fullrecord |
[{"key": "dc.contributor.advisor", "value": "Halttunen Veikko", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Hokkanen, Jan", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2015-10-01T10:07:47Z", "language": "", "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2015-10-01T10:07:47Z", "language": "", "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2015", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/47237", "language": "", "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "El\u00e4mme tiedon aikakautta \u2013 teknologian kehityksen my\u00f6t\u00e4 sek\u00e4 digitaalisesta\r\nett\u00e4 analogisesta maailmasta kertyvien tietojen m\u00e4\u00e4r\u00e4 on kasvanut eksponentiaalisesti\r\nviime vuosien aikana. Big data mahdollistaa monia koko yhteiskuntaa\r\nhy\u00f6dytt\u00e4vi\u00e4 etuja aina kilpailukyvyn parantamisesta kehittyneemp\u00e4\u00e4n terveydenhuoltoon.\r\nMassiivisen tietojen ker\u00e4\u00e4misen ja analysoinnin on kuitenkin pel\u00e4tty\r\nkaventavan yksityisyyden suojaa. T\u00e4ss\u00e4 kirjallisuuskatsaukseen pohjautuvassa\r\ntutkielmassa perehdyttiin yksityisyytt\u00e4, big dataa, massadataanalytiikkaa\r\nsek\u00e4 yksityisyyden suojaamiseen k\u00e4ytett\u00e4vi\u00e4 teknisi\u00e4 menetelmi\u00e4\r\nk\u00e4sittelev\u00e4\u00e4n kirjallisuuteen. Tutkielman tarkoituksena oli selvitt\u00e4\u00e4 millaisia\r\nyksityisyyteen kohdistuvia riskej\u00e4 big datan hy\u00f6dynt\u00e4miseen voi liitty\u00e4 sek\u00e4\r\narvioida teknisten menetelmien kyky\u00e4 suojata yksityisyytt\u00e4. Tutkielmassa selvisi,\r\nett\u00e4 big datan hy\u00f6dynt\u00e4miseen voi liitty\u00e4 yksityisyyteen kohdistuvia riskej\u00e4.\r\nRiskit vaikuttaisit olevan seurausta hyvin laajamittaisesta tietojen ker\u00e4\u00e4misest\u00e4\r\nsek\u00e4 tehokkaasta prosessoinnista, mink\u00e4 seurauksena datasta kyet\u00e4\u00e4n l\u00f6yt\u00e4-\r\nm\u00e4\u00e4n enemm\u00e4n yksityisyytt\u00e4 uhkaavaa informaatiota kuin useat ihmisist\u00e4 olettavat\r\ntietoja luovuttaessaan. L\u00e4pin\u00e4kyvyyden puutteen havaittiin entisest\u00e4\u00e4n\r\nlis\u00e4\u00e4v\u00e4n tilanteeseen liittyv\u00e4\u00e4 ongelmallisuutta. Havaintojen pohjalta tehtiin\r\njohtop\u00e4\u00e4t\u00f6s siit\u00e4, ett\u00e4 teknisten menetelmien ohella tarvitaan entist\u00e4 enemm\u00e4n\r\njulkisen vallan s\u00e4\u00e4ntely\u00e4 sek\u00e4 organisatorisia toimenpiteit\u00e4 yksityisyyden suojaamiseksi.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "We live in an information age - the ubiquity of computing and electronic\r\ncommunication technologies has led to the exponential growth of data from\r\nboth digital and analog sources. Big data drives also big benefits, from\r\ninnovative products and services to new ways to treat diseases. The problem is\r\nthat new capabilities to gather, analyze, process, and preserve vast quantities of\r\ndata raise new concerns about the nature of privacy and the means by which\r\nindividual privacy might be compromised. Purpose of this bachelor\u2019s thesis\r\nwas to study big data, big data analytics, privacy and technologies used to\r\nprotect privacy. Objective was to find out privacy issues of big data and analyze\r\ntechnologies capability to protect privacy. Study was carried out as review of\r\nliterature. It seems that the challenges to privacy arise because technologies\r\ncollect so much data (e.g., from sensors in everything from phones to\r\nthermostats) and analyze them so efficiently (e.g., through data mining and\r\nother kinds of analytics) that it is possible to learn far more than most people\r\nhad anticipated or can anticipate given continuing progress, and the lack of\r\ntransparency has made this problem even bigger. Challenges are also\r\ncompounded by limitations on technologies used to protect privacy (especially\r\ntraditional technologies such as de-identification). This is why thesis concludes\r\nthat technology alone cannot protect privacy so we need organizational policies\r\nand legislation to protect privacy.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted using Plone Publishing form by Jan Hokkanen (jakrhokk) on 2015-10-01 10:07:46.770549. Form: Kandidaatintutkielma -lomake (https://kirjasto.jyu.fi/julkaisut/julkaisulomakkeet/kandin-tutkielma-lomake). JyX data: [jyx_publishing-allowed (fi) =True]", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2015-10-01T10:07:47Z\r\nNo. of bitstreams: 2\r\nURN:NBN:fi:jyu-201510013293.pdf: 833616 bytes, checksum: 2a96bc9c12fae0f9ec9f0c27f4c7794a (MD5)\r\nlicense.html: 4830 bytes, checksum: 0f3c769c32ad54abb867c245fb27f263 (MD5)", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2015-10-01T10:07:47Z (GMT). No. of bitstreams: 2\r\nURN:NBN:fi:jyu-201510013293.pdf: 833616 bytes, checksum: 2a96bc9c12fae0f9ec9f0c27f4c7794a (MD5)\r\nlicense.html: 4830 bytes, checksum: 0f3c769c32ad54abb867c245fb27f263 (MD5)\r\n Previous issue date: 2015", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "54", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": "", "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "anonymiteetti", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "big data", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "identifiointi", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kryptografia", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "yksityisyys", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Yksityisyys ja yksityisyyden suojaaminen big datan aikakaudella : teknologinen n\u00e4k\u00f6kulma", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201510013293", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatintutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.date.updated", "value": "2015-10-01T10:07:48Z", "language": "", "element": "date", "qualifier": "updated", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": "fi", "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|