Kybersodan analysointia

Tämä tutkielma on kirjallisuuskatsaus, johon lähteinä on käytetty pääasiassa tieteellisiä artikkeleita ja kirjoja. Tutkielman tarkoituksena on perehtyä kybersodan käsitteeseen ja sen käyttötapoihin sekä siihen, onko kybersotaa olemassa. Käsitteen moderniuden johdosta sen määritelmät eroavat tutkijas...

Full description

Bibliographic Details
Main Author: Jääskeläinen, Susanna
Other Authors: Informaatioteknologian tiedekunta, Faculty of Information Technology, Informaatioteknologia, Information Technology, University of Jyväskylä, Jyväskylän yliopisto
Format: Bachelor's thesis
Language:fin
Published: 2017
Subjects:
Online Access: https://jyx.jyu.fi/handle/123456789/54412
_version_ 1826225797223940096
author Jääskeläinen, Susanna
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology University of Jyväskylä Jyväskylän yliopisto
author_facet Jääskeläinen, Susanna Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology University of Jyväskylä Jyväskylän yliopisto Jääskeläinen, Susanna Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology University of Jyväskylä Jyväskylän yliopisto
author_sort Jääskeläinen, Susanna
datasource_str_mv jyx
description Tämä tutkielma on kirjallisuuskatsaus, johon lähteinä on käytetty pääasiassa tieteellisiä artikkeleita ja kirjoja. Tutkielman tarkoituksena on perehtyä kybersodan käsitteeseen ja sen käyttötapoihin sekä siihen, onko kybersotaa olemassa. Käsitteen moderniuden johdosta sen määritelmät eroavat tutkijasta ja lähteestä riippuen huomattavasti toisistaan, mutta tutkielmaan onnistuttiin löytämään suhteellisen kattava kuva kybersodasta. This thesis is a literature review that is based mainly on scholarly articles and books. The purpose of this study is to familiarize with the concept of cyberwar and way of using the term, and consider the existence of cyberwar. In consequence of the modernity of the term its definitions differs significantly depending on the scholar and the repository. However, a relatively extensive concept of cyberwar was found based on the literature.
first_indexed 2017-06-12T20:26:28Z
format Kandityö
free_online_boolean 1
fullrecord [{"key": "dc.contributor.advisor", "value": "Moilanen, Panu", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "J\u00e4\u00e4skel\u00e4inen, Susanna", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2017-06-12T04:41:34Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2017-06-12T04:41:34Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2017", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/54412", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "T\u00e4m\u00e4 tutkielma on kirjallisuuskatsaus, johon l\u00e4htein\u00e4 on k\u00e4ytetty p\u00e4\u00e4asiassa tieteellisi\u00e4\nartikkeleita ja kirjoja. Tutkielman tarkoituksena on perehty\u00e4 kybersodan\nk\u00e4sitteeseen ja sen k\u00e4ytt\u00f6tapoihin sek\u00e4 siihen, onko kybersotaa olemassa. K\u00e4sitteen\nmoderniuden johdosta sen m\u00e4\u00e4ritelm\u00e4t eroavat tutkijasta ja l\u00e4hteest\u00e4 riippuen\nhuomattavasti toisistaan, mutta tutkielmaan onnistuttiin l\u00f6yt\u00e4m\u00e4\u00e4n suhteellisen\nkattava kuva kybersodasta.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "This thesis is a literature review that is based mainly on scholarly articles and\nbooks. The purpose of this study is to familiarize with the concept of cyberwar\nand way of using the term, and consider the existence of cyberwar. In consequence\nof the modernity of the term its definitions differs significantly depending\non the scholar and the repository. However, a relatively extensive concept of cyberwar\nwas found based on the literature.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted using Plone Publishing form by Susanna J\u00e4\u00e4skel\u00e4inen (sunijoja) on 2017-06-12 04:41:34.070252. Form: Kandidaatintutkielma -lomake (https://kirjasto.jyu.fi/julkaisut/julkaisulomakkeet/kandin-tutkielma-lomake). JyX data: [jyx_publishing-allowed (fi) =True]", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2017-06-12T04:41:34Z\nNo. of bitstreams: 2\nURN:NBN:fi:jyu-201706122787.pdf: 475860 bytes, checksum: 29e4b31233f684f83a7b25f8eceaa979 (MD5)\nlicense.html: 4786 bytes, checksum: aa7b9c007a03a591328f4e9ba48a9123 (MD5)", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2017-06-12T04:41:34Z (GMT). No. of bitstreams: 2\nURN:NBN:fi:jyu-201706122787.pdf: 475860 bytes, checksum: 29e4b31233f684f83a7b25f8eceaa979 (MD5)\nlicense.html: 4786 bytes, checksum: aa7b9c007a03a591328f4e9ba48a9123 (MD5)\n Previous issue date: 2017", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "29", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "kybersota", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kyberhy\u00f6kk\u00e4ys", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kyberavaruus", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "sota", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "teknologia", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tietoyhteiskunta", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Kybersodan analysointia", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201706122787", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatintutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.date.updated", "value": "2017-06-12T04:41:34Z", "language": null, "element": "date", "qualifier": "updated", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": "fi", "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
id jyx.123456789_54412
language fin
last_indexed 2025-02-18T10:54:11Z
main_date 2017-01-01T00:00:00Z
main_date_str 2017
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstreams\/93c6a33b-c6a7-4821-9707-d002b60c985b\/download","text":"URN:NBN:fi:jyu-201706122787.pdf","source":"jyx","mediaType":"application\/pdf"}
publishDate 2017
record_format qdc
source_str_mv jyx
spellingShingle Jääskeläinen, Susanna Kybersodan analysointia kybersota kyberhyökkäys kyberavaruus sota teknologia tietoyhteiskunta Tietojärjestelmätiede Information Systems Science
title Kybersodan analysointia
title_full Kybersodan analysointia
title_fullStr Kybersodan analysointia Kybersodan analysointia
title_full_unstemmed Kybersodan analysointia Kybersodan analysointia
title_short Kybersodan analysointia
title_sort kybersodan analysointia
title_txtP Kybersodan analysointia
topic kybersota kyberhyökkäys kyberavaruus sota teknologia tietoyhteiskunta Tietojärjestelmätiede Information Systems Science
topic_facet Information Systems Science Tietojärjestelmätiede kyberavaruus kyberhyökkäys kybersota sota teknologia tietoyhteiskunta
url https://jyx.jyu.fi/handle/123456789/54412 http://www.urn.fi/URN:NBN:fi:jyu-201706122787
work_keys_str_mv AT jääskeläinensusanna kybersodananalysointia