fullrecord |
[{"key": "dc.contributor.advisor", "value": "Juutinen, Sanna", "language": null, "element": "contributor", "schema": "dc", "qualifier": "advisor"}, {"key": "dc.contributor.author", "value": "Peltokangas, Aapo", "language": null, "element": "contributor", "schema": "dc", "qualifier": "author"}, {"key": "dc.date.accessioned", "value": "2025-05-22T07:18:10Z", "language": null, "element": "date", "schema": "dc", "qualifier": "accessioned"}, {"key": "dc.date.available", "value": "2025-05-22T07:18:10Z", "language": null, "element": "date", "schema": "dc", "qualifier": "available"}, {"key": "dc.date.issued", "value": "2025", "language": null, "element": "date", "schema": "dc", "qualifier": "issued"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/102658", "language": null, "element": "identifier", "schema": "dc", "qualifier": "uri"}, {"key": "dc.description.abstract", "value": "Tutkielmassa tutkitaan teko\u00e4lyn aiheuttamia uhkia kyberturvallisuudelle. Ensin\nasiaa tutkitaan kyberpuolustuksen n\u00e4k\u00f6kulmasta ja uhkaaviksi tekij\u00f6iksi todetaan teko\u00e4lylle virheit\u00e4 aiheuttavat asiat. T\u00e4m\u00e4n j\u00e4lkeen kyberhy\u00f6kk\u00e4ysten n\u00e4k\u00f6kulmasta turvallisuutta\nuhkaaviksi tekij\u00f6iksi todetaan teko\u00e4lyn kyberhy\u00f6kk\u00e4\u00e4ji\u00e4 auttavat vahvuudet. Tutkimuksessa\nteko\u00e4ly todetaan lopulta sen hy\u00f6dyllisyydest\u00e4 huolimatta my\u00f6s uhkia aiheuttavaksi tekij\u00e4ksi\nkyberturvallisuuden kontekstissa.", "language": "fi", "element": "description", "schema": "dc", "qualifier": "abstract"}, {"key": "dc.description.abstract", "value": "", "language": "en", "element": "description", "schema": "dc", "qualifier": "abstract"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2025-05-22T07:18:10Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "schema": "dc", "qualifier": "provenance"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2025-05-22T07:18:10Z (GMT). No. of bitstreams: 0\n Previous issue date: 2025", "language": "en", "element": "description", "schema": "dc", "qualifier": "provenance"}, {"key": "dc.format.extent", "value": "20", "language": null, "element": "format", "schema": "dc", "qualifier": "extent"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "schema": "dc", "qualifier": "iso"}, {"key": "dc.rights", "value": "In Copyright", "language": null, "element": "rights", "schema": "dc", "qualifier": null}, {"key": "dc.subject.other", "value": "", "language": null, "element": "subject", "schema": "dc", "qualifier": "other"}, {"key": "dc.title", "value": "Teko\u00e4lyn aiheuttamat uhat kyberturvallisuudelle", "language": null, "element": "title", "schema": "dc", "qualifier": null}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "schema": "dc", "qualifier": null}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202505224496", "language": null, "element": "identifier", "schema": "dc", "qualifier": "urn"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "schema": "dc", "qualifier": "faculty"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "schema": "dc", "qualifier": "faculty"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "schema": "dc", "qualifier": "department"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "schema": "dc", "qualifier": "department"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": null, "element": "contributor", "schema": "dc", "qualifier": "organization"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": null, "element": "contributor", "schema": "dc", "qualifier": "organization"}, {"key": "dc.subject.discipline", "value": "Tietojenk\u00e4sittelytiede", "language": "fi", "element": "subject", "schema": "dc", "qualifier": "discipline"}, {"key": "dc.subject.discipline", "value": "Computer Science", "language": "en", "element": "subject", "schema": "dc", "qualifier": "discipline"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "schema": "dc", "qualifier": "coar"}, {"key": "dc.rights.copyright", "value": "\u00a9 The Author(s)", "language": "fi", "element": "rights", "schema": "dc", "qualifier": "copyright"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "schema": "dc", "qualifier": "accesslevel"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "schema": "dc", "qualifier": "publication"}, {"key": "dc.subject.yso", "value": "verkkohy\u00f6kk\u00e4ykset", "language": null, "element": "subject", "schema": "dc", "qualifier": "yso"}, {"key": "dc.subject.yso", "value": "kyberpuolustus", "language": null, "element": "subject", "schema": "dc", "qualifier": "yso"}, {"key": "dc.subject.yso", "value": "misinformaatio", "language": null, "element": "subject", "schema": "dc", "qualifier": "yso"}, {"key": "dc.subject.yso", "value": "disinformaatio", "language": null, "element": "subject", "schema": "dc", "qualifier": "yso"}, {"key": "dc.subject.yso", "value": "teko\u00e4ly", "language": null, "element": "subject", "schema": "dc", "qualifier": "yso"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "schema": "dc", "qualifier": "yso"}, {"key": "dc.subject.yso", "value": "automaatio", "language": null, "element": "subject", "schema": "dc", "qualifier": "yso"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "schema": "dc", "qualifier": "url"}]
|