fullrecord |
[{"key": "dc.contributor.advisor", "value": "Woods, Naomi", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Myntti, Aleksi", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2023-12-13T08:45:15Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2023-12-13T08:45:15Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2023", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/92300", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Salasananhallintaohjelmistot auttavat k\u00e4ytt\u00e4ji\u00e4\u00e4n luomaan, hallinnoimaan ja varastoimaan turvallisia salasanoja. Vaikka niit\u00e4 yleisesti pidet\u00e4\u00e4n hyv\u00e4n\u00e4 vaihtoehtona salasanojen hallinnointiin, ne ovat edelleen laajalti v\u00e4h\u00e4n k\u00e4ytettyj\u00e4 ty\u00f6kaluja salasanaturvallisuuden parantamiseen. Vaikka aikaisemmat tutkimukset ovatkin tutkineet laajasti salasananhallintaohjelmistojen k\u00e4ytt\u00f6\u00e4 ja turvallisuutta, ei ole suoritettu tutkimuksia, jotka tarkastelisivat salasananhallintaohjelmistojensuhdetta teknostressiin. Salasananhallintaohjelmistojen k\u00e4ytt\u00e4jien ja ei-k\u00e4ytt\u00e4jien kokemaa teknostressi\u00e4 mitattiin m\u00e4\u00e4r\u00e4llisell\u00e4 kyselytutkimuksella. Lis\u00e4ksi kyselyyn osallistuneilta kysyttiin vapaaehtoisella avoimella kysymyksell\u00e4 miksi he k\u00e4ytt\u00e4v\u00e4t tai eiv\u00e4t k\u00e4yt\u00e4 salasananhallintaohjelmistoa. Kyselyn tuloksista saatiin selville, ett\u00e4 salasananhallintaohjelmistojen k\u00e4ytt\u00e4j\u00e4t kokevat ohjelmistosta selv\u00e4sti v\u00e4hemm\u00e4n teknostressi\u00e4 kuin ei-k\u00e4ytt\u00e4j\u00e4t. Lis\u00e4ksi avoimesta kysymyksest\u00e4 selvisi, ett\u00e4 k\u00e4ytt\u00e4j\u00e4t k\u00e4ytt\u00e4v\u00e4t salasananhallintaohjelmistoja p\u00e4\u00e4asiassa salasanojen muistettavuuden, tietoturvan, k\u00e4tevyyden ja helpomman salasananhallinnan takia. Ei-k\u00e4ytt\u00e4j\u00e4t kertoivat k\u00e4ytt\u00e4m\u00e4tt\u00f6myytens\u00e4 johtuvan p\u00e4\u00e4asiassa ep\u00e4luottamuksesta, tarpeen puutteesta, ep\u00e4aktiivisuudesta ja vastahakoisuudesta. Tulokset avaavat mahdollisuuksia parempaan ymm\u00e4rrykseen salasanahallintaohjelmistoista ja niiden mahdollisesti aiheuttamasta teknostressist\u00e4, jonka ansiosta voidaan kehitt\u00e4\u00e4 parempia salasananhallintaohjelmistoja ja parantaa salasanaturvallisuutta.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Password managers helps their users to create, manage and store secure password. Even though they are widely considered a good option to manage passwords, they are often underutilized tools to improve password security. Although previous research has extensively studied password manager usage and security, no studies have been conducted to examine password managers in relation to technostress. A quantitative survey was conducted to measure technostress experienced by password manager users and non-users. Additionally, survey respondents were presented an optional open question to ask why they choose to use or not use password managers. The survey results revealed that users of password managers experience significantly less technostress compared to non-users. Furthermore, from the open question, it was revealed that users primarily use password managers for the password memorability, improved password security, convenience, and easier password management. Non-users reported their lack of use primarily due to distrust, a lack of necessity, inactivity, and reluctance. These findings provide opportunities for a better understanding of password management software and its potential causes for technostress which can result in improved password managers and increased password security.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2023-12-13T08:45:15Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2023-12-13T08:45:15Z (GMT). No. of bitstreams: 0\n Previous issue date: 2023", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "57", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "eng", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": null, "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "password managers", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Password managers : a cause or an alleviator of technostress?", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202312138291", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.copyright", "value": "\u00a9 The Author(s)", "language": null, "element": "rights", "qualifier": "copyright", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "Internet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "salasanat", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "teknostressi", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "Internet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "passwords", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "technostress", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|