Organisaatioiden tietoturvamallit

Tutkielman tarkoituksena on selvittää löytyykö koulutusorganisaatioiden tietoturvan hoidosta tietoturvamallien tai niiden piirteiden käyttöä. Tutkimuskysymyksiksi muodostuivat, miten tietoturvamallit näkyvät tutkittavissa organisaatioissa ja miten organisaatiot huolehtivat tietoturvasta. Tämä tutkim...

Full description

Bibliographic Details
Main Author: Aalto, Jarkko
Other Authors: Informaatioteknologian tiedekunta, Faculty of Information Technology, Tietotekniikan laitos, Department of Mathematical Information Technology, University of Jyväskylä, Jyväskylän yliopisto
Format: Master's thesis
Language:fin
Published: 2016
Subjects:
Online Access: https://jyx.jyu.fi/handle/123456789/50960
_version_ 1826225692322299905
author Aalto, Jarkko
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Tietotekniikan laitos Department of Mathematical Information Technology University of Jyväskylä Jyväskylän yliopisto
author_facet Aalto, Jarkko Informaatioteknologian tiedekunta Faculty of Information Technology Tietotekniikan laitos Department of Mathematical Information Technology University of Jyväskylä Jyväskylän yliopisto Aalto, Jarkko Informaatioteknologian tiedekunta Faculty of Information Technology Tietotekniikan laitos Department of Mathematical Information Technology University of Jyväskylä Jyväskylän yliopisto
author_sort Aalto, Jarkko
datasource_str_mv jyx
description Tutkielman tarkoituksena on selvittää löytyykö koulutusorganisaatioiden tietoturvan hoidosta tietoturvamallien tai niiden piirteiden käyttöä. Tutkimuskysymyksiksi muodostuivat, miten tietoturvamallit näkyvät tutkittavissa organisaatioissa ja miten organisaatiot huolehtivat tietoturvasta. Tämä tutkimus suoritetaan korkeakouluorganisaatioihin. Aineston analyysimenetelmänä käytän laadullista ankkuroitu teoria -lähestymistapaa. The purpose of this thesis is to find out whether enterprise security patterns or their features exist in the ways that educational organizations treat information security. The research questions are: How enterprise security patterns present themselves in the studied organizations? How do the organizations ensure data security? This research focuses on higher education organizations. The method used for analysis of the gathered material is the Grounded Theory approach.
first_indexed 2023-03-22T09:59:23Z
format Pro gradu
free_online_boolean 1
fullrecord [{"key": "dc.contributor.advisor", "value": "Isom\u00e4ki Hannakaisa", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.advisor", "value": "Kurkinen Erkki", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.advisor", "value": "K\u00e4rkk\u00e4inen Tommi", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Aalto, Jarkko", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2016-08-17T09:59:18Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2016-08-17T09:59:18Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2016", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.other", "value": "oai:jykdok.linneanet.fi:1571389", "language": null, "element": "identifier", "qualifier": "other", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/50960", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Tutkielman tarkoituksena on selvitt\u00e4\u00e4 l\u00f6ytyyk\u00f6 koulutusorganisaatioiden tietoturvan\nhoidosta tietoturvamallien tai niiden piirteiden k\u00e4ytt\u00f6\u00e4. Tutkimuskysymyksiksi muodostuivat, miten tietoturvamallit n\u00e4kyv\u00e4t tutkittavissa organisaatioissa ja miten organisaatiot huolehtivat tietoturvasta. T\u00e4m\u00e4 tutkimus suoritetaan korkeakouluorganisaatioihin. Aineston analyysimenetelm\u00e4n\u00e4 k\u00e4yt\u00e4n laadullista ankkuroitu teoria -l\u00e4hestymistapaa.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "The purpose of this thesis is to find out whether enterprise security patterns or\ntheir features exist in the ways that educational organizations treat information security. The research questions are: How enterprise security patterns present themselves in the studied organizations? How do the organizations ensure data security? This research focuses on higher education organizations. The method used for analysis of the gathered material is the Grounded Theory approach.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted using Plone Publishing form by Jarkko Aalto (jartapaa) on 2016-08-17 09:59:17.259166. Form: Pro gradu -lomake (https://kirjasto.jyu.fi/julkaisut/julkaisulomakkeet/pro-gradu-lomake). JyX data: [jyx_publishing-allowed (fi) =True]", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2016-08-17T09:59:18Z\nNo. of bitstreams: 2\nURN:NBN:fi:jyu-201608173813.pdf: 3111051 bytes, checksum: 02e253428c34dba55972dc2240dcbc11 (MD5)\nlicense.html: 4787 bytes, checksum: d20091ec40c2c7043a564411b0458091 (MD5)", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2016-08-17T09:59:18Z (GMT). No. of bitstreams: 2\nURN:NBN:fi:jyu-201608173813.pdf: 3111051 bytes, checksum: 02e253428c34dba55972dc2240dcbc11 (MD5)\nlicense.html: 4787 bytes, checksum: d20091ec40c2c7043a564411b0458091 (MD5)\n Previous issue date: 2016", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "1 verkkoaineisto (276 sivua)", "language": null, "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "Organisaatioiden tietoturva", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "IT-tietoturvamallit", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "Tietoturva", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "Maadoitettu teoria", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "Avoin koodaus", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "aksiaalikoodaus", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "valikoivakoodaus", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Organisaatioiden tietoturvamallit", "language": null, "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201608173813", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Tietotekniikan laitos", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Department of Mathematical Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietotekniikka", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Mathematical Information Technology", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.date.updated", "value": "2016-08-17T09:59:18Z", "language": null, "element": "date", "qualifier": "updated", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": null, "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": "fi", "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "602", "language": null, "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "organisaatiot", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "ohjelmointi", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
id jyx.123456789_50960
language fin
last_indexed 2025-02-18T10:55:31Z
main_date 2016-01-01T00:00:00Z
main_date_str 2016
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstreams\/6a2917bc-cdb8-4e0b-b4bb-dea65fd1c5da\/download","text":"URN:NBN:fi:jyu-201608173813.pdf","source":"jyx","mediaType":"application\/pdf"}
publishDate 2016
record_format qdc
source_str_mv jyx
spellingShingle Aalto, Jarkko Organisaatioiden tietoturvamallit Organisaatioiden tietoturva IT-tietoturvamallit Tietoturva Maadoitettu teoria Avoin koodaus aksiaalikoodaus valikoivakoodaus Tietotekniikka Mathematical Information Technology 602 organisaatiot tietoturva ohjelmointi
title Organisaatioiden tietoturvamallit
title_full Organisaatioiden tietoturvamallit
title_fullStr Organisaatioiden tietoturvamallit Organisaatioiden tietoturvamallit
title_full_unstemmed Organisaatioiden tietoturvamallit Organisaatioiden tietoturvamallit
title_short Organisaatioiden tietoturvamallit
title_sort organisaatioiden tietoturvamallit
title_txtP Organisaatioiden tietoturvamallit
topic Organisaatioiden tietoturva IT-tietoturvamallit Tietoturva Maadoitettu teoria Avoin koodaus aksiaalikoodaus valikoivakoodaus Tietotekniikka Mathematical Information Technology 602 organisaatiot tietoturva ohjelmointi
topic_facet 602 Avoin koodaus IT-tietoturvamallit Maadoitettu teoria Mathematical Information Technology Organisaatioiden tietoturva Tietotekniikka Tietoturva aksiaalikoodaus ohjelmointi organisaatiot tietoturva valikoivakoodaus
url https://jyx.jyu.fi/handle/123456789/50960 http://www.urn.fi/URN:NBN:fi:jyu-201608173813
work_keys_str_mv AT aaltojarkko organisaatioidentietoturvamallit