fullrecord |
[{"key": "dc.contributor.author", "value": "Partti, Jussi", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2014-07-01T04:59:52Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2014-07-01T04:59:52Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2014", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/43871", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Partti, Jussi\nFacebook sovellusten luottamuksellisuus ja yksityisyys\nJyv\u00e4skyl\u00e4: Jyv\u00e4skyl\u00e4n yliopisto, 2014, 33 s.\nTietoj\u00e4rjestelm\u00e4tiede, kandidaatin -tutkielma\nOhjaaja: Veijalainen, Jari\nT\u00e4m\u00e4n kandidaatintutkielman aiheena on tutkia Facebookissa toimivien kolmannen osapuolen sovelluksien muodostamia uhkia k\u00e4ytt\u00e4jiens\u00e4 Facebookissa sijaitsevien tietojen luottamuksellisuudelle ja yksityisyydelle. Eritt\u00e4in suuri k\u00e4ytt\u00e4j\u00e4m\u00e4\u00e4r\u00e4 sek\u00e4 valtava varastoidun tiedon m\u00e4\u00e4r\u00e4 tekev\u00e4t Facebookista houkuttelevan kohteen haitallisille sovelluksille ker\u00e4t\u00e4 k\u00e4ytt\u00e4jien tietoja. Sovelluksen k\u00e4ytt\u00e4j\u00e4n vastuulla on p\u00e4\u00e4tt\u00e4\u00e4, millaisia oikeuksia kukin sovellus saa h\u00e4nen Facebook profiilin tietoihinsa. Sovelluksien sijaitseminen kolmannen osapuolen palvelimilla est\u00e4\u00e4 niiden toiminnan valvonnan ja mahdollistaa tietojen v\u00e4\u00e4rink\u00e4yt\u00f6n luoden uhkia k\u00e4ytt\u00e4jien tietojen yksityisyydelle. Haitallinen sovellus voi ker\u00e4t\u00e4 niit\u00e4 kaikkia k\u00e4ytt\u00e4jien tietoja, joihin on saanut k\u00e4ytt\u00f6oikeudet. Muita tapoja sovelluksille ker\u00e4t\u00e4 tietoa ovat haittaohjelmien levitt\u00e4minen, p\u00e4\u00e4ttely-hy\u00f6kk\u00e4ykset, suoraan kysyminen harhaan johtamalla tai k\u00e4ytt\u00e4j\u00e4n yst\u00e4v\u00e4n Facebook-profiilien kautta ker\u00e4\u00e4minen. Ker\u00e4ttyj\u00e4 tietoja voidaan k\u00e4ytt\u00e4\u00e4 haitallisiin tarkoituksiin taloudellinen hy\u00f6ty mieless\u00e4. Tutkimuksessa esitell\u00e4\u00e4n my\u00f6s haitallisen sovelluksen tunnistamiseen liittyv\u00e4\u00e4 tietoa ja esitell\u00e4\u00e4n mahdollisia keinoja ennaltaehk\u00e4ist\u00e4 n\u00e4iden uhkien syntymist\u00e4. Tutkimus perustuu p\u00e4\u00e4asiassa aiheesta aikaisemmin julkaistuun tieteelliseen kirjallisuuteen.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Partti, Jussi\nConfidentiality and privacy of Facebook applications\nJyv\u00e4skyl\u00e4: University of Jyv\u00e4skyl\u00e4, 2014, 33p.\nInformation Systems, Bachelor\u2019s thesis\nSupervisor: Veijalainen, Jari\nThe theme of this Bachelor\u2019s thesis is to study what threats do third-party appli-cations in Facebook cause to the confidentiality and privacy of its user\u2019s infor-mation. Very large number of users and the large scale of stored information make Facebook an attractive target for malicious applications that would like to harvest user information. Users launching such applications have the responsi-bility to decide which permissions each application gets to his or her infor-mation. Because these applications operate from third-party servers, there is no effective way to control their actions. This fact also enables misuse of collected information creating threats to user\u2019s privacy. A malicious application can col-lect all of the users profile information, to which it has gained permissions. Other ways to collect information are distribution of malware, inference attacks, asking directly, but misleadingly credentials of a user or gaining access to in-formation though user\u00b4s friend\u2019s profile. Collected information can be used for harmful purposes or for economic gain. This thesis also introduces ways to de-tect harmful applications and presents possible solutions that would prevent these threats to materialize. The thesis is mainly based on previous scientific research and literature on the topic.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted using Plone Publishing form by Seija Paananen (sepaanan) on 2014-07-01 04:59:51.735719. Form: Admin-lomake rajoitetuille kandidaatintutkielmille (https://kirjasto.jyu.fi/julkaisut/julkaisulomakkeet/admin-lomake-rajoitetuille-kandeille). JyX data:", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija@noreply.fi) on 2014-07-01T04:59:52Z\nNo. of bitstreams: 2\nURN:NBN:fi:jyu-201407012186.pdf: 421163 bytes, checksum: 458d242741035acda64e9cbe65b25ade (MD5)\nlicense.html: 107 bytes, checksum: a7d86e598caa500b1b433bbb9dc8ef1c (MD5)", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2014-07-01T04:59:52Z (GMT). No. of bitstreams: 2\nURN:NBN:fi:jyu-201407012186.pdf: 421163 bytes, checksum: 458d242741035acda64e9cbe65b25ade (MD5)\nlicense.html: 107 bytes, checksum: a7d86e598caa500b1b433bbb9dc8ef1c (MD5)\n Previous issue date: 2014", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "30", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "Facebook-sovellus", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "luottamuksellisuus", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tietoturva", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "uhka", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "yksityisyyden menett\u00e4minen", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Facebook-sovellusten uhkia luottamuksellisuudelle ja yksityisyydelle", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201407012186", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.dcmitype", "value": "Text", "language": "en", "element": "type", "qualifier": "dcmitype", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatintutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.date.updated", "value": "2014-07-01T04:59:52Z", "language": null, "element": "date", "qualifier": "updated", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "restrictedAccess", "language": "fi", "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "This material has a restricted access due to copyright reasons. It can be read at the department responsible for publication of the thesis, or at the archival workstation at Jyv\u00e4skyl\u00e4 University Library: https://kirjasto.jyu.fi/en/workspaces/facilities.", "language": "en", "element": "rights", "qualifier": "accessrights", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "Luettavissa tekij\u00e4noikeudellisista syist\u00e4 vain opinn\u00e4ytteen julkaisseella laitoksella ja Jyv\u00e4skyl\u00e4n yliopiston kirjaston arkistoty\u00f6asemalta. Ks. https://kirjasto.jyu.fi/fi/tyoskentelytilat/laitteet-ja-tilat.", "language": "fi", "element": "rights", "qualifier": "accessrights", "schema": "dc"}]
|