fullrecord |
[{"key": "dc.contributor.advisor", "value": "Woods, Naomi", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Kariuki, Emilia", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2024-12-09T19:19:28Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2024-12-09T19:19:28Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2024", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/98878", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "This thesis investigates the user consent habits and perceptions of website cookies across differing information technology backgrounds and levels of security awareness. The importance for the thesis derives from the increased focus on online security, with the increasing amount of internet usage by all demographics.\nWebsite cookies are commonly defined as small files that websites use to track user activity and preferences. They can save data such as usernames, passwords and user preferences. Specific cookies are also used to identify specific users, thus making it possible to offer the user personalized advertisements and enhanced user experience.\nDue to international laws such as the EU\u2019s General Data Protection Regulation (GDPR), websites are required to ask the user for permission for the use of optional cookies. This allows for research to inspect user consent habits as well as perceptions of the interaction.\nThe research consists of two main sections, literature review and an empirical section. In the literature review section prior research is used to form a basis for the empirical section. The empirical section consists of a quantitative case study which collects information about the user\u2019s consent habits and perception to website cookies across differing IT backgrounds and levels of security using an online survey tool.\nFindings from this case study show a degree of consistency with the results from the literature review. The study suggests that security awareness significantly correlates with cookie consent habits, a higher level of security awareness correlating with declining cookies more often. Interestingly, the same significant correlation was not found between IT expertise and cookie consent habits. The literature review revealed that IT expertise does not necessarily correlate with higher levels of security actions, making the results logical in that context.\nAdditionally, the research identified significant differences in perceptions. The trend indicates that security awareness and IT expertise positively correlate with both positive and negative perceptions of website cookies.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "T\u00e4ss\u00e4 tutkielmassa selvitet\u00e4\u00e4n k\u00e4ytt\u00e4jien suostumustottumuksia ja n\u00e4kemyksi\u00e4 verkkosivuston ev\u00e4steisiin liittyen, erilaisilla tietotekniikan taustoilla ja tietoturvatietoisuuden tasoilla. Tutkielman merkitys johtuu lis\u00e4\u00e4ntyneest\u00e4 keskittymisest\u00e4 verkkoturvallisuuteen, kun kaikki v\u00e4est\u00f6ryhm\u00e4t k\u00e4ytt\u00e4v\u00e4t interneti\u00e4 yh\u00e4 enemm\u00e4n. \nVerkkosivuston ev\u00e4steet m\u00e4\u00e4ritell\u00e4\u00e4n yleens\u00e4 pieniksi tiedostoiksi, joita verkkosivustot k\u00e4ytt\u00e4v\u00e4t k\u00e4ytt\u00e4jien toiminnan ja mieltymysten seuraamiseen. Ne voivat tallentaa tietoja, kuten k\u00e4ytt\u00e4j\u00e4nimi\u00e4, salasanoja ja k\u00e4ytt\u00e4j\u00e4asetuksia. Erityisi\u00e4 ev\u00e4steit\u00e4 k\u00e4ytet\u00e4\u00e4n my\u00f6s tiettyjen k\u00e4ytt\u00e4jien tunnistamiseen, jolloin k\u00e4ytt\u00e4j\u00e4lle voidaan tarjota henkil\u00f6kohtaisia mainoksia ja parannettu k\u00e4ytt\u00f6kokemus.\nKansainv\u00e4lisist\u00e4 laeista, kuten EU:n yleisest\u00e4 tietosuoja-asetuksesta (GDPR), johtuen verkkosivustojen on pyydett\u00e4v\u00e4 k\u00e4ytt\u00e4j\u00e4lt\u00e4 lupa valinnaisten ev\u00e4steiden k\u00e4ytt\u00f6\u00f6n. T\u00e4m\u00e4 mahdollistaa tutkimuksen k\u00e4ytt\u00e4jien suostumustottumusten ja vuorovaikutusta koskeviin k\u00e4sityksiin liittyen. Tutkimus koostuu kahdesta p\u00e4\u00e4osasta, kirjallisuuskatsauksesta sek\u00e4 empiirisest\u00e4 tutkimuksesta. Kirjallisuuskatsaus osiossa, aiempaa tutkimusta k\u00e4ytet\u00e4\u00e4n empiirisen osion pohjana. Empiirinen osio koostuu kvantitatiivisesta tapaustutkimuksesta, jossa ker\u00e4t\u00e4\u00e4n tietoa k\u00e4ytt\u00e4j\u00e4n suostumustottumuksista ja k\u00e4sityksist\u00e4 verkkosivustojen ev\u00e4steisiin liittyen erilaisilla IT-taustoilla ja turvallisuustasoilla verkkokyselyty\u00f6kalun avulla. \nT\u00e4m\u00e4n tapaustutkimuksen tulokset osoittavat jonkinasteista yhdenmukaisuutta kirjallisuuskatsauksen tulosten kanssa. Tutkimus viittaa siihen, ett\u00e4 tietoturvatietoisuus korreloi merkitt\u00e4v\u00e4sti ev\u00e4steiden suostumustottumusten kanssa, korkeampi turvallisuustietoisuuden taso korreloi ev\u00e4steiden hylk\u00e4\u00e4misen kanssa. Mielenkiintoista on, ett\u00e4 samaa merkitt\u00e4v\u00e4\u00e4 korrelaatiota ei havaittu IT-asiantuntemuksen ja ev\u00e4steiden suostumustottumusten v\u00e4lill\u00e4. Kirjallisuuskatsaus paljasti, ett\u00e4 IT-asiantuntemus ei v\u00e4ltt\u00e4m\u00e4tt\u00e4 korreloi korkeamman tason tietoturvatoimien kanssa, joten tulokset ovat loogisia t\u00e4ss\u00e4 yhteydess\u00e4. Lis\u00e4ksi tutkimuksessa havaittiin merkitt\u00e4vi\u00e4 eroja k\u00e4sityksiss\u00e4. Trendi osoittaa, ett\u00e4 tietoturvatietoisuus ja IT-asiantuntemus korreloivat positiivisesti sek\u00e4 positiivisten ett\u00e4 negatiivisten k\u00e4sitysten kanssa verkkosivuston ev\u00e4steist\u00e4.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2024-12-09T19:19:28Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2024-12-09T19:19:28Z (GMT). No. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "68", "language": null, "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "eng", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "CC BY-NC-ND 4.0", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.title", "value": "Understanding cookie consent: habits and perceptions across information technology backgrounds and levels of security awareness", "language": null, "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202412097691", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Master's Degree Programme in Cyber Security", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Kyberturvallisuuden maisteriohjelma", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.copyright", "value": "\u00a9 The Author(s)", "language": null, "element": "rights", "qualifier": "copyright", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://creativecommons.org/licenses/by-nc-nd/4.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|