fullrecord |
[{"key": "dc.contributor.author", "value": "\u00c5kerlund, Ronja", "language": null, "element": "contributor", "schema": "dc", "qualifier": "author"}, {"key": "dc.date.accessioned", "value": "2025-04-10T05:36:19Z", "language": null, "element": "date", "schema": "dc", "qualifier": "accessioned"}, {"key": "dc.date.available", "value": "2025-04-10T05:36:19Z", "language": null, "element": "date", "schema": "dc", "qualifier": "available"}, {"key": "dc.date.issued", "value": "2025", "language": null, "element": "date", "schema": "dc", "qualifier": "issued"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/101338", "language": null, "element": "identifier", "schema": "dc", "qualifier": "uri"}, {"key": "dc.description.abstract", "value": "T\u00e4ss\u00e4 tutkielmassa tarkastellaan teko\u00e4lyn roolia kyberrikollisuudessa. Tutkielmassa keskityt\u00e4\u00e4n erityisesti siihen, kuinka teko\u00e4ly tehostaa kyberhy\u00f6kk\u00e4yksi\u00e4. Teko\u00e4ly on teknologiana kehittynyt merkitt\u00e4v\u00e4sti viime vuosina ja sen k\u00e4ytt\u00f6 rikollisessa toiminnassa, erityisesti kyberhy\u00f6kk\u00e4yksiss\u00e4, on kasvanut huomattavasti. Teko\u00e4lyn k\u00e4ytt\u00f6 rikollisessa toiminnassa tuo mukanaan uusia haasteita ja riskej\u00e4, sill\u00e4 se tekee hy\u00f6kk\u00e4yksist\u00e4 entist\u00e4 tehokkaampia, automatisoidumpia ja vaikeammin havaittavia. Tutkielma pyrkii tuomaan\nesille teko\u00e4lyn roolia erilaisissa kyberhy\u00f6kk\u00e4ystekniikoissa, kuten tietomurroissa, haittaohjelmissa, identiteettivarkauksissa ja sosiaalisissa manipulaatioissa. Lis\u00e4ksi tarkastellaan, kuinka teko\u00e4lypohjaiset hy\u00f6kk\u00e4ystekniikat eroavat perinteisist\u00e4 menetelmist\u00e4. Lopuksi tutkimuksessa analysoidaan teko\u00e4lyn k\u00e4yt\u00f6st\u00e4 aiheutuvia riskej\u00e4 ja haasteita kyberturvallisuuden n\u00e4k\u00f6kulmasta. Ymm\u00e4rt\u00e4m\u00e4ll\u00e4 n\u00e4it\u00e4 riskej\u00e4 pystyt\u00e4\u00e4n kehitt\u00e4m\u00e4\u00e4n parempia tietoturvaratkaisuja ja ennakoimaan tulevia kyberuhkia. Tutkimus pyrkii edist\u00e4m\u00e4\u00e4n\nyleist\u00e4 tietoisuutta teko\u00e4lyn merkityksest\u00e4 kyberhy\u00f6kk\u00e4yksiss\u00e4 ja korostaa tarvetta vahvistaa kyberturvallisuuden puolustusstrategioita.", "language": "fi", "element": "description", "schema": "dc", "qualifier": "abstract"}, {"key": "dc.description.abstract", "value": "", "language": "en", "element": "description", "schema": "dc", "qualifier": "abstract"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2025-04-10T05:36:19Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "schema": "dc", "qualifier": "provenance"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2025-04-10T05:36:19Z (GMT). No. of bitstreams: 0\n Previous issue date: 2025", "language": "en", "element": "description", "schema": "dc", "qualifier": "provenance"}, {"key": "dc.format.extent", "value": "28", "language": null, "element": "format", "schema": "dc", "qualifier": "extent"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "schema": "dc", "qualifier": "iso"}, {"key": "dc.rights", "value": "In Copyright", "language": null, "element": "rights", "schema": "dc", "qualifier": null}, {"key": "dc.subject.other", "value": "", "language": null, "element": "subject", "schema": "dc", "qualifier": "other"}, {"key": "dc.title", "value": "Teko\u00e4lyn k\u00e4ytt\u00f6 kyberrikollisuudessa", "language": null, "element": "title", "schema": "dc", "qualifier": null}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "schema": "dc", "qualifier": null}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202504103170", "language": null, "element": "identifier", "schema": "dc", "qualifier": "urn"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "schema": "dc", "qualifier": "faculty"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "schema": "dc", "qualifier": "faculty"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "schema": "dc", "qualifier": "department"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "schema": "dc", "qualifier": "department"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": null, "element": "contributor", "schema": "dc", "qualifier": "organization"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": null, "element": "contributor", "schema": "dc", "qualifier": "organization"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "schema": "dc", "qualifier": "discipline"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "schema": "dc", "qualifier": "discipline"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "schema": "dc", "qualifier": "coar"}, {"key": "dc.rights.copyright", "value": "\u00a9 The Author(s)", "language": "fi", "element": "rights", "schema": "dc", "qualifier": "copyright"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "schema": "dc", "qualifier": "accesslevel"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "schema": "dc", "qualifier": "publication"}, {"key": "dc.subject.yso", "value": "verkkohy\u00f6kk\u00e4ykset", "language": null, "element": "subject", "schema": "dc", "qualifier": "yso"}, {"key": "dc.subject.yso", "value": "koneoppiminen", "language": null, "element": "subject", "schema": "dc", "qualifier": "yso"}, {"key": "dc.subject.yso", "value": "syv\u00e4oppiminen", "language": null, "element": "subject", "schema": "dc", "qualifier": "yso"}, {"key": "dc.subject.yso", "value": "neuroverkot", "language": null, "element": "subject", "schema": "dc", "qualifier": "yso"}, {"key": "dc.subject.yso", "value": "teko\u00e4ly", "language": null, "element": "subject", "schema": "dc", "qualifier": "yso"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "schema": "dc", "qualifier": "yso"}, {"key": "dc.subject.yso", "value": "kyberrikollisuus", "language": null, "element": "subject", "schema": "dc", "qualifier": "yso"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "schema": "dc", "qualifier": "url"}, {"key": "dc.description.accessibilityfeature", "value": "unknown accessibility", "language": "en", "element": "description", "schema": "dc", "qualifier": "accessibilityfeature"}, {"key": "dc.description.accessibilityfeature", "value": "ei tietoa saavutettavuudesta", "language": "fi", "element": "description", "schema": "dc", "qualifier": "accessibilityfeature"}]
|