja tapahtumat. Tulokset osoittavat, että käytettävyys on keskeinen tekijä, joka vaikuttaa tietoturvakäyt- täytymisen muutokseen. Käyttäjät ovat valmiita uhraamaan turvallisuutensa saadakseen käytettävyyttä. Lisäksi luottamus valmistajia kohtaan vaikuttaa käyttäytymiseen. Tutkielmassa havaittiin myös, että tietoturvauhilla ja -tapahtumilla on vaikutusta käyttäytymiseen, mutta uhan tai tapahtuman lisääntynyt vakavuus lisää myös sen vaikutusta. Tietoturva-alan ammattilaisten ja muiden kuin ammattilaisten välillä ei havaittu merkittäviä eroja, mikä saattaa osoittaa, että muiden kuin turvallisuusalan ammattilaistenkin tietoturvaosaaminen on nykyään melko korkea, ja sitä kannattaisi tutkia enemmän. Mobile payments and the use of mobile payment applications have increased significantly over the past years. Several different types of authentication methods are used to make mobile payments, one of them being biometric authentication. The most common biometric authentication methods in mobile payments are fingerprint and facial recognition. However, due to the increased number of users, the information security threats towards mobile payments and biometric authentication have also increased. The users are forced to change their information security behavior accordingly. This thesis aimed to research what are the main factors that affect information security behavior change when using biometric authentication in mobile payments. In addition, it was researched whether there can be seen a difference between information security professionals and non-security professionals. The thesis consists of a literature review and an empirical research, that was conducted as a qualitative study. The data for this study was gathered by conducting semi-structured interviews with information security professionals and non-professionals. The data was analyzed through 7 different themes identified in the interviews: usability, trust and confidence, information security knowledge, the behavior of others, new perspective on life, new legislation and regulations, and perceived risks, threats, vulnerabilities and incidents. The results show that usability is the key factor affecting the information security behavior change. Users are willing to sacrifice their security in order to gain usability. In addition, trust towards the manufacturers affects the behavior. It was also observed that threats and incidents have an effect on the behavior, but the increased severity of the threat or incident also increases the effect. No significant differences were observed between the information security professionals and non-security professionals, which indicates that the information security knowledge of non-security professionals may have increased recently, and it should be researched more.
first_indexed 2021-08-12T20:02:35Z
format Pro gradu
free_online_boolean 1
fullrecord [{"key": "dc.contributor.advisor", "value": "Woods, Naomi", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "V\u00e4li-Klemel\u00e4, Ainohelena", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2021-08-12T06:26:45Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2021-08-12T06:26:45Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2021", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/77358", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Mobiilimaksut ja mobiilimaksusovellusten k\u00e4ytt\u00f6 ovat lis\u00e4\u00e4ntyneet merkitt\u00e4v\u00e4sti viime vuosina. K\u00e4ytt\u00e4j\u00e4t k\u00e4ytt\u00e4v\u00e4t erityyppisi\u00e4 tunnistautumismenetelmi\u00e4 mobiilimaksujen suorittamiseen, mukaan lukien biometrinen tunnistautuminen. Yleisimm\u00e4t mobiilimaksamisen biometriset tunnistustavat ovat sormenj\u00e4lki- ja kasvojentunnistus. K\u00e4ytt\u00e4jien m\u00e4\u00e4r\u00e4n lis\u00e4\u00e4ntymisen my\u00f6t\u00e4 my\u00f6s tietoturvauhat mobiilimaksuille ja biometriseen tunnistamiseen ovat lis\u00e4\u00e4ntyneet. T\u00e4m\u00e4 johtaa \nsiihen, ett\u00e4 k\u00e4ytt\u00e4jien on pakko muuttaa tietoturvak\u00e4ytt\u00e4ytymist\u00e4\u00e4n vastaavasti. T\u00e4m\u00e4n pro-gradu -tutkielman tarkoituksena oli tutkia, mitk\u00e4 ovat t\u00e4rkeimm\u00e4t tekij\u00e4t, jotka vaikuttavat tietoturvak\u00e4ytt\u00e4ytymisen muutoksiin, kun k\u00e4ytet\u00e4\u00e4n biometrist\u00e4 tunnistautumista mobiilimaksaessa. Lis\u00e4ksi selvitettiin, onko tietoturva-alan ammattilaisten ja muiden kuin turvallisuusalan ammattilaisten v\u00e4lill\u00e4 eroa. T\u00e4m\u00e4 tutkielma koostuu kirjallisuuskatsauksesta ja empiirisest\u00e4 tutkimuksesta, joka tehtiin kvalitatiivisena tutkimuksena. T\u00e4m\u00e4n tutkimuksen tiedot ker\u00e4ttiin tekem\u00e4ll\u00e4 puolistrukturoituja haastatteluja tietoturva-alan ammattilaisten ja ei-ammattilaisten kanssa. Tiedot analysoitiin haastatteluissa havaittujen seitsem\u00e4n eri teeman avulla: k\u00e4ytett\u00e4vyys, luottamus ja itsevarmuus, tietoturvatietoisuus, muiden k\u00e4ytt\u00e4ytyminen, uusi n\u00e4k\u00f6kulma el\u00e4m\u00e4\u00e4n, uudet lains\u00e4\u00e4d\u00e4nn\u00f6t ja m\u00e4\u00e4r\u00e4ykset sek\u00e4 havaitut riskit, uhat, haavoittuvuudet ja tapahtumat. Tulokset osoittavat, ett\u00e4 k\u00e4ytett\u00e4vyys on keskeinen tekij\u00e4, joka vaikuttaa tietoturvak\u00e4yt-\nt\u00e4ytymisen muutokseen. K\u00e4ytt\u00e4j\u00e4t ovat valmiita uhraamaan turvallisuutensa saadakseen k\u00e4ytett\u00e4vyytt\u00e4. Lis\u00e4ksi luottamus valmistajia kohtaan vaikuttaa k\u00e4ytt\u00e4ytymiseen. Tutkielmassa havaittiin my\u00f6s, ett\u00e4 tietoturvauhilla ja -tapahtumilla on vaikutusta k\u00e4ytt\u00e4ytymiseen, mutta uhan tai tapahtuman lis\u00e4\u00e4ntynyt vakavuus lis\u00e4\u00e4 my\u00f6s sen vaikutusta. Tietoturva-alan ammattilaisten ja muiden kuin ammattilaisten v\u00e4lill\u00e4 ei havaittu merkitt\u00e4vi\u00e4 eroja, mik\u00e4 saattaa osoittaa, ett\u00e4 muiden kuin turvallisuusalan ammattilaistenkin tietoturvaosaaminen on nyky\u00e4\u00e4n melko korkea, ja sit\u00e4 kannattaisi tutkia enemm\u00e4n.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Mobile payments and the use of mobile payment applications have increased significantly over the past years. Several different types of authentication methods are used to make mobile payments, one of them being biometric authentication. The most common biometric authentication methods in mobile payments are fingerprint and facial recognition. However, due to the increased number of users, the information security threats towards mobile payments and biometric authentication have also increased. The users are forced to change their information security behavior accordingly. This thesis aimed to research what are the main factors that affect information security behavior change when using biometric authentication in mobile payments. In addition, it was researched whether there can be seen a difference between information security professionals and non-security professionals. The thesis consists of a literature review and an empirical research, that was conducted as a qualitative study. The data for this study was gathered by conducting semi-structured interviews with information security professionals and non-professionals. The data was analyzed through 7 different themes identified in the interviews: usability, trust and confidence, information security knowledge, the behavior of others, new perspective on life, new legislation and regulations, and perceived risks, threats, vulnerabilities and incidents. The results show that usability is the key factor affecting the information security behavior change. Users are willing to sacrifice their security in order to gain usability. In addition, trust towards the manufacturers affects the behavior. It was also observed that threats and incidents have an effect on the behavior, but the increased severity of the threat or incident also increases the effect. No significant differences were observed between the information security professionals and non-security professionals, which indicates that the information security knowledge of non-security professionals may have increased recently, and it should be researched more.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2021-08-12T06:26:45Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2021-08-12T06:26:45Z (GMT). No. of bitstreams: 0\n Previous issue date: 2021", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "76", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "eng", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "biometric authentication", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "information security behavior", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "information security behavior change", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "information security professionals", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "What affects the intention to change information security behavior when using biometric authentication in mobile payments?", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202108124524", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "todentaminen", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "mobiilimaksaminen", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "authentication", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "mobile payment", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "data security", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
id jyx.123456789_77358
language eng
last_indexed 2025-02-18T10:54:49Z
main_date 2021-01-01T00:00:00Z
main_date_str 2021
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstreams\/fd2713e8-6b32-48ea-b4b8-ce7664f9774e\/download","text":"URN:NBN:fi:jyu-202108124524.pdf","source":"jyx","mediaType":"application\/pdf"}
publishDate 2021
record_format qdc
source_str_mv jyx
spellingShingle Väli-Klemelä, Ainohelena What affects the intention to change information security behavior when using biometric authentication in mobile payments? biometric authentication information security behavior information security behavior change information security professionals Tietojärjestelmätiede Information Systems Science 601 todentaminen mobiilimaksaminen tietoturva authentication mobile payment data security
title What affects the intention to change information security behavior when using biometric authentication in mobile payments?
title_full What affects the intention to change information security behavior when using biometric authentication in mobile payments?
title_fullStr What affects the intention to change information security behavior when using biometric authentication in mobile payments? What affects the intention to change information security behavior when using biometric authentication in mobile payments?
title_full_unstemmed What affects the intention to change information security behavior when using biometric authentication in mobile payments? What affects the intention to change information security behavior when using biometric authentication in mobile payments?
title_short What affects the intention to change information security behavior when using biometric authentication in mobile payments?
title_sort what affects the intention to change information security behavior when using biometric authentication in mobile payments
title_txtP What affects the intention to change information security behavior when using biometric authentication in mobile payments?
topic biometric authentication information security behavior information security behavior change information security professionals Tietojärjestelmätiede Information Systems Science 601 todentaminen mobiilimaksaminen tietoturva authentication mobile payment data security
topic_facet 601 Information Systems Science Tietojärjestelmätiede authentication biometric authentication data security information security behavior information security behavior change information security professionals mobiilimaksaminen mobile payment tietoturva todentaminen
url https://jyx.jyu.fi/handle/123456789/77358 http://www.urn.fi/URN:NBN:fi:jyu-202108124524
work_keys_str_mv AT väliklemeläainohelena whataffectstheintentiontochangeinformationsecuritybehaviorwhenusingbiometr