fullrecord |
[{"key": "dc.contributor.advisor", "value": "Lehto, Martti", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Rantala, Jonna", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2017-11-08T18:11:10Z", "language": "", "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2017-11-08T18:11:10Z", "language": "", "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2017", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.other", "value": "oai:jykdok.linneanet.fi:1737870", "language": null, "element": "identifier", "qualifier": "other", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/55810", "language": "", "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Euroopan unionin verkko- ja tietoturvadirektiivi, eli NIS-direktiivi, annettiin hein\u00e4kuussa 2016 ja sit\u00e4 on sovellettava j\u00e4senvaltioissa viimeist\u00e4\u00e4n 10. toukokuuta 2018. Direktiivin tavoitteena on parantaa j\u00e4senmaiden tietoturvaa ja sit\u00e4 kautta sis\u00e4markkinoiden toimintaedellytyksi\u00e4. Se koskettaa suoraan digitaalisia toimijoita ja erikseen m\u00e4\u00e4riteltyj\u00e4 keskeisi\u00e4 toimijoita, mutta sen vaikutusten voidaan olettaa ulottuvan my\u00f6s n\u00e4iden ryhmien ulkopuolelle muun muassa palveluntarjoajiin. Vaikka direktiivi annettiin samoihin aikoihin ja sen soveltaminen aloitetaan my\u00f6s samoihin aikoihin Euroopan unionin tietosuoja-asetuksen (GDPR) kanssa, on se j\u00e4\u00e4nyt huomattavasti pienemm\u00e4lle huomiolle kuin tietosuoja-asetus. \r\n\r\nT\u00e4ss\u00e4 tutkielmassa tarkastellaan EU:n uuden verkko- ja tietoturvadirektiivin vaikutuksia yritysten toiminnalle. Vaikutuksia tarkastellaan yritysten n\u00e4k\u00f6kulmasta ja huomioiden direktiivin tuomat kaksi puolta: riskit ja riskienhallinnan. Vaikka direktiivi pyrkii tuomaan yrityksille tehostettua riskienhallintaa, se tuo samalla my\u00f6s riskej\u00e4 yrityksen toimintoihin. Juurikin riskeist\u00e4 johtuen GDPR on saanut niin suuren huomion. Tutkimusongelmina selvitet\u00e4\u00e4n, ket\u00e4 direktiivi tulee koskettamaan, millaisia riskej\u00e4 direktiivi tuo mukanaan sit\u00e4 koskettaville yrityksille ja toisaalta mit\u00e4 direktiivi tuo yritysten riskienhallinnalle. Tutkimuksen aineistona toimi s\u00e4\u00e4detty direktiivi, ja tukevana materiaalina liikenne- ja viestint\u00e4ministeri\u00f6n asettaman ty\u00f6ryhm\u00e4n loppuraportti sek\u00e4 Suomen tietoturvallisuus strategia, joka julkaistiin kev\u00e4\u00e4ll\u00e4 2016. \r\n\r\nTutkimus on laadullinen sis\u00e4ll\u00f6nanalyysi, jossa asiaa pohditaan muiden tutkimusten ja yll\u00e4 mainitun aineiston pohjalta. Koska t\u00e4m\u00e4 on tietotekniikan, ei oikeustieteiden tutkimus, ei lakeihin tai niiden vaikutuksiin menn\u00e4 syv\u00e4llisesti, vaan asiaa tarkastellaan enemm\u00e4n yl\u00e4tasolla ja pyrit\u00e4\u00e4n luomaan kokonaiskuvaa aiheeseen. \r\nTutkimuksen tulosten perusteella todettiin, ett\u00e4 direktiivi tuo yrityksille niin uusia riskej\u00e4, kuin riskienhallintaa tukeviakin keinoja. Vaikka toimijoiden rajaus ennen lain julkaisua on hankalaa, jo nyt voitiin todeta, ett\u00e4 joukko tulee olemaan laajempi, kuin vain suoraan direktiivin alaisiksi m\u00e4\u00e4ritellyt toimijat. Ep\u00e4onnistuessaan direktiivi tuo yrityksille useita strategisia ja toiminnallisia riskej\u00e4, jotka haittaavat yritysten toimintaa, mutta onnistuessaan se voi merkitt\u00e4v\u00e4sti parantaa verkko- ja tietoturvallisuutta EU:n j\u00e4senmaissa.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Two sides of NIS directive : risks and risk management.\r\n\r\nThe EU Directive on security of network and information systems (the NIS Directive) was adopted in July 2016, and shall be transposed into national laws throughout the Member States by May 10th, 2018. The objectives of the Directive are to improve cyber security throughout the member states, which is said to further lead into better functioning digital single market. The Directive directly affects operators of essential services and digital service providers, but its impacts can be expected to extend beyond these groups for example to service providers. Although the Directive was adopted around the same time, and it will step into force around the same time with EU\u2019s General Data Protection Regulation (GDPR), it has received far less attention than GDPR. \r\n\r\nThis thesis examines the impact of the NIS Directive on companies. The impacts are examined from the businesses point of view considering the two sides of the Directive: risks and risk management. Even though the directive aims to bring companies more effective risk management practices, it also brings risks to the company\u2019s operations. Risks are in fact one of the reasons that have brought the GDPR into the center of the attention. Research questions aim to identify, which companies are affected by the directive, what risks the Directive brings, and what does the directive bring for the companies\u2019 risk management. The research was done by analyzing the directive itself. The final report of the Ministry of Transport and Communications\u2019 working group and Finnish Information Security Strategy, published in spring 2016, were used as supportive material. The study is limited to Finland.\r\n\r\nThe study is a qualitative content analysis that reflects the matter based on other studies and above mentioned material. Because this is an information technology thesis, not legal studies, the study does not go deeply into laws or their legal implications, but the matter is rather analyzed on higher level and the aim is to create an overall picture of the subject.\r\n\r\nBased on the research results, it was found that the Directive brings new risks to the companies as well as provides tools for their risk management. Prior publishing the local laws it is difficult to define all the affected parties, but already now it can be concluded that the effects will spread beyond the operators directly defined in the Directive. If the directive fails it will bring the companies many strategic and operational risks, but when succeeding it can significantly improve the network and information security in EU member states.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted using Plone Publishing form by Jonna Rantala (joevrant) on 2017-11-08 18:11:09.734361. Form: Pro gradu -lomake (https://kirjasto.jyu.fi/julkaisut/julkaisulomakkeet/pro-gradu-lomake). JyX data: [jyx_publishing-allowed (fi) =True]", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2017-11-08T18:11:10Z\r\nNo. of bitstreams: 2\r\nURN:NBN:fi:jyu-201711084172.pdf: 661035 bytes, checksum: 85cc2d4fec13f6e77666dc22f645c2e2 (MD5)\r\nlicense.html: 4815 bytes, checksum: b40389bfc46b50aa4ff0eec86501cebb (MD5)", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2017-11-08T18:11:10Z (GMT). No. of bitstreams: 2\r\nURN:NBN:fi:jyu-201711084172.pdf: 661035 bytes, checksum: 85cc2d4fec13f6e77666dc22f645c2e2 (MD5)\r\nlicense.html: 4815 bytes, checksum: b40389bfc46b50aa4ff0eec86501cebb (MD5)\r\n Previous issue date: 2017", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "1 verkkoaineisto (68 sivua)", "language": null, "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "EU:n verkko- ja tietoturvadirektiivi", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "NIS-direktiivi", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "NIS directive", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "NISD", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "NIS-direktiivin kahdet kasvot : riskit ja riskienhallinta", "language": null, "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201711084172", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietotekniikka", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Mathematical Information Technology", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.method", "value": "Laadullinen sis\u00e4ll\u00f6nanalyysi", "language": null, "element": "subject", "qualifier": "method", "schema": "dc"}, {"key": "dc.date.updated", "value": "2017-11-08T18:11:10Z", "language": "", "element": "date", "qualifier": "updated", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": "fi", "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "602", "language": null, "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "direktiivit", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoverkot", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "yritykset", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "riskienhallinta", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
|