fullrecord |
[{"key": "dc.contributor.author", "value": "Siermala, Jenni", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2016-01-04T10:02:27Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2016-01-04T10:02:27Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2015", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.other", "value": "oai:jykdok.linneanet.fi:1506508", "language": null, "element": "identifier", "qualifier": "other", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/48233", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "T\u00e4m\u00e4n tutkimuksen tarkoituksena on selvitt\u00e4\u00e4, kuinka Siposen ja Puhakaisen \ntietoturvapolitiikan kehitt\u00e4mismallia toteutetaan ja kehitet\u00e4\u00e4n k\u00e4yt\u00e4nn\u00f6ss\u00e4. Se koostuu \nnelj\u00e4st\u00e4 l\u00e4ht\u00f6kohdasta. Kirjallisuudesta ei l\u00f6ydy tietoturvapolitiikkaa, joka olisi \ntoteutettu t\u00e4m\u00e4n mallin mukaisesti. Lis\u00e4ksi tutkimuksessa selvitet\u00e4\u00e4n mallin \nsoveltuvuutta Pohjois-Pohjanmaan sairaanhoitopiiriss\u00e4 (PPSHP). \n\n \n\nTutkimus toteutettiin laadullisena toimintatutkimuksena, joka koostui viidest\u00e4 \nvaiheesta: m\u00e4\u00e4ritt\u00e4minen, suunnittelu, toteutus, arviointi sek\u00e4 tarkentaminen ja \noppiminen. Tutkimustietoaineisto ker\u00e4ttiin haastatteluiden avulla (PPSHP:n \ntietoturvasta ja tietosuojasta vastaavia henkil\u00f6it\u00e4), tutkimalla PPSHP:n strategiaa sek\u00e4 \nterveydenhuollon tietoturvaa ja tietosuojaa velvoittavaa lains\u00e4\u00e4d\u00e4nt\u00f6\u00e4. Haastatteluiden \nteemat nousivat Siposen ja Puhakaisen tietoturvapolitiikan kehitt\u00e4mismallista. \nTiedonkeruumenetelmien avulla selvitettiin Siposen ja Puhakaisen tietoturvapolitiikan \nkehitt\u00e4mismallin mukaiset vaatimukset tietoturvapolitiikalle. \n\n \n\nTutkimuksessa havaittiin, ett\u00e4 t\u00e4m\u00e4 malli soveltuu hyvin PPSHP:n tietoturvapolitiikan \ntoteuttamiseen ja k\u00e4ytt\u00f6\u00f6nottoon. Tutkimuksessa syntyi yhteens\u00e4 kymmenen yl\u00e4- ja \nalatason tietoturvapolitiikkadokumenttia, toteutettiin PPSHP:lle tietoj\u00e4rjestelmien \nluokittelu ja kehitettiin uusia prosesseja muun muassa ICT-varautumisen osalta. N\u00e4iden \ntoimien avulla PPSHP:n tietoturva tasoa nostettiin.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "The purpose of this study is to examine how the Siponen and Puhakainen method for \nthe development of information security policies are executed in practice. The study \nconsists of four premises which define the information security policies. In existing \nliterature there are no studies handling on specifically this sort of design of information \nsecurity policy put into practice. In addition, this study concentrates on evaluating the \napplicability of the information security policy in question to practice at Pohjois-\nPohjanmaan sairaanhoitopiiri (PPSHP). \n\n \n\nThis study was carried out as a qualitative Action research cycle -study (ACR). ACR \nconsists of five stages: diagnosing, action planning, action taking, evaluating and \nspecifying and learning. The research data was collected by interviews (interviewing \npeople responsible of data privacy and information security at PPSHP), investigating \nthe strategy and the obligating information security legislation concerning healthcare. \nThe main themes of the interviews emerged from the information security policy \nmethod for development of design by Siponen and Puhakainen. With the data collecting \nmethods mentioned, the study was carried out to find specifications for the information \nsecurity policy method by Siponen and Puhakainen. \n\n \n\nIt was found out that the design by Siponen and Puhakainen method for the \ndevelopment of information security policies is well applicable at the information \nsecurity policy management at PPSHP. The study produced altogether ten higher and \nlower level information security policy documents, information system classification \nand provisions processes of information systems was developed. With these actions the \nlevel of information security of PPSHP was improved.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted using Plone Publishing form by Miia Hakanen (mihakane) on 2016-01-04 10:02:26.668097. Form: Admin-lomake opinn\u00e4ytteiden julkaisuun (https://kirjasto.jyu.fi/julkaisut/julkaisulomakkeet/admin-lomake-opinnaytteet). JyX data: [jyx_publishing-allowed (fi) =True]", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2016-01-04T10:02:27Z\nNo. of bitstreams: 2\nURN:NBN:fi:jyu-201601041002.pdf: 1089656 bytes, checksum: 3d80ffc8fce70a672b24d1130a83771d (MD5)\nlicense.html: 107 bytes, checksum: a7d86e598caa500b1b433bbb9dc8ef1c (MD5)", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2016-01-04T10:02:27Z (GMT). No. of bitstreams: 2\nURN:NBN:fi:jyu-201601041002.pdf: 1089656 bytes, checksum: 3d80ffc8fce70a672b24d1130a83771d (MD5)\nlicense.html: 107 bytes, checksum: a7d86e598caa500b1b433bbb9dc8ef1c (MD5)\n Previous issue date: 2015", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "1 verkkoaineisto (45 sivua)", "language": null, "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "Tietoturva", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tietoturvapolitiikan kehitt\u00e4mismalli", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tietoturvapolitiikka", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Tietoturvapolitiikan kehitt\u00e4minen Pohjois-Pohjanmaan sairaanhoitopiiriss\u00e4 : Siponen & Puhakainen tietoturvapolitiikan kehitt\u00e4mismallin mukaisesti", "language": null, "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201601041002", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Tietojenk\u00e4sittelytieteiden laitos", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Department of Computer Science and Information Systems", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.method", "value": "Toimintatutkimus", "language": null, "element": "subject", "qualifier": "method", "schema": "dc"}, {"key": "dc.date.updated", "value": "2016-01-04T10:02:28Z", "language": null, "element": "date", "qualifier": "updated", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": null, "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": "fi", "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": null, "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturvapolitiikka", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
|