fullrecord |
[{"key": "dc.contributor.advisor", "value": "Sepp\u00e4nen, Ville", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.advisor", "value": "Moilanen, Panu", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Puttonen, Heidi", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2015-03-20T17:11:02Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2015-03-20T17:11:02Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2015", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/45546", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Tutkielmassa m\u00e4\u00e4ritell\u00e4\u00e4n, mit\u00e4 informaatio-operaatioilla tarkoitetaan ja esitell\u00e4\u00e4n niiden keskeisi\u00e4 vaikutusmenetelmi\u00e4. Lis\u00e4ksi vaikutusmenetelmien aiheuttamaa informaatiovaikutusten kohdentumista tarkastellaan organisaation kokonaisarkkitehtuurin n\u00e4k\u00f6kulmasta. Informaatio-operaatiot ovat sotilaallista toimintaa, jonka kohteena on informaatio. Ne ovat osa nykyaikaista sodank\u00e4ynti\u00e4 ja niiden avulla pyrit\u00e4\u00e4n vaikuttamaan vastustajan toimintaan, tilannetietoisuuteen ja p\u00e4\u00e4t\u00f6ksentekoon. Informaatio-operaatiot ovat monipuolinen menetelm\u00e4kokonaisuus ja tutkielmassa tarkastellaan tarkemmin viitt\u00e4 keskeist\u00e4 vaikutusmenetelm\u00e4\u00e4: elektroninen sodank\u00e4ynti, tietoverkko-operaatiot, psykologiset operaatiot, operaatio turvallisuus ja sotilaallinen harhauttaminen. Kokonaisarkkitehtuurin n\u00e4k\u00f6kulmasta informaatio-operaatiot vaikuttavat monipuolisesti organisaation jokaisella tasolla.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "This Bachelor\u2019s thesis defines what information operations are and presents their essential methods. The allocation of effects caused by these methods is examined from the enterprise architecture point of view. Information operations are military activities which are focused on the information. They are part of modern warfare and they aim at influencing adversary\u2019s activities, situation awareness and decision-making. Information operations are a diverse set of methods and the thesis focuses in detail to five key methods: electronic warfare, computer network operations, psychological operations, operation security and military deception. From the perspective of enterprise architecture information operations affect to every level of an organization.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted using Plone Publishing form by Heidi Puttonen (heanputt) on 2015-03-20 17:11:01.228221. Form: Kandidaatintutkielma -lomake (https://kirjasto.jyu.fi/julkaisut/julkaisulomakkeet/kandin-tutkielma-lomake). JyX data: [jyx_publishing-allowed (fi) =True]", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija@noreply.fi) on 2015-03-20T17:11:02Z\nNo. of bitstreams: 2\nURN:NBN:fi:jyu-201503201498.pdf: 656703 bytes, checksum: 97e8d7f20c362426cc4dcb4e24e8d8c1 (MD5)\nlicense.html: 4807 bytes, checksum: dd8ed8046e850cf07f05700ae0241d27 (MD5)", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2015-03-20T17:11:02Z (GMT). No. of bitstreams: 2\nURN:NBN:fi:jyu-201503201498.pdf: 656703 bytes, checksum: 97e8d7f20c362426cc4dcb4e24e8d8c1 (MD5)\nlicense.html: 4807 bytes, checksum: dd8ed8046e850cf07f05700ae0241d27 (MD5)\n Previous issue date: 2015", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "34", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "informaatio-operaatiot", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "informaatiosodank\u00e4ynti", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "informaatioymp\u00e4rist\u00f6", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kokonaisarkkitehtuuri", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Informaatio-operaatiot ja niiden keskeiset vaikutusmenetelm\u00e4t", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201503201498", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.dcmitype", "value": "Text", "language": "en", "element": "type", "qualifier": "dcmitype", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatintutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.date.updated", "value": "2015-03-20T17:11:03Z", "language": null, "element": "date", "qualifier": "updated", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": "fi", "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|