fullrecord |
[{"key": "dc.contributor.author", "value": "Zudin, Rodion", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2014-06-17T13:29:46Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2014-06-17T13:29:46Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2014", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/43760", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Zudin, Rodion\r\nAnalysis of information risk management methods\r\nJyv\u00e4skyl\u00e4: University of Jyv\u00e4skyl\u00e4, 2014, 33 p.\r\nInformation Systems, Bachelor\u2019s Thesis\r\nSupervisor: Siponen, Mikko\r\nA brief overview in the information risk management field is done in this study\r\nby introducing the shared terminology and methodology of the field using\r\nliterature overview in the first chapter. Second chapter consists of examining\r\nand comparing two information risk management methodologies proposed by\r\ntwo different guides: Risk Management Guide for Information Technology\r\nSystems by National Institute of Standards and Technology and The Security\r\nRisk Management Guide by Microsoft. By finding common factors and\r\nmethods shared by both guides, their shared approach for the information risk\r\nmanagement is attempted to be defined.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Seija Paananen (sepaanan@jyu.fi) on 2014-06-17T13:29:46Z\nNo. of bitstreams: 1\nRodion Zudin.pdf: 484198 bytes, checksum: 24a635c4bc910ee097dd21a3d0b0bfdb (MD5)", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2014-06-17T13:29:46Z (GMT). No. of bitstreams: 1\nRodion Zudin.pdf: 484198 bytes, checksum: 24a635c4bc910ee097dd21a3d0b0bfdb (MD5)\n Previous issue date: 2014", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "information security management", "language": "fi", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "risk assessment", "language": "fi", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "risk mitigation", "language": "fi", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Analysis of information risk management methods", "language": "fi", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201406172063", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.dcmitype", "value": "Text", "language": "en", "element": "type", "qualifier": "dcmitype", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatintutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": "fi", "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|