_version_ 1800378929811292160
annif_keywords_txtF_mv coping universities authenticity usage study case study
annif_uris_txtF_mv http://www.yso.fi/onto/yso/p11867 http://www.yso.fi/onto/yso/p10895 http://www.yso.fi/onto/yso/p11872 http://www.yso.fi/onto/yso/p3077 http://www.yso.fi/onto/yso/p10982
author Haapaniemi, Heidi
author2 Faculty of Information Technology Informaatioteknologian tiedekunta Information Technology Informaatioteknologia University of Jyväskylä Jyväskylän yliopisto Information Systems Science Tietojärjestelmätiede 601
author_facet Haapaniemi, Heidi Faculty of Information Technology Informaatioteknologian tiedekunta Information Technology Informaatioteknologia University of Jyväskylä Jyväskylän yliopisto Information Systems Science Tietojärjestelmätiede 601 Haapaniemi, Heidi
author_sort Haapaniemi, Heidi
building Jyväskylän yliopisto JYX-julkaisuarkisto
datasource_str_mv jyx
department_txtF Informaatioteknologia
faculty_txtF Informaatioteknologian tiedekunta
first_indexed 2024-04-30T20:00:45Z
format Pro gradu
format_ext_str_mv Opinnäyte Maisterivaiheen työ
free_online_boolean 1
fullrecord <?xml version="1.0"?> <qualifieddc schemaLocation="http://purl.org/dc/terms/ http://dublincore.org/schemas/xmls/qdc/2006/01/06/dcterms.xsd http://purl.org/dc/elements/1.1/ http://dublincore.org/schemas/xmls/qdc/2006/01/06/dc.xsd"><title>Exploring perceptions and coping behaviors regarding imposed multifactor authentication usage : a university case study</title><creator>Haapaniemi, Heidi</creator><contributor type="tiedekunta" lang="en">Faculty of Information Technology</contributor><contributor type="tiedekunta" lang="fi">Informaatioteknologian tiedekunta</contributor><contributor type="laitos" lang="en">Information Technology</contributor><contributor type="laitos" lang="fi">Informaatioteknologia</contributor><contributor type="yliopisto" lang="en">University of Jyv&#xE4;skyl&#xE4;</contributor><contributor type="yliopisto" lang="fi">Jyv&#xE4;skyl&#xE4;n yliopisto</contributor><contributor type="oppiaine" lang="en">Information Systems Science</contributor><contributor type="oppiaine" lang="fi">Tietoj&#xE4;rjestelm&#xE4;tiede</contributor><contributor type="oppiainekoodi">601</contributor><subject type="other">data breach</subject><subject type="other">protection motivation theory</subject><subject type="other">coping behavior</subject><subject type="other">suojelumotivaatioteoria</subject><subject type="other">selviytymisk&#xE4;ytt&#xE4;ytyminen</subject><subject type="other">tunnistautuminen</subject><subject type="yso">tietomurto</subject><subject type="yso">kyberturvallisuus</subject><subject type="yso">salasanat</subject><subject type="yso">todentaminen</subject><subject type="yso">data break-in</subject><subject type="yso">cyber security</subject><subject type="yso">passwords</subject><subject type="yso">authentication</subject><available>2024-04-30T06:17:08Z</available><issued>2024</issued><type lang="en">Master&#x2019;s thesis</type><type lang="fi">Pro gradu -tutkielma</type><identifier type="uri">https://jyx.jyu.fi/handle/123456789/94575</identifier><identifier type="urn">URN:NBN:fi:jyu-202404303203</identifier><language type="iso">eng</language><rights>In Copyright</rights><rights type="copyright">&#xA9; The Author(s)</rights><rights type="accesslevel">openAccess</rights><rights type="url">https://rightsstatements.org/page/InC/1.0/</rights><permaddress type="urn">http://www.urn.fi/URN:NBN:fi:jyu-202404303203</permaddress><file bundle="ORIGINAL" href="https://jyx.jyu.fi/bitstream/123456789/94575/1/URN%3aNBN%3afi%3ajyu-202404303203.pdf" name="URN:NBN:fi:jyu-202404303203.pdf" type="application/pdf" length="1167580" sequence="1"/><recordID>123456789_94575</recordID></qualifieddc>
id jyx.123456789_94575
language eng
last_indexed 2024-05-20T20:01:24Z
main_date 2024-01-01T00:00:00Z
main_date_str 2024
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstream\/123456789\/94575\/1\/URN%3aNBN%3afi%3ajyu-202404303203.pdf","text":"URN:NBN:fi:jyu-202404303203.pdf","source":"jyx","mediaType":"application\/pdf"}
oppiainekoodi_txtF 601
publication_first_indexed 2024-04-30T20:00:45Z
publishDate 2024
record_format qdc
source_str_mv jyx
spellingShingle Haapaniemi, Heidi Exploring perceptions and coping behaviors regarding imposed multifactor authentication usage : a university case study data breach protection motivation theory coping behavior suojelumotivaatioteoria selviytymiskäyttäytyminen tunnistautuminen tietomurto kyberturvallisuus salasanat todentaminen data break-in cyber security passwords authentication
subject_txtF Kognitiotiede
thumbnail https://jyu.finna.fi/Cover/Show?source=Solr&id=jyx.123456789_94575&index=0&size=large
title Exploring perceptions and coping behaviors regarding imposed multifactor authentication usage : a university case study
title_full Exploring perceptions and coping behaviors regarding imposed multifactor authentication usage : a university case study
title_fullStr Exploring perceptions and coping behaviors regarding imposed multifactor authentication usage : a university case study Exploring perceptions and coping behaviors regarding imposed multifactor authentication usage : a university case study
title_full_unstemmed Exploring perceptions and coping behaviors regarding imposed multifactor authentication usage : a university case study Exploring perceptions and coping behaviors regarding imposed multifactor authentication usage : a university case study
title_short Exploring perceptions and coping behaviors regarding imposed multifactor authentication usage
title_sort exploring perceptions and coping behaviors regarding imposed multifactor authentication usage a university case study
title_sub a university case study
title_txtP Exploring perceptions and coping behaviors regarding imposed multifactor authentication usage : a university case study
topic data breach protection motivation theory coping behavior suojelumotivaatioteoria selviytymiskäyttäytyminen tunnistautuminen tietomurto kyberturvallisuus salasanat todentaminen data break-in cyber security passwords authentication
topic_facet authentication coping behavior cyber security data breach data break-in kyberturvallisuus passwords protection motivation theory salasanat selviytymiskäyttäytyminen suojelumotivaatioteoria tietomurto todentaminen tunnistautuminen
url https://jyx.jyu.fi/handle/123456789/94575 http://www.urn.fi/URN:NBN:fi:jyu-202404303203
work_keys_str_mv AT haapaniemiheidi exploringperceptionsandcopingbehaviorsregardingimposedmultifactorauthenticationu