fullrecord |
[{"key": "dc.contributor.advisor", "value": "Sepp\u00e4nen, Ville", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Simi, Jarmo", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2017-01-19T14:39:36Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2017-01-19T14:39:36Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2017", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.other", "value": "oai:jykdok.linneanet.fi:1659249", "language": null, "element": "identifier", "qualifier": "other", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/52765", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "TIIVISTELM\u00c4 \nSimi, Jarmo Juhani Tiedon luokittelu osana organisaation kokonaisarkkitehtuurin riskienhallintaprosessia Jyv\u00e4skyl\u00e4: Jyv\u00e4skyl\u00e4n yliopisto, 2017, 85 s. Tietojenk\u00e4sittelytiede, pro gradu -tutkielma Ohjaaja: Sepp\u00e4nen, Ville \nTutkimuksen tavoitteena oli kehitt\u00e4\u00e4 menetelm\u00e4, jonka avulla voidaan tunnistaa organisaation kokonaisarkkitehtuuri- tai tietoj\u00e4rjestelm\u00e4projektien tietoturvallisuusvaatimukset. Menetelm\u00e4n tulisi tukea liiketoimintajohdon, tietoj\u00e4rjestelm\u00e4arkkitehtien ja -asiantuntijoiden v\u00e4list\u00e4 kommunikaatiota. Menetelm\u00e4n tulisi my\u00f6s tukea organisaatioiden v\u00e4lisen viestinn\u00e4n turvallisuusvaatimusten tunnistamista. Menetelm\u00e4n kehitys perustui kohdej\u00e4rjestelmiss\u00e4 k\u00e4sitelt\u00e4v\u00e4n tiedon tunnistamiseen ja luokitteluun tietoturvallisuuden osa-alueiden luottamuksellisuuden, saatavuuden ja eheyden perusteella. Tutkimuksessa sovellettiin suunnittelutieteellist\u00e4 menetelm\u00e4\u00e4. Tutkimuksen artefaktia testattiin ja kehitettiin viidess\u00e4 erillisess\u00e4 tutkimustapauksessa. Tutkimustapausten havainnot dokumentoitiin tutkimuskyselyn ja haastatelluiden avulla. Tulosten perusteella kehitetty menetelm\u00e4 todettiin soveltuvaksi suunniteltuun teht\u00e4v\u00e4\u00e4ns\u00e4. Menetelm\u00e4\u00e4 pidettiin loogisena ja helppok\u00e4ytt\u00f6isen\u00e4 ja kaikki osallistujat suosittelivat menetelm\u00e4n jatkotestausta laajemmin tietoj\u00e4rjestelm\u00e4projekteissa. Tutkimuksen n\u00e4k\u00f6kulma, tiedon tunnistaminen ja luokittelu osana kokonaisarkkitehtuuri- tai tietoj\u00e4rjestelm\u00e4projektia oli kaikille tutkimukseen osallistuneille uusi. N\u00e4k\u00f6kulman etuna pidettiin sen antamaa kokonaisvaltaista n\u00e4kemyst\u00e4 kohteena olevista projekteista. Tutkimustapausten yhteydess\u00e4 kyettiin menetelm\u00e4n avulla vertailemaan tietoturvallisuuden eri osa-alueiden merkityst\u00e4 kohdej\u00e4rjestelm\u00e4lle ja tuottamaan perusteltuja ratkaisuesityksi\u00e4. Tutkimustapauksen p\u00e4\u00e4tteeksi tuotettiin tutkijan johdolla esitys kohteena olevan projektin tietoturvallisuuden jatkotoimenpiteist\u00e4 ja niiden vaihtoehdoista. Esitys perustui menetelm\u00e4n k\u00e4yt\u00f6n yhteydess\u00e4 koottuihin tietoihin sek\u00e4 riskienarviointiin ja siin\u00e4 huomioitiin yleiselle tasolla vaadittavat resurssit.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "ABSTRACT \nSimi, Jarmo Information Categorization as a Part of Organization\u00b4s Enterprise Architecture Risk Management Processes Jyv\u00e4skyl\u00e4: University of Jyv\u00e4skyl\u00e4, 2017, 85 p. Information Systems, Master\u2019s Thesis Supervisor: Sepp\u00e4nen, Ville \nThe aim of the study was to create a method for organizations' enterprise architecture and information system management. The management method should recognize information security requirements for the organizations and support organizations' risk management. It should also support communication and coordination between business managers and information system professionals. At the same time, the method should endorses information security requirements in communication between organizations. Recognition and categorization of information in the information system creates the foundations of developing the method.. Categorization is based on three sections of the information security; confidentiality, integrity and availability. Design Science Research Methodology was chosen to be the research method. The artifact was tested and further developed in five different cases. The findings of the study are documented with research surveys and interviews. According to the results of the research, the method was found applicable for its purpose. The method was considered to be logical and easy to use by the study partisipants. All participants recommended testing the method further in various information system projects. The method perspective, recognition and categorization of information, was new viewpoint for all of the participants. The method was useful and it offered comprehensive view to the projects. In the study cases it was possible to compare the areas of information security in the information systems by using the method. Moreover, it was possible to produce proposed decisions.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted using Plone Publishing form by Jarmo Simi (jajusimi) on 2017-01-19 14:39:36.078639. Form: Pro gradu -lomake (https://kirjasto.jyu.fi/julkaisut/julkaisulomakkeet/pro-gradu-lomake). JyX data: [jyx_publishing-allowed (fi) =True]", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2017-01-19T14:39:36Z\nNo. of bitstreams: 2\nURN:NBN:fi:jyu-201701191200.pdf: 1443843 bytes, checksum: 55b40123f8dc80a0134a3b31ba7591d0 (MD5)\nlicense.html: 4835 bytes, checksum: 29aa0cf0678cc1c2cfc47090779a9593 (MD5)", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2017-01-19T14:39:36Z (GMT). No. of bitstreams: 2\nURN:NBN:fi:jyu-201701191200.pdf: 1443843 bytes, checksum: 55b40123f8dc80a0134a3b31ba7591d0 (MD5)\nlicense.html: 4835 bytes, checksum: 29aa0cf0678cc1c2cfc47090779a9593 (MD5)\n Previous issue date: 2017", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "1 verkkoaineisto (85 sivua)", "language": null, "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "luokitus", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kokonaisarkkitehtuuri", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "riskienhallinta", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tietoj\u00e4rjestelm\u00e4t", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "johtaminen", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Tiedon luokittelu osana organisaation kokonaisarkkitehtuurin riskienhallintaprosessia", "language": null, "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201701191200", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Tietojenk\u00e4sittelytieteiden laitos", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Department of Computer Science and Information Systems", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Cyber Security", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Kyberturvallisuus", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.date.updated", "value": "2017-01-19T14:39:37Z", "language": null, "element": "date", "qualifier": "updated", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": null, "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": "fi", "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": null, "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "luokitus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kokonaisarkkitehtuuri", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "riskienhallinta", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoj\u00e4rjestelm\u00e4t", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "johtaminen", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
|