Näytä suppeat kuvailutiedot

dc.contributor.authorRauhala, Juhani
dc.date.accessioned2021-12-05T12:09:15Z
dc.date.available2021-12-05T12:09:15Z
dc.date.issued2021
dc.identifier.isbn978-951-39-8962-0
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/78887
dc.description.abstractInternet users with controversial viewpoints may be hesitant to voice their opinions online because they are concerned about consequences that could be inflicted by various entities. Firings, bans from social media, and doxing are some examples of the consequences. Users also have varying opinions about spending money for cybersecurity products and services. Concerns about the risks linked with online free expression may influence such opinions. In addition, some Internet users spend valuable time thinking about and configuring the security settings of their devices. Such time is spent to mitigate the security and privacy risks of the Internet. Some people may be irritated by the amount of time required. Users may be hesitant to express themselves online merely because configuring their devices for a sufficient level of security and privacy is a prerequisite for them, but it takes too much time and effort. Users may, for example, be aware of anonymizing tools and desire to express themselves online, but decide that spending time on anonymity is simply too much effort. The associations between time spent on personal cybersecurity, the reluctance to express online, and a proclivity to purchase cybersecurity and cyberprivacy solutions do not appear to have been previously studied. The present work investigates the associations. A model is constructed to represent hypotheses, and data was collected using a survey. The model is validated by analyses on the data. The research results show the interrelationships between novel latent factors: 1. time spent by users on their device security and privacy settings, 2. users’ proclivity towards purchasing personal cybersecurity and cyberprivacy solutions, and 3. users’ reluctance to freely express themselves online. Relationships were found between the factors and some demographic and cultural variables. Additional security and privacy issues of smartphones are also considered for their potential impacts on Internet users’ behaviors. Finally, some new terminology is proposed to help understand the societal implications of modern technological advancements.en
dc.format.mimetypeapplication/pdf
dc.language.isoeng
dc.publisherJyväskylän yliopisto
dc.relation.ispartofseriesJYU Dissertations
dc.relation.haspart<b>Artikkeli I:</b> Rauhala, J., Tyrväinen, P., & Zaidenberg, N. (2019). Online expression and spending on personal cybersecurity. In <i>T. Cruz, & P. Simoes (Eds.), ECCWS 2019 : Proceedings of the 18th European Conference on Cyber Warfare and Security (pp. 387-393). Academic Conferences International. Proceedings of the European conference on information warfare and security.</i> JYX: <a href="https://jyx.jyu.fi/handle/123456789/67104"target="_blank"> jyx.jyu.fi/handle/123456789/67104</a>
dc.relation.haspart<b>Artikkeli II:</b> Rauhala, J., Tyrväinen, P., & Zaidenberg, N. (2019). Does time spent on device security and privacy inhibit online expression?. In <i>T. Cruz, & P. Simoes (Eds.), ECCWS 2019 : Proceedings of the 18th European Conference on Cyber Warfare and Security (pp. 394-402). Academic Conferences International. Proceedings of the European conference on information warfare and security.</i> JYX: <a href="https://jyx.jyu.fi/handle/123456789/67094"target="_blank"> jyx.jyu.fi/handle/123456789/67094</a>
dc.relation.haspart<b>Artikkeli III:</b> Rauhala, J., Tyrväinen, P., & Zaidenberg, N. (2020). Online Expression, Personal Cybersecurity Costs, and the Specter of Cybercrime. In <i>M. Khosrow-Pour (Ed.), Encyclopedia of Criminal Activities and the Deep Web (pp. 990-1002). IGI Global.</i> DOI: <a href="https://doi.org/10.4018/978-1-5225-9715-5.ch067"target="_blank"> 10.4018/978-1-5225-9715-5.ch067</a>. JYX: <a href="https://jyx.jyu.fi/handle/123456789/67945"target="_blank"> jyx.jyu.fi/handle/123456789/67945</a>
dc.relation.haspart<b>Artikkeli IV:</b> Juhani Rauhala, Nezer Zaidenberg, Pasi Tyrväinen. (2021). The Effect on Expression Reluctance of Spending Time on Privacy and Security Issues. <i>For submission to the journal Computers and Security.</i>
dc.relation.haspart<b>Artikkeli V:</b> Juhani Rauhala (2021). Physical Weaponization of a Smartphone by a Third Party. <i>Accepted manuscript; to be published December 2021.</i>
dc.relation.haspart<b>Artikkeli VI:</b> Juhani Rauhala, Storage Profiles, Patent No.: US 8,583,689. Date of Patent: Nov. 12, 2013.
dc.relation.haspart<b>Artikkeli VII:</b> Juhani Rauhala, Storage Management, Patent No.: US 8,135,745. Date of Patent: March 13, 2012.
dc.rightsIn Copyright
dc.subject.otheronline expressionen
dc.subject.otherprivacy concernsen
dc.subject.othersecurity concernsen
dc.subject.otherpersonal cybersecurity spendingen
dc.subject.otherconsumer cybersecurity spendingen
dc.subject.otherdevice settingsen
dc.subject.othertemporal perceptionsen
dc.subject.othercultural indicesen
dc.subject.othercybercrimeen
dc.subject.othertechnology abuseen
dc.subject.otherunorthodox weaponizationen
dc.subject.othertechnology pretermsen
dc.subject.otherverkkoilmaisufi
dc.subject.otherilmaisunvapausfi
dc.subject.otheryksityisyyden suojafi
dc.subject.otherturvallisuusongelmatfi
dc.subject.otherhenkilökohtaiset kyberturvallisuusmenotfi
dc.subject.otherkuluttajien kyberturvallisuusmenotfi
dc.subject.otherlaiteasetuksetfi
dc.subject.otheraikakäsityksetfi
dc.subject.otherkulttuuriset indeksitfi
dc.subject.othertietoverkkorikollisuusfi
dc.subject.otherteknologian väärinkäyttöfi
dc.subject.otherepätavallinen aseistusfi
dc.subject.otherpsykologian sanastofi
dc.subject.otherteknologian sanastofi
dc.titleTime, Money, and Freedom – The Costs of Internet Users’ Privacy and Security Concerns
dc.typedoctoral thesis
dc.identifier.urnURN:ISBN:978-951-39-8962-0
dc.contributor.tiedekuntaFaculty of Information Technologyen
dc.contributor.tiedekuntaInformaatioteknologian tiedekuntafi
dc.contributor.yliopistoUniversity of Jyväskyläen
dc.contributor.yliopistoJyväskylän yliopistofi
dc.type.coarhttp://purl.org/coar/resource_type/c_db06
dc.relation.issn2489-9003
dc.rights.copyright© The Author & University of Jyväskylä
dc.rights.accesslevelopenAccess
dc.type.publicationdoctoralThesis
dc.subject.ysohackingen
dc.subject.ysohakkerointifi
dc.format.contentfulltext
dc.rights.urlhttps://rightsstatements.org/page/InC/1.0/


Aineistoon kuuluvat tiedostot

Thumbnail

Aineisto kuuluu seuraaviin kokoelmiin

Näytä suppeat kuvailutiedot

In Copyright
Ellei muuten mainita, aineiston lisenssi on In Copyright