fullrecord |
[{"key": "dc.contributor.advisor", "value": "Siponen, Mikko", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Mertenheimo, Roni", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2022-11-16T10:12:21Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2022-11-16T10:12:21Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2022", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/83934", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Tietoturvak\u00e4yt\u00e4nteet muodostavat organisaatioiden tietoturvan ja tietoturvakulttuurin perustan. Ne tukevat organisaatioiden liiketoimintatavoitteiden saavuttamista, ohjaavat henkil\u00f6st\u00f6n tietoturvak\u00e4ytt\u00e4ytymist\u00e4 ja toimivat tietoturvan kommunikointiv\u00e4lineen\u00e4. Tietoturvak\u00e4yt\u00e4nteet ja niiden noudattaminen voidaan kuitenkin kokea kuormittavaksi, josta aiheutuvaa stressi\u00e4 kutsutaan turvallisuusstressiksi. Aikaisemmassa turvallisuusstressin ja tietoturvak\u00e4ytt\u00e4ytymisen tutkimuksessa IT-alan ty\u00f6ntekij\u00e4t ovat selv\u00e4sti olleet aliedustettuina, sill\u00e4 tutkimus on kohdistunut muihin ammattialoihin. Kirjallisuuskatsauksen perusteella aikaisemmassa tutkimuksessa ei my\u00f6sk\u00e4\u00e4n ole tunnistettu, millaiset tietoturvak\u00e4yt\u00e4nteet ty\u00f6ntekij\u00e4t kokevat kaikista stressaavimmiksi. Tutkielman tavoitteena oli saada vastauksia n\u00e4ihin tutkimusaukkoihin ja parantaa ymm\u00e4rryst\u00e4 suomalaisten IT-alan ty\u00f6ntekij\u00f6iden kokemasta turvallisuusstressist\u00e4. Ty\u00f6ntekij\u00f6iden mielipiteit\u00e4 ja kokemuksia tietoturvak\u00e4yt\u00e4nteiden stressaavuudesta selvitettiin laadullisten teemahaastatteluiden avulla ja aineiston analysointimenetelm\u00e4n\u00e4 toimi teemoittelu. Tuloksien mukaan ty\u00f6ntekij\u00e4t kokevat etenkin salasanoihin, tietoturvateknologioihin, arkaluonteiseen tietoon ja laitteisiin liittyv\u00e4t tietoturvak\u00e4yt\u00e4nteet ylikuormittavina, sill\u00e4 ne yht\u00e4aikaisesti lis\u00e4\u00e4v\u00e4t runsaasti ty\u00f6m\u00e4\u00e4r\u00e4\u00e4 ja v\u00e4hent\u00e4v\u00e4t ty\u00f6teht\u00e4viin k\u00e4ytett\u00e4viss\u00e4 olevaa aikaa. Osa stressaavista tietoturvak\u00e4yt\u00e4nteist\u00e4 my\u00f6s koettiin monimutkaisina, sill\u00e4 niit\u00e4 koskevat ovat puutteellisia, vaikeaselkoisia tai hankalia ymm\u00e4rt\u00e4\u00e4.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Information security policies form the foundation of organizations\u2019 information security and information security culture. They support organizations in achieving their business goals, guide the information security behavior of the employees, and function as a communication tool for information security. However, information security policies and complying with them can be experienced as straining and the stress caused by it is called security-related stress. The previous research on information security behavior and security-related stress has focused mainly on non-IT employees, leaving the IT employees underrepresented. Additionally, according to literature review, it has not been identified what kind of information security policies the employees experience as the most stressing. The goal of this thesis was to find out answers to these gaps in the previous research and gain better understanding in what the most stressing information security policies for Finnish IT employees in the IT sector are. The experiences and opinions of the employees regarding information security policies were investigated using qualitative theme interviews and the interview material was analyzed with thematic methods. It was found out that especially policies related to passwords, information security technologies, sensitive information, and devices are experi-ences as overloading because they simultaneously increase the amount of work and decrease available work time for other work tasks. Some of the stressing information security policies were also experiences as complicated because they are insufficient or hard to understand.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2022-11-16T10:12:21Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2022-11-16T10:12:21Z (GMT). No. of bitstreams: 0\n Previous issue date: 2022", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "83", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "tietoturvak\u00e4yt\u00e4nteet", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tietoturvak\u00e4ytt\u00e4ytyminen", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "turvallisuusstressi", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Tietoturvak\u00e4yt\u00e4nn\u00f6t turvallisuusstressin aiheuttajana", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202211165229", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "ty\u00f6ntekij\u00e4t", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "stressi", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
|