Tekoälyn hyödyntäminen organisaatioiden tietoturvauhkia vastaan

Digitaalinen kehitys tuo uusia tietoturvallisuushaasteita. Tavoitteena on selvittää, millaisia tekoälypohjaisia ratkaisuja on olemassa ja millaisia haasteita niiden käyttöönottoon liittyy. Tutkielmassa havaittiin, että tekoäly ratkaisut voivat parantaa organisaatioiden tietoturvallisuutta sekä autta...

Täydet tiedot

Bibliografiset tiedot
Päätekijä: Järvinen, Riki
Muut tekijät: Informaatioteknologian tiedekunta, Faculty of Information Technology, Informaatioteknologia, Information Technology, Jyväskylän yliopisto, University of Jyväskylä
Aineistotyyppi: Kandityö
Kieli:fin
Julkaistu: 2025
Aiheet:
Linkit: https://jyx.jyu.fi/handle/123456789/101923
_version_ 1833317359636447232
author Järvinen, Riki
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_facet Järvinen, Riki Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Järvinen, Riki Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_sort Järvinen, Riki
datasource_str_mv jyx
description Digitaalinen kehitys tuo uusia tietoturvallisuushaasteita. Tavoitteena on selvittää, millaisia tekoälypohjaisia ratkaisuja on olemassa ja millaisia haasteita niiden käyttöönottoon liittyy. Tutkielmassa havaittiin, että tekoäly ratkaisut voivat parantaa organisaatioiden tietoturvallisuutta sekä auttaa ennakoimaan tulevia uhkia. Käyttöönottoon liittyy kuitenkin teknisiä ja organisaatiotason haasteita, jotka on tärkeä ottaa huomioon. Digital development introduces new cybersecurity challenges that organizations must address. The aim of this paper is to explore existing artificial intelligence (AI) solutions and examine the challenges associated with their implementation. The study found that AI-based solutions can enhance organizational cybersecurity and help anticipate the future threats. However, the implementation of such solutions involves both technical and organizational challenges that need to be carefully consired.
first_indexed 2025-05-12T20:00:40Z
format Kandityö
fullrecord [{"key": "dc.contributor.advisor", "value": "Tiihonen, Timo", "language": null, "element": "contributor", "schema": "dc", "qualifier": "advisor"}, {"key": "dc.contributor.author", "value": "J\u00e4rvinen, Riki", "language": null, "element": "contributor", "schema": "dc", "qualifier": "author"}, {"key": "dc.date.accessioned", "value": "2025-05-12T06:03:36Z", "language": null, "element": "date", "schema": "dc", "qualifier": "accessioned"}, {"key": "dc.date.available", "value": "2025-05-12T06:03:36Z", "language": null, "element": "date", "schema": "dc", "qualifier": "available"}, {"key": "dc.date.issued", "value": "2025", "language": null, "element": "date", "schema": "dc", "qualifier": "issued"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/101923", "language": null, "element": "identifier", "schema": "dc", "qualifier": "uri"}, {"key": "dc.description.abstract", "value": "Digitaalinen kehitys tuo uusia tietoturvallisuushaasteita. Tavoitteena on selvitt\u00e4\u00e4, millaisia\nteko\u00e4lypohjaisia ratkaisuja on olemassa ja millaisia haasteita niiden k\u00e4ytt\u00f6\u00f6nottoon liittyy.\nTutkielmassa havaittiin, ett\u00e4 teko\u00e4ly ratkaisut voivat parantaa organisaatioiden tietoturvallisuutta sek\u00e4 auttaa ennakoimaan tulevia uhkia. K\u00e4ytt\u00f6\u00f6nottoon liittyy kuitenkin teknisi\u00e4 ja\norganisaatiotason haasteita, jotka on t\u00e4rke\u00e4 ottaa huomioon.", "language": "fi", "element": "description", "schema": "dc", "qualifier": "abstract"}, {"key": "dc.description.abstract", "value": "Digital development introduces new cybersecurity challenges that organizations must address.\nThe aim of this paper is to explore existing artificial intelligence (AI) solutions and examine\nthe challenges associated with their implementation. The study found that AI-based solutions\ncan enhance organizational cybersecurity and help anticipate the future threats. However, the\nimplementation of such solutions involves both technical and organizational challenges that\nneed to be carefully consired.", "language": "en", "element": "description", "schema": "dc", "qualifier": "abstract"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2025-05-12T06:03:36Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "schema": "dc", "qualifier": "provenance"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2025-05-12T06:03:36Z (GMT). No. of bitstreams: 0\n Previous issue date: 2025", "language": "en", "element": "description", "schema": "dc", "qualifier": "provenance"}, {"key": "dc.format.extent", "value": "23", "language": null, "element": "format", "schema": "dc", "qualifier": "extent"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "schema": "dc", "qualifier": "iso"}, {"key": "dc.rights", "value": "In Copyright", "language": null, "element": "rights", "schema": "dc", "qualifier": null}, {"key": "dc.subject.other", "value": "", "language": null, "element": "subject", "schema": "dc", "qualifier": "other"}, {"key": "dc.title", "value": "Teko\u00e4lyn hy\u00f6dynt\u00e4minen organisaatioiden tietoturvauhkia vastaan", "language": null, "element": "title", "schema": "dc", "qualifier": null}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "schema": "dc", "qualifier": null}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202505124164", "language": null, "element": "identifier", "schema": "dc", "qualifier": "urn"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "schema": "dc", "qualifier": "faculty"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "schema": "dc", "qualifier": "faculty"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "schema": "dc", "qualifier": "department"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "schema": "dc", "qualifier": "department"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": null, "element": "contributor", "schema": "dc", "qualifier": "organization"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": null, "element": "contributor", "schema": "dc", "qualifier": "organization"}, {"key": "dc.subject.discipline", "value": "Tietojenk\u00e4sittelytiede", "language": "fi", "element": "subject", "schema": "dc", "qualifier": "discipline"}, {"key": "dc.subject.discipline", "value": "Computer Science", "language": "en", "element": "subject", "schema": "dc", "qualifier": "discipline"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "schema": "dc", "qualifier": "coar"}, {"key": "dc.rights.copyright", "value": "\u00a9 The Author(s)", "language": "fi", "element": "rights", "schema": "dc", "qualifier": "copyright"}, {"key": "dc.rights.accesslevel", "value": "restrictedAccess", "language": null, "element": "rights", "schema": "dc", "qualifier": "accesslevel"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "schema": "dc", "qualifier": "publication"}, {"key": "dc.subject.yso", "value": "teko\u00e4ly", "language": null, "element": "subject", "schema": "dc", "qualifier": "yso"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "schema": "dc", "qualifier": "yso"}, {"key": "dc.subject.yso", "value": "digitalisaatio", "language": null, "element": "subject", "schema": "dc", "qualifier": "yso"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "schema": "dc", "qualifier": "yso"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "schema": "dc", "qualifier": "url"}, {"key": "dc.rights.accessrights", "value": "Tekij\u00e4 ei ole antanut lupaa avoimeen julkaisuun, joten aineisto on luettavissa vain Jyv\u00e4skyl\u00e4n yliopiston kirjaston arkistoty\u00f6semalta. Ks. https://kirjasto.jyu.fi/fi/tyoskentelytilat/laitteet-ja-tilat#autotoc-item-autotoc-2", "language": "fi", "element": "rights", "schema": "dc", "qualifier": "accessrights"}, {"key": "dc.rights.accessrights", "value": "The author has not given permission to make the work publicly available electronically. Therefore the material can be read only at the archival workstation at Jyv\u00e4skyl\u00e4 University Library (https://kirjasto.jyu.fi/fi/tyoskentelytilat/laitteet-ja-tilat#autotoc-item-autotoc-2.", "language": "en", "element": "rights", "schema": "dc", "qualifier": "accessrights"}, {"key": "dc.description.accessibilityfeature", "value": "unknown accessibility", "language": "en", "element": "description", "schema": "dc", "qualifier": "accessibilityfeature"}, {"key": "dc.description.accessibilityfeature", "value": "ei tietoa saavutettavuudesta", "language": "fi", "element": "description", "schema": "dc", "qualifier": "accessibilityfeature"}]
id jyx.123456789_101923
language fin
last_indexed 2025-05-20T21:05:37Z
main_date 2025-01-01T00:00:00Z
main_date_str 2025
publishDate 2025
record_format qdc
source_str_mv jyx
spellingShingle Järvinen, Riki Tekoälyn hyödyntäminen organisaatioiden tietoturvauhkia vastaan Tietojenkäsittelytiede Computer Science tekoäly tietoturva digitalisaatio kyberturvallisuus
title Tekoälyn hyödyntäminen organisaatioiden tietoturvauhkia vastaan
title_full Tekoälyn hyödyntäminen organisaatioiden tietoturvauhkia vastaan
title_fullStr Tekoälyn hyödyntäminen organisaatioiden tietoturvauhkia vastaan Tekoälyn hyödyntäminen organisaatioiden tietoturvauhkia vastaan
title_full_unstemmed Tekoälyn hyödyntäminen organisaatioiden tietoturvauhkia vastaan Tekoälyn hyödyntäminen organisaatioiden tietoturvauhkia vastaan
title_short Tekoälyn hyödyntäminen organisaatioiden tietoturvauhkia vastaan
title_sort tekoälyn hyödyntäminen organisaatioiden tietoturvauhkia vastaan
title_txtP Tekoälyn hyödyntäminen organisaatioiden tietoturvauhkia vastaan
topic Tietojenkäsittelytiede Computer Science tekoäly tietoturva digitalisaatio kyberturvallisuus
topic_facet Computer Science Tietojenkäsittelytiede digitalisaatio kyberturvallisuus tekoäly tietoturva
url https://jyx.jyu.fi/handle/123456789/101923 http://www.urn.fi/URN:NBN:fi:jyu-202505124164
work_keys_str_mv AT järvinenriki tekoälynhyödyntäminenorganisaatioidentietoturvauhkiavastaan