fullrecord |
[{"key": "dc.contributor.advisor", "value": "Woods, Naomi", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Haapaniemi, Karri", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2022-06-02T05:58:38Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2022-06-02T05:58:38Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2022", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/81415", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Kaikilla sosiaalisilla verkostoitumispalveluilla on palveluntarjoajan luomat\nyksityisyysk\u00e4yt\u00e4nn\u00f6t. Ne kertovat k\u00e4ytt\u00e4jille, miten palveluntarjoaja ker\u00e4\u00e4 data\nk\u00e4ytt\u00e4jist\u00e4, mit\u00e4 dataa ker\u00e4t\u00e4\u00e4n, miten sit\u00e4 s\u00e4ilytet\u00e4\u00e4n ja miten palveluntarjoaja\nk\u00e4ytt\u00e4\u00e4 ker\u00e4tty\u00e4 dataa. K\u00e4ytt\u00e4j\u00e4n on hyv\u00e4ksytt\u00e4v\u00e4 palvelun\nyksityisyysk\u00e4yt\u00e4nn\u00f6t, mik\u00e4li h\u00e4n haluaa k\u00e4ytt\u00e4\u00e4 palvelua. Yksityisyysk\u00e4yt\u00e4nn\u00f6n\nvaikutukset k\u00e4ytt\u00e4j\u00e4n yksityisyyteen voivat kuitenkin muuttua, kun\npalveluntarjoaja tekee muutoksia yksityisyysk\u00e4yt\u00e4nt\u00f6ihins\u00e4 palvelun\nk\u00e4ytt\u00f6\u00f6noton j\u00e4lkeen. T\u00e4m\u00e4 vaikutus voi olla joko positiivinen tai negatiivinen.\nJos vaikutus yksityisyyteen on negatiivinen, se pakottaa k\u00e4ytt\u00e4j\u00e4n\nuudelleenarvioimaan yksityisyysk\u00e4yt\u00e4nt\u00f6jen ehdot ja p\u00e4\u00e4tt\u00e4m\u00e4\u00e4n haluaako h\u00e4n\njatkaa palvelun k\u00e4ytt\u00f6\u00e4, yksityisyytt\u00e4 heikent\u00e4v\u00e4st\u00e4 vaikutuksesta huolimatta,\nnauttien edelleen palvelun hy\u00f6dyist\u00e4 vai lopettaa palvelun k\u00e4ytt\u00f6 negatiivisen\nvaikutuksen takia ja menett\u00e4\u00e4 palvelun hy\u00f6dyt. K\u00e4ytt\u00e4j\u00e4n\nk\u00e4yt\u00f6njatkamisk\u00e4ytt\u00e4ytymisen ja -p\u00e4\u00e4t\u00f6ksenteon ymm\u00e4rt\u00e4minen on t\u00e4rke\u00e4\u00e4 niin\nyksityisyysk\u00e4ytt\u00e4ytymisen n\u00e4k\u00f6kulmasta, jotta pystyt\u00e4\u00e4n tukemaan k\u00e4ytt\u00e4ji\u00e4,\nkuin palveluntarjoajan tukemisen n\u00e4k\u00f6kulmasta, jotta kyet\u00e4\u00e4n avustamaan\npalveluntarjoajia palveluiden menestyksen takaamisessa. Aiempi tutkimus on\nl\u00f6yt\u00e4nyt joukon tekij\u00f6it\u00e4, jotka vaikuttavat k\u00e4yt\u00f6n jatkamisaikomukseen\nerilaisissa konteksteissa, mutta yksityisyysselkkausten kontekstia ei ole k\u00e4sitelty\naiemmassa tutkimuksessa. T\u00e4ss\u00e4 tutkimuksessa kehitet\u00e4\u00e4n tutkimusmalli, jolla\npyrit\u00e4\u00e4n tutkimaan ja ennustamaan k\u00e4yt\u00f6njatkamisaikomusta\nyksityisyysongelmien kontekstissa yksityisyysk\u00e4yt\u00e4nt\u00f6ihin liittyvien tekij\u00f6iden\nja aiemman tutkimuksen l\u00f6yd\u00f6sten perusteella. Tutkimuksen kvantitatiivinen\ndata ker\u00e4ttiin kyselytutkimuksen avulla. Analyysin tulokset osoittavat, ett\u00e4\nyksityisyysongelmien kontekstissa vaaditaan erilaista l\u00e4hestymistapaa\nk\u00e4yt\u00f6njatkuvuuden ennustamiseen kuin tavallisen k\u00e4yt\u00f6n kontekstissa. Tulosten\nmukaan luottamus palveluntarjoajaan ja yksityisyystietoisuus ovat\nk\u00e4yt\u00f6njatkuvuuteen vaikuttavia tekij\u00f6it\u00e4 t\u00e4ss\u00e4 kontekstissa. N\u00e4m\u00e4 tulokset\ntukevat tutkimusta ja k\u00e4yt\u00e4nt\u00f6\u00e4 sill\u00e4 ne osoittavat yksityisyysselkkausten\nerilaisuuden verrattuna muihin aiemmin tutkittuihin konteksteihin. Sosiaalisten\nverkostoitumispalveluiden tarjoajien tulisi huomioida n\u00e4m\u00e4 tulokset\npohtiessaan, kuinka he k\u00e4sittelev\u00e4t ja tiedottavat k\u00e4ytt\u00e4ji\u00e4\u00e4n yksityisyyteen ja\nyksityisyysk\u00e4yt\u00e4nt\u00f6ihin liittyviss\u00e4 aiheissa.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "All social networking services have a privacy policy created by the provider of\nthe service. It informs users of the data collection, storage and use by the service\nprovider. Users have to accept the terms set in the privacy policy in order to use\nthe service. Changes made to the privacy policy during long term service use can\nhowever change the way the privacy policy affects user\u2019s privacy. This effect can\nbe either positive or negative. If the effect is negative, it forces the user to re-\nevaluate the terms of use and whether they would like to continue using the\nservice despite the reduction in the level of privacy still enjoying the benefits of\nthe service or abandon the service due to its negative effect on privacy and lose\nthe benefits of the service in the process. Understanding the use continuance\nbehaviour and decision-making of users is important in terms of both privacy\nbehaviour to support the user as well as assisting the service providers in\nensuring long term success of their services. In this study a literature review is\nconducted into the topics of privacy, privacy policies and use continuance.\nPrevious literature has shown that there are various factors that affect use\ncontinuance intention within different contexts. However, the context of privacy\nincidents has not been addressed. In this study a research framework has been\ndeveloped to examine and predict the users\u2019 use continuance intention in the\ncontext of privacy incidents based on privacy policy associated factors as well as\nfactors identified in existing use continuance literature. A survey study collected\nquantitative data for purposes of the analysis. The results suggest that privacy\nincidents as a context require a different approach to predicting use continuance\nthan regular use contexts. Trust and privacy awareness are confirmed to be\naffecting factors in use continuance in this context. These results have\nimplications for research and practice as they highlight the disparity of the\nprivacy incident context in comparison to other contexts studied in previous\nliterature. For practice the results of this study should be taken into account when\nSNSs providers consider how they address and inform their users about privacy\nand privacy policies.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Miia Hakanen (mihakane@jyu.fi) on 2022-06-02T05:58:38Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2022-06-02T05:58:38Z (GMT). No. of bitstreams: 0\n Previous issue date: 2022", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "86", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "eng", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "privacy policy", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "use continuance", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "social networking services", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Privacy Policy Factors : The Effects on Use Continuance in Social Networking Services", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202206023038", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "yksityisyys", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "privacy", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
|