_version_ 1809902218512433152
annif_keywords_txtF_mv data security investments safety and security enterprises know-how
annif_uris_txtF_mv http://www.yso.fi/onto/yso/p5479 http://www.yso.fi/onto/yso/p4320 http://www.yso.fi/onto/yso/p7349 http://www.yso.fi/onto/yso/p3128 http://www.yso.fi/onto/yso/p8343
author Toivanen, Hanna
author2 Faculty of Information Technology Informaatioteknologian tiedekunta Tietojenkäsittelytieteiden laitos Department of Computer Science and Information Systems University of Jyväskylä Jyväskylän yliopisto Information Systems Science Tietojärjestelmätiede 601
author_facet Toivanen, Hanna Faculty of Information Technology Informaatioteknologian tiedekunta Tietojenkäsittelytieteiden laitos Department of Computer Science and Information Systems University of Jyväskylä Jyväskylän yliopisto Information Systems Science Tietojärjestelmätiede 601 Toivanen, Hanna
author_sort Toivanen, Hanna
building Jyväskylän yliopisto JYX-julkaisuarkisto
datasource_str_mv jyx
department_txtF Informaatioteknologia
faculty_txtF Informaatioteknologian tiedekunta
first_indexed 2023-03-22T09:59:37Z
format Pro gradu
format_ext_str_mv Opinnäyte Maisterivaiheen työ
free_online_boolean 1
fullrecord <?xml version="1.0"?> <qualifieddc schemaLocation="http://purl.org/dc/terms/ http://dublincore.org/schemas/xmls/qdc/2006/01/06/dcterms.xsd http://purl.org/dc/elements/1.1/ http://dublincore.org/schemas/xmls/qdc/2006/01/06/dc.xsd"><title>Case study of why information security investment fail?</title><creator>Toivanen, Hanna</creator><contributor type="tiedekunta" lang="en">Faculty of Information Technology</contributor><contributor type="tiedekunta" lang="fi">Informaatioteknologian tiedekunta</contributor><contributor type="laitos" lang="fi">Tietojenk&#xE4;sittelytieteiden laitos</contributor><contributor type="laitos" lang="en">Department of Computer Science and Information Systems</contributor><contributor type="yliopisto" lang="en">University of Jyv&#xE4;skyl&#xE4;</contributor><contributor type="yliopisto" lang="fi">Jyv&#xE4;skyl&#xE4;n yliopisto</contributor><contributor type="oppiaine" lang="en">Information Systems Science</contributor><contributor type="oppiaine" lang="fi">Tietoj&#xE4;rjestelm&#xE4;tiede</contributor><contributor type="oppiainekoodi">601</contributor><subject type="other">Information security</subject><subject type="other">information security investment</subject><subject type="other">decision making</subject><subject type="other">knowledge</subject><subject type="other">capability</subject><subject type="other">method.</subject><subject type="yso">tietoturva</subject><subject type="yso">osaaminen</subject><subject type="yso">investoinnit</subject><subject type="yso">p&#xE4;&#xE4;t&#xF6;ksenteko</subject><available>2015-08-21T08:04:49Z</available><issued>2015</issued><type lang="en">Master&#x2019;s thesis</type><type lang="fi">Pro gradu -tutkielma</type><identifier type="other">oai:jykdok.linneanet.fi:1493061</identifier><identifier type="uri">https://jyx.jyu.fi/handle/123456789/46669</identifier><identifier type="urn">URN:NBN:fi:jyu-201508212719</identifier><language type="iso">eng</language><rights lang="en">This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.</rights><rights lang="fi">Julkaisu on tekij&#xE4;noikeuss&#xE4;&#xE4;nn&#xF6;sten alainen. Teosta voi lukea ja tulostaa henkil&#xF6;kohtaista k&#xE4;ytt&#xF6;&#xE4; varten. K&#xE4;ytt&#xF6; kaupallisiin tarkoituksiin on kielletty.</rights><rights type="accesslevel" lang="fi">openAccess</rights><permaddress type="urn">http://www.urn.fi/URN:NBN:fi:jyu-201508212719</permaddress><file bundle="ORIGINAL" href="https://jyx.jyu.fi/bitstream/123456789/46669/1/URN%3aNBN%3afi%3ajyu-201508212719.pdf" name="URN:NBN:fi:jyu-201508212719.pdf" type="application/pdf" length="1668080" sequence="1"/><recordID>123456789_46669</recordID></qualifieddc>
id jyx.123456789_46669
language eng
last_indexed 2024-09-03T10:52:04Z
main_date 2015-01-01T00:00:00Z
main_date_str 2015
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstream\/123456789\/46669\/1\/URN%3aNBN%3afi%3ajyu-201508212719.pdf","text":"URN:NBN:fi:jyu-201508212719.pdf","source":"jyx","mediaType":"application\/pdf"}
oppiainekoodi_txtF 601
publication_first_indexed 2015-03-22T09:59:37Z
publishDate 2015
record_format qdc
source_str_mv jyx
spellingShingle Toivanen, Hanna Case study of why information security investment fail? Information security information security investment decision making knowledge capability method. tietoturva osaaminen investoinnit päätöksenteko
subject_txtF Kognitiotiede
thumbnail https://jyu.finna.fi/Cover/Show?source=Solr&id=jyx.123456789_46669&index=0&size=large
title Case study of why information security investment fail?
title_full Case study of why information security investment fail?
title_fullStr Case study of why information security investment fail? Case study of why information security investment fail?
title_full_unstemmed Case study of why information security investment fail? Case study of why information security investment fail?
title_short Case study of why information security investment fail?
title_sort case study of why information security investment fail
title_txtP Case study of why information security investment fail?
topic Information security information security investment decision making knowledge capability method. tietoturva osaaminen investoinnit päätöksenteko
topic_facet Information security capability decision making information security investment investoinnit knowledge method. osaaminen päätöksenteko tietoturva
url https://jyx.jyu.fi/handle/123456789/46669 http://www.urn.fi/URN:NBN:fi:jyu-201508212719
work_keys_str_mv AT toivanenhanna casestudyofwhyinformationsecurityinvestmentfail