fullrecord |
[{"key": "dc.contributor.advisor", "value": "Siponen, Mikko", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.advisor", "value": "Laatikainen, Gabriella", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Uurtimo, Justus", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2023-10-06T08:49:03Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2023-10-06T08:49:03Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2023", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/89480", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "T\u00e4m\u00e4n pro-gradu tutkimuksen tarkoituksena on tutkia sit\u00e4 miten suomalaisen \nIT-alan organisaation ty\u00f6ntekij\u00e4t reagoivat saamiinsa tietojenkalasteluviesteihin. \nT\u00e4m\u00e4n lis\u00e4ksi tutkimuksessa pyrit\u00e4\u00e4n selvitt\u00e4m\u00e4\u00e4n, onko \ntietojenkalasteluviestien kehittyneisyydell\u00e4 vaikutusta siihen, luodaanko \nkalasteluviestist\u00e4 ilmoitus ja vaikuttaako tietojenkalastelun onnistumiseen se, \navataanko viesti mobiililaitteella. Tutkimus koostuu kirjallisuuskatsauksesta, \nsek\u00e4 tutkimusosiosta, joka suoritettiin kentt\u00e4kokeena, jota t\u00e4ydennettiin kahden \notoksen suhteiden testill\u00e4 suoritettavalla data-analyysill\u00e4, sek\u00e4 haastatteluilla. \nTutkimuksen aineisto koostuu kahdesta tietojenkalasteluaallosta, sek\u00e4 niiden \nj\u00e4lkeen suoritetuista haastatteluista. Tietojenkalasteluaallot suoritettiin osana \nkohdeorganisaatioon teht\u00e4v\u00e4\u00e4 tietojenkalastelusimulaatiota. Osana tutkimusta \nsuoritettujen tietojenkalasteluaaltojen, sek\u00e4 haastatteluiden avulla voitiin saada \nlaadullista ja m\u00e4\u00e4r\u00e4llist\u00e4 dataa henkil\u00f6iden toiminnasta saatuaan \ntietojenkalasteluviestin. T\u00e4ss\u00e4 tutkimuksessa ker\u00e4tty data on laaja-alaista ja se on \nker\u00e4tty todenmukaisissa olosuhteissa. Osana tutkimusta p\u00e4\u00e4stiin my\u00f6s \nhaastattelemaan henkil\u00f6it\u00e4, jotka olivat saaneet tutkimuksen simulaatiossa \nl\u00e4hetettyj\u00e4 tietojenkalasteluviestej\u00e4. Tutkimuksen tulokset osoittivat, ett\u00e4 ihmiset \nreagoivat monin eri tavoin vastaanottamiinsa tietojenkalasteluviesteihin ja \norganisaation sis\u00e4ll\u00e4 kommunikoitiin monipuolisesti tietojenkalasteluviesteist\u00e4. \nTutkimuksen tulokset osoittivat my\u00f6s, ett\u00e4 tietojenkalasteluviestin \nkohdentamisella oli vaikutusta siihen, oliko tietojenkalastelu onnistunutta. \nTietojenkalastelun kohdentamisella ei t\u00e4m\u00e4n tutkimuksen tulosten perusteella \nole vaikutusta siihen luodaanko kalasteluviestist\u00e4 ilmoitus. Mobiililaitteen \nk\u00e4ytt\u00e4misen ja tietojenkalasteluviestin onnistumisen v\u00e4lilt\u00e4 ei voitu t\u00e4m\u00e4n \ntutkimuksen perusteella vet\u00e4\u00e4 suoria johtop\u00e4\u00e4t\u00f6ksi\u00e4, sill\u00e4 \ntietojenkalasteluviestej\u00e4 avattiin hyvin harvoin mobiililaitteella, jonka vuoksi \ndataa siit\u00e4 ei kertynyt tarpeeksi. T\u00e4t\u00e4 tutkimusta voidaan soveltaa \norganisaatioiden sis\u00e4isten ilmoitusk\u00e4yt\u00e4nt\u00f6jen, sek\u00e4 muiden \ntietoturvamekanismien kehitt\u00e4miseen. Tutkimusta voidaan my\u00f6s hy\u00f6dynt\u00e4\u00e4 \ntulevissa tietojenkalastelusimulaatioissa, sek\u00e4 tietojenkalasteluun liittyviss\u00e4 \ntutkimuksissa.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "The purpose of this master's thesis is to investigate how employees of a Finnish \nIT organization react to phishing emails they receive. Additionally, the study \naims to determine whether the sophistication of phishing emails has an impact \non whether the phishing is successful and whether a report is generated. The \nstudy also aims to determine if the success of phishing is influenced by opening \nthe email on a mobile device. The research consists of a literature review and a \nresearch section. The research section was conducted as a field study and it was \nsupplemented by data analysis using a two-sample proportions test, and \ninterviews. The data for the study consists of two phishing waves and interviews \nconducted after these waves. The phishing waves were conducted as part of a \nphishing simulation in the target organization. Through the phishing waves and \ninterviews conducted as part of the study, qualitative and quantitative data were \ncollected on how individuals behave when they receive phishing emails. The \ndata collected in this study is comprehensive and was collected under realistic \nconditions. As part of the research, interviews were conducted with individuals \nwho had received phishing emails sent as part of the research simulation. The \nresults of the study showed that people react in various ways to the phishing \nemails they receive, and there was diverse communication within the \norganization regarding phishing emails. The study also found that the \nsophistication of phishing emails had an impact on whether phishing attempts \nwere successful. Based on the results of this study, the sophistication of phishing \ndid not affect whether a report was generated. Regarding the relationship \nbetween using a mobile device to open phishing emails and the success of \nphishing, no direct conclusions could be drawn from this study because phishing \nemails were rarely opened on mobile devices, and therefore, there was not \nenough data. This research can be applied to the development of internal \nnotification practices and other security mechanisms within organizations. It can \nalso be used in future phishing simulation exercises and research related to \nphishing.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2023-10-06T08:49:03Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2023-10-06T08:49:03Z (GMT). No. of bitstreams: 0\n Previous issue date: 2023", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "63", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": null, "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "tietojenkalastelu", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kohdennettu tietojenkalastelu", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kalastelusta ilmoittaminen", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Tietojenkalastelu ja siit\u00e4 ilmoittaminen suomalaisessa it-alan organisaatiossa", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202310065510", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Kyberturvallisuus", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Kyberturvallisuus", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.copyright", "value": "\u00a9 The Author(s)", "language": null, "element": "rights", "qualifier": "copyright", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "verkkourkinta", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|