fullrecord |
[{"key": "dc.contributor.advisor", "value": "Soliman, Wael", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.advisor", "value": "Siponen, Mikko", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Etel\u00e4, Noora", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2021-10-19T05:12:22Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2021-10-19T05:12:22Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2021", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/78245", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Nykyinen tietoyhteiskunta pit\u00e4\u00e4 dataa arvokkaana resurssina. Valitettavasti t\u00e4m\u00e4 tarkoittaa, ett\u00e4 my\u00f6s laiton datan hyv\u00e4ksik\u00e4ytt\u00f6 on kohtuuttoman yleist\u00e4. Verkkorikolliset pit\u00e4v\u00e4t terveystietoja arvokkaimpina, ja siksi tietomurrot koskevat suhteettomasti terveydenhuoltoa. Tutkittaessa tietomurtotapausten vaikutuksia, nykyinen kyberturvallisuustutkimus priorisoi usein organisaation n\u00e4k\u00f6kulman yksitt\u00e4isen uhrin n\u00e4k\u00f6kulman sijaan. T\u00e4m\u00e4 tutkimus pyrkii kuitenkin tukemaan potilaan n\u00e4k\u00f6kulmaa terveydenhuollon tietorikkomuksen uhrina tutkimalla potilaan selviytymisprosessia.\nTutkielman tarkoituksena on tutkia potilaan selviytymist\u00e4 terveydenhuollon tietomurroista. Ymm\u00e4rt\u00e4m\u00e4ll\u00e4 paremmin, miten terveydenhuollon tietomurtojen uhrit reagoivat ja selviytyv\u00e4t kyseisist\u00e4 tapahtumista, on mahdollista suunnitella yleisi\u00e4 k\u00e4yt\u00e4nt\u00f6j\u00e4, joilla s\u00e4\u00e4nnell\u00e4\u00e4n toimintaa tietomurtojen j\u00e4lkeen ottamaan potilas uhrina paremmin huomioon.\nT\u00e4m\u00e4 tutkimus koostuu kirjallisuuskatsauksesta sek\u00e4 empiirisest\u00e4 tutkimuksesta. Tutkimuksen empiirinen osuus toteutettiin kvalitatiivisin menetelmin, ja empiirinen data ker\u00e4ttiin temaattisten haastattelujen sek\u00e4 fiktiivisen vinjetin avulla, edustaen terveydenhuollon tietomurron olosuhteita. Ker\u00e4tty tieto analysoitiin k\u00e4ytt\u00e4en abduktiivista sis\u00e4ll\u00f6nanalyysi\u00e4.\nTutkimustulokset\nhenkil\u00f6kohtaisen\nselviytymisprosessia,\nselviytymisprosessi alkaa tietomurtotapahtuman ensisijaisesta arvioinnista, joka aiheuttaa potilaalle erilaisia negatiivisia kokemuksia, mink\u00e4 j\u00e4lkeen seuraa tapahtuman toissijainen arviointi sek\u00e4 potilaan n\u00e4kemys tilanteen hallittavuudesta, mitk\u00e4 vaikuttavat valittuun selviytymisstrategiaan ja selviytymistoimintoihin, joita potilas k\u00e4ytt\u00e4\u00e4 kokemansa ahdingon lievitt\u00e4miseen.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Today\u2019s information age considers data as a valuable resource. Alas, this means that illegal data-related activity is also rampant and data breach events are unfortunately common. Medical information is considered the most lucrative by cyber criminals, and therefore data breach events disproportionately damage the healthcare industry. However, when investigating the effects of data breach incidents, extant cyber security and data breach research often prioritizes the organizational point of view over the individual victim\u2019s perspective. By examining the patient's coping process, this thesis intends to support the patient's perspective as a victim of a healthcare data breach.\nThe purpose of this thesis is to study patient coping with a healthcare data breach involving confidential medical information. By better understanding how victims of healthcare breaches react and cope with the negative event, it will be possible to design a general code of conduct and improve policy regulating conduct following a breach that takes the patient as a victim better into account.\nThis thesis consists of a literature review on data breaches and coping theory as well as an empirical investigation on how patients cope with a healthcare data breach. The studies empirical component was carried out utilizing a qualitative approach, with primary data collected via virtual thematic interviews supplemented with a fictitious vignette to provide research participants with space. The collected data was examined using abductive content analysis.\nThe study found that patients coping with a personal health care data breach follows the coping process defined by coping theory, beginning with the primary appraisal of the stressor event resulting in various negative outcomes, followed by the secondary appraisal of the event and the patient perception of controllability, that influence the chosen coping strategy and coping activities employed to alleviate the distress experienced by the patient.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2021-10-19T05:12:22Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2021-10-19T05:12:22Z (GMT). No. of bitstreams: 0\n Previous issue date: 2021", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "70", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "eng", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "selviytymisteoria", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "selviytymisstrategiat", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "coping theory", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "coping strategies", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Coping with personal data breaches in healthcare", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202110195274", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Kyberturvallisuus", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Kyberturvallisuus", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "terveydenhuolto", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberrikollisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietomurto", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "henkil\u00f6tiedot", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "vinjetit", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "yksil\u00f6nsuoja", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "selviytyminen", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "potilasasiakirjat", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "public health service", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "cyber crime", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "data break-in", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "personal data", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "vignettes", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "protection of privacy", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "coping", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "data security", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "patient documents", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
|