fullrecord |
[{"key": "dc.contributor.advisor", "value": "Woods, Naomi", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "V\u00e4li-Klemel\u00e4, Ainohelena", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2021-08-12T06:26:45Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2021-08-12T06:26:45Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2021", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/77358", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Mobiilimaksut ja mobiilimaksusovellusten k\u00e4ytt\u00f6 ovat lis\u00e4\u00e4ntyneet merkitt\u00e4v\u00e4sti viime vuosina. K\u00e4ytt\u00e4j\u00e4t k\u00e4ytt\u00e4v\u00e4t erityyppisi\u00e4 tunnistautumismenetelmi\u00e4 mobiilimaksujen suorittamiseen, mukaan lukien biometrinen tunnistautuminen. Yleisimm\u00e4t mobiilimaksamisen biometriset tunnistustavat ovat sormenj\u00e4lki- ja kasvojentunnistus. K\u00e4ytt\u00e4jien m\u00e4\u00e4r\u00e4n lis\u00e4\u00e4ntymisen my\u00f6t\u00e4 my\u00f6s tietoturvauhat mobiilimaksuille ja biometriseen tunnistamiseen ovat lis\u00e4\u00e4ntyneet. T\u00e4m\u00e4 johtaa \nsiihen, ett\u00e4 k\u00e4ytt\u00e4jien on pakko muuttaa tietoturvak\u00e4ytt\u00e4ytymist\u00e4\u00e4n vastaavasti. T\u00e4m\u00e4n pro-gradu -tutkielman tarkoituksena oli tutkia, mitk\u00e4 ovat t\u00e4rkeimm\u00e4t tekij\u00e4t, jotka vaikuttavat tietoturvak\u00e4ytt\u00e4ytymisen muutoksiin, kun k\u00e4ytet\u00e4\u00e4n biometrist\u00e4 tunnistautumista mobiilimaksaessa. Lis\u00e4ksi selvitettiin, onko tietoturva-alan ammattilaisten ja muiden kuin turvallisuusalan ammattilaisten v\u00e4lill\u00e4 eroa. T\u00e4m\u00e4 tutkielma koostuu kirjallisuuskatsauksesta ja empiirisest\u00e4 tutkimuksesta, joka tehtiin kvalitatiivisena tutkimuksena. T\u00e4m\u00e4n tutkimuksen tiedot ker\u00e4ttiin tekem\u00e4ll\u00e4 puolistrukturoituja haastatteluja tietoturva-alan ammattilaisten ja ei-ammattilaisten kanssa. Tiedot analysoitiin haastatteluissa havaittujen seitsem\u00e4n eri teeman avulla: k\u00e4ytett\u00e4vyys, luottamus ja itsevarmuus, tietoturvatietoisuus, muiden k\u00e4ytt\u00e4ytyminen, uusi n\u00e4k\u00f6kulma el\u00e4m\u00e4\u00e4n, uudet lains\u00e4\u00e4d\u00e4nn\u00f6t ja m\u00e4\u00e4r\u00e4ykset sek\u00e4 havaitut riskit, uhat, haavoittuvuudet ja tapahtumat. Tulokset osoittavat, ett\u00e4 k\u00e4ytett\u00e4vyys on keskeinen tekij\u00e4, joka vaikuttaa tietoturvak\u00e4yt-\nt\u00e4ytymisen muutokseen. K\u00e4ytt\u00e4j\u00e4t ovat valmiita uhraamaan turvallisuutensa saadakseen k\u00e4ytett\u00e4vyytt\u00e4. Lis\u00e4ksi luottamus valmistajia kohtaan vaikuttaa k\u00e4ytt\u00e4ytymiseen. Tutkielmassa havaittiin my\u00f6s, ett\u00e4 tietoturvauhilla ja -tapahtumilla on vaikutusta k\u00e4ytt\u00e4ytymiseen, mutta uhan tai tapahtuman lis\u00e4\u00e4ntynyt vakavuus lis\u00e4\u00e4 my\u00f6s sen vaikutusta. Tietoturva-alan ammattilaisten ja muiden kuin ammattilaisten v\u00e4lill\u00e4 ei havaittu merkitt\u00e4vi\u00e4 eroja, mik\u00e4 saattaa osoittaa, ett\u00e4 muiden kuin turvallisuusalan ammattilaistenkin tietoturvaosaaminen on nyky\u00e4\u00e4n melko korkea, ja sit\u00e4 kannattaisi tutkia enemm\u00e4n.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Mobile payments and the use of mobile payment applications have increased significantly over the past years. Several different types of authentication methods are used to make mobile payments, one of them being biometric authentication. The most common biometric authentication methods in mobile payments are fingerprint and facial recognition. However, due to the increased number of users, the information security threats towards mobile payments and biometric authentication have also increased. The users are forced to change their information security behavior accordingly. This thesis aimed to research what are the main factors that affect information security behavior change when using biometric authentication in mobile payments. In addition, it was researched whether there can be seen a difference between information security professionals and non-security professionals. The thesis consists of a literature review and an empirical research, that was conducted as a qualitative study. The data for this study was gathered by conducting semi-structured interviews with information security professionals and non-professionals. The data was analyzed through 7 different themes identified in the interviews: usability, trust and confidence, information security knowledge, the behavior of others, new perspective on life, new legislation and regulations, and perceived risks, threats, vulnerabilities and incidents. The results show that usability is the key factor affecting the information security behavior change. Users are willing to sacrifice their security in order to gain usability. In addition, trust towards the manufacturers affects the behavior. It was also observed that threats and incidents have an effect on the behavior, but the increased severity of the threat or incident also increases the effect. No significant differences were observed between the information security professionals and non-security professionals, which indicates that the information security knowledge of non-security professionals may have increased recently, and it should be researched more.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2021-08-12T06:26:45Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2021-08-12T06:26:45Z (GMT). No. of bitstreams: 0\n Previous issue date: 2021", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "76", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "eng", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "biometric authentication", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "information security behavior", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "information security behavior change", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "information security professionals", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "What affects the intention to change information security behavior when using biometric authentication in mobile payments?", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202108124524", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "todentaminen", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "mobiilimaksaminen", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "authentication", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "mobile payment", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "data security", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
|