fullrecord |
[{"key": "dc.contributor.advisor", "value": "Clements, Kati", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Koivula, Nina", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2015-09-21T08:36:34Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2015-09-21T08:36:34Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2015", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/47134", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Ta\u0308ma\u0308 kandidaatintutkielma ka\u0308sittelee Kiinan suorittaman kybervakoilun aihe- uttamia pitka\u0308aikaisia haittoja KIBS-yrityksille. Tutkielma toteutettiin kirjalli- suuskatsauksena teoriala\u0308hto\u0308isesti. Tutkielma selvitta\u0308a\u0308, millaisia haittoja Kiinan suorittama kybervakoilu aiheuttaa KIBS-yrityksille, seka\u0308 lisa\u0308ksi sen, kuinka va- kavia na\u0308ma\u0308 KIBS-yrityksille koituneet haitat ovat.\nAihetta on ta\u0308rkea\u0308 tutkia, silla\u0308 Kiinan suorittamasta kybervakoilusta on saatu todisteita. Lisa\u0308ksi kybervakoilusta koituvien haittojen on arvioitu olevan nousussa. Aihetta ei ole aiemmin tutkittu riitta\u0308va\u0308sti, silla\u0308 sita\u0308 on hankala tutkia, koska yritykset eiva\u0308t monesti tahdo tuoda julkisuuteen joutuneensa kyber- hyo\u0308kka\u0308yksen uhriksi. Tutkimus myo\u0308s vaatisi melko pitka\u0308lla\u0308 aikava\u0308lilla\u0308 suoritet- tua tutkimusta.\nTutkielman tuloksien perusteella voidaan sanoa, etta\u0308 kyberhyo\u0308kka\u0308yksen aiheuttamat pitka\u0308aikaiset haitat KIBS-yritykselle ovat henkisen pa\u0308a\u0308oman mene- tys, seka\u0308 maineen menetys ja asiakkaiden ja liikekumppanien luottamuksen menetys. Na\u0308ista\u0308 arvioimme henkisen pa\u0308a\u0308oman menetyksen olevan KIBS- yritykselle merkitta\u0308va\u0308mpi haitta. Tutkielman aikana havaittiin myo\u0308s, etta\u0308 KIBS- yrityksia\u0308 vastaan suoritetut kyberhyo\u0308kka\u0308ykset vaikuttavat negatiivisesti la\u0308nsi- maiden talouteen. Tutkielman tulokset ovat kiinnostavia paitsi KIBS-yritysten na\u0308ko\u0308kulmasta, myo\u0308s la\u0308nsimaisten valtioiden kannalta.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "This bachelor\u2019s thesis covers the long-term disadvantages China\u2019s cyber espio- nage is causing to knowledge intensive business service companies. It was con- ducted as a literature review and by using a theoretical background. This study tries to find out, which kind of disadvantages cyber espionage conducted by China is causing to knowledge intensive business service companies and how severe these disadvantages are to them.\nThis is an important topic, since it has been proven that China is perform- ing cyber espionage. Also the disadvantages caused by cyber espionage have been estimated to be on the increase. This topic has not yet been studied enough, mostly because companies do not seem to be willing to make it public knowledge that they have been under a cyber attack. The study would also re- quire a long time to complete it, since the case has to be followed for several years to discover the long-term disadvantages caused by a cyber attack.\nAccording to the results of this study we can say that the long-term disad- vantages China\u2019s cyber espionage is causing to KIBS-companies are the loss of intellectual property and also losing face of the company and the trust of clients and business associates. We estimate the loss of intellectual property to be the most harmful of these disadvantages especially in the case of KIBS-companies. We also learned that the cyber attacks against KIBS-companies are causing western countries economical disadvantages. On this account, the results of this study are not only interesting to knowledge intensive business service compa- nies, but also to western countries.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted using Plone Publishing form by Nina Koivula (nikakoiv) on 2015-09-21 08:36:34.572297. Form: Kandidaatintutkielma -lomake (https://kirjasto.jyu.fi/julkaisut/julkaisulomakkeet/kandin-tutkielma-lomake). JyX data: [jyx_publishing-allowed (fi) =True]", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2015-09-21T08:36:34Z\nNo. of bitstreams: 2\nURN:NBN:fi:jyu-201509213202.pdf: 417615 bytes, checksum: db636ecfb3ad035c26ba7a5f401cbf6d (MD5)\nlicense.html: 4824 bytes, checksum: 1b0df1299d6a1caf5bb898603a29dc35 (MD5)", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2015-09-21T08:36:34Z (GMT). No. of bitstreams: 2\nURN:NBN:fi:jyu-201509213202.pdf: 417615 bytes, checksum: db636ecfb3ad035c26ba7a5f401cbf6d (MD5)\nlicense.html: 4824 bytes, checksum: 1b0df1299d6a1caf5bb898603a29dc35 (MD5)\n Previous issue date: 2015", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "27", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "kyberhyo\u0308kka\u0308ys", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kybervakoilu", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "henkinen pa\u0308a\u0308oma", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "maineen mene- tys", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "Knowledge-based theory of the firm", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tieto", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "KIBS-yritys", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tietointensiiviset liike-ela\u0308ma\u0308n palvelut", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Kiinan suorittaman kybervakoilun aiheuttamat pitk\u00e4aikaiset haitat KIBS-yrityksille", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201509213202", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatintutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.date.updated", "value": "2015-09-21T08:36:35Z", "language": null, "element": "date", "qualifier": "updated", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": "fi", "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|