fullrecord |
[{"key": "dc.contributor.advisor", "value": "Soliman, Wael", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Kronholm, Kristiina", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2022-12-23T05:45:24Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2022-12-23T05:45:24Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2022", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/84571", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "T\u00e4ss\u00e4 pro gradu -tutkielmassa tarkastellaan maksettuja valearvioita kyberpetoksena. Maksetut valearviot eiv\u00e4t ole kaukainen ja nime\u00e4m\u00e4t\u00f6n ilmi\u00f6 internetalustoilla, vaan ne vaikuttavat voimakkaasti internetiss\u00e4 kuluttajan saatavilla olevaan tietoon. Valearviot esiintyv\u00e4t internetin alustoilla ollen uhkana informaation luotettavuudelle. Ne voivat h\u00e4irit\u00e4 markkinoita ja palveluita. Crowdturfingin k\u00e4site eli massamanipulointikampanjointi, jolla on aina taloudellinen motiivi, esitet\u00e4\u00e4n maksetun valearvion keskeisen\u00e4 piirteen\u00e4. Erityisesti pienemmille organisaatioille valearviot ovat vakava ongelma, koska niill\u00e4 on v\u00e4hemm\u00e4n resursseja k\u00e4ytett\u00e4v\u00e4ksi haitallisten hy\u00f6kk\u00e4ysten ja kyberuhkien torjunnassa. T\u00e4m\u00e4n tutkimuksen tutkimuskysymykset ovat seuraavat: Kuinka hyvin organisaatiot tunnistavat maksettuja valearvioita? Mit\u00e4 toimia organisaatiot tekev\u00e4t t\u00e4ll\u00e4 hetkell\u00e4 maksettujen valearvioiden suhteen? Mitk\u00e4 ovat organisaatioiden tulevaisuuden suunnitelmat maksettujen valearvioiden suhteen? Tutkimusmetodi koostuu kirjallisuuskatsauksesta k\u00e4sitt\u00e4en internetpetosten teoreettisen k\u00e4sitteist\u00f6n, sek\u00e4 petosteorian ja sen taktiikan teoreettisen tutkimuskehyksen. Empiirisesti maksettujen valearvioiden ongelmaa tutkitaan 20 organisaation haastatteluilla. Tutkimusn\u00e4k\u00f6kulma keskittyy mikro- ja pienorganisaatioiden, sek\u00e4 keskisuurteen ja suurten organisaatioiden vastausten havainnointiin. Tutkimuksen keskeiset havainnot koskivat k\u00e4sitteen tuntemattomuutta, sek\u00e4 v\u00e4\u00e4rinymm\u00e4rrettyj\u00e4 uskomuksia valearvioista vaarattomina ja ennustettavina. Lis\u00e4ksi nousivat esiin nykyhetkellinen tietoisuus ja valmistautumattomuus tulevien mahdollisten kyberhy\u00f6kk\u00e4ysten tapahtuessa. Kiinnostuksen puute tulevaisuuden varautumista kohtaan oli my\u00f6s keskeinen havainto. Organisaatioilla oli my\u00f6s selke\u00e4 ep\u00e4varmuus siit\u00e4, miten tunnistaa maksettu valearvio. T\u00e4m\u00e4n tutkielman vaikutukset tieteelliseen teoriaan ja k\u00e4yt\u00e4nt\u00f6\u00f6n pyrkiv\u00e4t siihen, ett\u00e4 maksettujen valearvioiden uhka vakavasti otettavana petoksena on organisaatioiden n\u00e4k\u00f6kulmasta irrallinen ja t\u00e4sment\u00e4m\u00e4t\u00f6n uhka. Niill\u00e4 ei ole selke\u00e4\u00e4 m\u00e4\u00e4ritelm\u00e4\u00e4 ja ne voidaan helposti sekoittaa provokatiiviseen kirjoittamiseen (trollaus) tai muuhun ei-taloudelliseen motiivin pohjalta tehtyyn petokseen. T\u00e4t\u00e4 aihetta on tutkittava edelleen ja t\u00e4m\u00e4 opinn\u00e4ytety\u00f6 osoittaa puutteen organisaatioiden valmiudessa. Teoreettisesti on useita tapoja puolustautua maksettuja valearvioita vastaan, mutta organisaatioiden k\u00e4yt\u00e4nn\u00f6n tietoisuus ja toiminta eiv\u00e4t ole viel\u00e4 yhdenmukaisia olemassa olevan tiedon suhteen.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "This master\u2019s thesis examines paid false reviews as cyber deception. Paid false reviews are not a distant and an abstract phenomenon somewhere on the internet platforms since they affect heavily on available information on internet which is available for consumers. False reviews take place on the scale of information security as a threat to reliability of information and they have severe potential to disrupt markets and services and decrease the reliability of information. A concept of crowdturfing, a mass manipulation campaign with an economic motive is presented as a key concept of paid false review\u2019s feature as a cyber deception. Specifically smaller organizations are facing severe issues, since they have fewer resources to spend when preparing against malicious attacks and cyber threats. The research questions of this study are defined as following: How familiar organizations are with paid false reviews? What actions organizations are doing against paid false reviews at the present time? What are organizations\u2019 future plans to deal with paid false reviews? The research approach is selected to be a concluded literature review of internet deceptions following a theoretical framework of deception theory and its tactics. Empirically the issue of paid false reviews is observed through interviews of 20 organizations by structured interviews. The research angle is observing organizations, which contained 13 micro and small organizations and 7 medium and large-sized organizations. The key findings of the study were concluded as the lack of knowledge of the concept or misunderstood belief of paid false reviews as harmless and predictable, current awareness and spontaneous reaction in the situation of upcoming attacks, and lack of interest towards actions in the future. Also, the interviewees did have clear uncertainty how to recognize a paid false review. The implications to theory and practice of this thesis are that paid false reviews a form of deception is from the point of organizations as detached and abstract threat which has no clear definition, and which can be easily disrupted with trolling or other non- economical motive base deception. This topic needs to be studied further and this thesis directs to point out the lack of serious preparedness. From theoretical aspect there are multiple ways to defend against paid false reviews, but the practical awareness and actions of the organizations are not coherent yet.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Miia Hakanen (mihakane@jyu.fi) on 2022-12-23T05:45:24Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2022-12-23T05:45:24Z (GMT). No. of bitstreams: 0\n Previous issue date: 2022", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "66", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "eng", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "Paid false review", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "Internet Deception", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "Cyber Deception", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Paid False Reviews As Cyber Deception", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202212235811", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "joukkorahoitus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "crowdfunding", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
|