fullrecord |
[{"key": "dc.contributor.advisor", "value": "Tuunanen, Tuure", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Mattsson, Sari", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2018-04-03T06:27:56Z", "language": "", "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2018-04-03T06:27:56Z", "language": "", "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2018", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.other", "value": "oai:jykdok.linneanet.fi:1863854", "language": null, "element": "identifier", "qualifier": "other", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/57469", "language": "", "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Riskien hallinta on yksi tietoj\u00e4rjestelm\u00e4tieteen kulmakivist\u00e4. Tietoj\u00e4rjestelmien avulla yritykset suorittavat ja tehostavat liiketoimintojaan sek\u00e4 julkiset tahot kuten valtiot suorittavat operaatioitaan. Samalla kun tietoj\u00e4rjestelmien avulla minimoidaan riskej\u00e4 ajantasaistamalla j\u00e4rjestelmi\u00e4 sek\u00e4 uusimalla toimintatapoja on, t\u00e4rke\u00e4\u00e4 tunnistaa my\u00f6s muuttuneiden ratkaisuiden ja toimintatapojen uudet riskitekij\u00e4t sek\u00e4 riskitekij\u00f6iden sidokset kehitett\u00e4viin j\u00e4rjestelmiin. Perinteisesti riskej\u00e4 hallitaan projektihallinnan tukena olevien menetelmien avulla. Tietoj\u00e4rjestelm\u00e4t ovat kuitenkin yh\u00e4 useammin l\u00e4sn\u00e4 operaatioissa, joiden toimimattomuus voi uhata jopa ihmisten terveytt\u00e4 ja turvallisuutta. Esimerkiksi l\u00e4\u00e4kint\u00e4laiteteollisuudessa ohjelmistojen toimimattomuus voi laukasta vakavimmillaan ihmisen terveytt\u00e4 uhkaavia vakavia riskitekij\u00f6it\u00e4 sek\u00e4 vaaratilanteita. Tieto joilla saavutetaan ymm\u00e4rrys eri standardien toimivuudesta, on tunnistettu t\u00e4rke\u00e4ksi aikaisemmissa tietoj\u00e4rjestelm\u00e4tieteen tutkimuksissa (Oehmen ym., 2014).\r\n\r\nKoostetun taustateorian, eli kirjallisuuskatsauksen l\u00e4ht\u00f6kohdat ovat ohjelmistojen kehitt\u00e4minen ja riskienhallinta. Taustateoriassa huomioitiin my\u00f6s l\u00e4\u00e4kint\u00e4laitedirektiivin (Medical Device Directive (MDD) k\u00e4yt\u00e4nt\u00f6j\u00e4 sek\u00e4 tarkasteltiin kypsyysmalliin liittyvi\u00e4 tekij\u00f6it\u00e4. Taustateorian pohjalta kehitettiin tutkimuksen artefakti, ohjelmistojen turvallisuuteen ja riskienhallintaan t\u00e4ht\u00e4\u00e4v\u00e4 kypsyysmalli. Kypsyysmalli fokusoituu ihmiskeskeiseen l\u00e4hestymistapaan, jossa tunnistetaan my\u00f6s yksil\u00f6\u00e4, yhteis\u00f6\u00e4, yhteiskuntaa tai ymp\u00e4rist\u00f6\u00e4 uhkaavia vaaratekij\u00f6it\u00e4 tietoj\u00e4rjestelm\u00e4tieteen n\u00e4k\u00f6kulmasta. Kypsyysmalli ohjaa omaksumaan riskienhallinnan organisaatioiden toiminnan keski\u00f6\u00f6n riskiperustaisesti sek\u00e4 koostaa l\u00e4\u00e4kint\u00e4laiteteollisuuden parhaita k\u00e4yt\u00e4nt\u00f6j\u00e4 toimialariippumattomasti. L\u00e4\u00e4kint\u00e4laitedirektiivin kanssa yhteensopivaa, sen parhaita k\u00e4yt\u00e4nt\u00f6j\u00e4 sis\u00e4lt\u00e4v\u00e4\u00e4 itsearviointimallia, ei tutkimuksen aloitusvaiheessa tunnistettu olevan. Syntyneen artefaktin arkkitehtuurirakenne on poikkeuksellinen nykyisiin viitekehyksiin verrattuna. Pro Gradu on toteutettu perehtym\u00e4ll\u00e4 aihealueen kirjallisuuteen ja artikkeleihin. Tutkimuksessa k\u00e4ytettiin Design Science Research (DSR) process mallia. Syntyneit\u00e4 tutkimustuloksia analysoidaan puolestaan tiet\u00e4myksen kontribuutio viitekehyksen kautta. Tiet\u00e4myksen kontribuutio m\u00e4\u00e4rittelee, ett\u00e4 todellinen keksint\u00f6 eroaa selke\u00e4sti tyypillisist\u00e4 ja vallalla olevista ajattelutavoista sek\u00e4 toimintatavoista (Gregor & Hevner, 2013).", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Risk-based critical information system development with risk management maturity\r\nmodel.\r\n\r\nRisk management is one of the key item in the information system science. Today, ICT enables all kind business and business operations in public and private sector organizations. While information systems remodel business practices, way of working and minimizes the recognized risks, it is also important to identify new potential risks and risk factors in the systems which will be developed and used in the operations. Information systems are increasingly used in operations where non-working systems may even affect human lives. For example, in the Medical Device Directive (MDD) related systems or other similar critical area, non-working systems can impact the most serious threats and affect individuals or even larger communities. In the fact, IT systems could be used in the operations where the worst scenario risk can cause catastrophe and affect human lives. Understanding performance of the various directives, has been identified as important in previous information science studies. (Oehmen ym., 2014).\r\n\r\nPro Gradu has been executed through the literature and articles of the topic. The topics are risk management in the software development area with the special perspectives. In example, the special features of the Medical Device Directive (MDD) were considered as well as the maturity model factors. Based on literature review, constructed artefact, the maturity model brings on a human-oriented approach in the system development and risk management area. The artefact architectural structure presents risk-based activities in the three special risk categories and it guides organizations to naturalize risk-based ideology in the heart of the operations. Artefact is the industry independent self-assessment model with MDD compatible best practices. Best practices are clas-sified new way in the artefact architecture. This kind risk maturity model has not been identified at the start of the research. The architecture of the created artefacts is exceptional compared to the present reference frames. The research utilized the Design Science Research (DSR) process. The results of the research are analysed through the contribution of the knowledge framework. The real invention differs clearly from typical mindset and way of working. (Gregor & Hevner, 2013).", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted using Plone Publishing form by Sari Mattsson (sajomatt) on 2018-04-03 06:27:55.905653. Form: Pro gradu -lomake (https://kirjasto.jyu.fi/julkaisut/julkaisulomakkeet/pro-gradu-lomake). JyX data: [jyx_publishing-allowed (fi) =False]", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2018-04-03T06:27:56Z\r\nNo. of bitstreams: 2\r\nURN:NBN:fi:jyu-201804031887.pdf: 2908059 bytes, checksum: 0b8add7b7fbfb7b03d743d7be10f9530 (MD5)\r\nlicense.html: 1162 bytes, checksum: d0503f463094a23167fdf3f7dba8efa1 (MD5)", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2018-04-03T06:27:56Z (GMT). No. of bitstreams: 2\r\nURN:NBN:fi:jyu-201804031887.pdf: 2908059 bytes, checksum: 0b8add7b7fbfb7b03d743d7be10f9530 (MD5)\r\nlicense.html: 1162 bytes, checksum: d0503f463094a23167fdf3f7dba8efa1 (MD5)\r\n Previous issue date: 2018", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "1 verkkoaineisto (145 sivua)", "language": null, "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "kypsyysmalli", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "riskiperusteinen toimintamalli", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "l\u00e4\u00e4kint\u00e4laitedirektiivi", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "risk management", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "project management", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "information technology", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "communication technology", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "system development", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "Medical Device Directive (MDD)", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "Capability Maturity Model (CMM)", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "risk based approach", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Kriittisten tietoj\u00e4rjestelmien kehitt\u00e4minen riskiperustaisen kypsyysmallin avulla", "language": null, "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201804031887", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietojenk\u00e4sittelytiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.method", "value": "Suunnittelutieteellinen tutkimusmenetelm\u00e4", "language": null, "element": "subject", "qualifier": "method", "schema": "dc"}, {"key": "dc.date.updated", "value": "2018-04-03T06:27:57Z", "language": "", "element": "date", "qualifier": "updated", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "restrictedAccess", "language": "fi", "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": null, "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "riskienhallinta", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "projektinhallinta", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietotekniikka", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "viestint\u00e4tekniikka", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "ohjelmistokehitys", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "mallit", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "l\u00e4\u00e4kint\u00e4laitteet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "direktiivit", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "Aineistoon p\u00e4\u00e4sy\u00e4 on rajoitettu tekij\u00e4noikeussyist\u00e4. Aineisto on luettavissa Jyv\u00e4skyl\u00e4n yliopiston kirjaston arkistoty\u00f6asemalta. Ks. https://kirjasto.jyu.fi/fi/tyoskentelytilat/laitteet-ja-tilat.", "language": "fi", "element": "rights", "qualifier": "accessrights", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "This material has a restricted access due to copyright reasons. It can be read at the workstation at Jyv\u00e4skyl\u00e4 University Library reserved for the use of archival materials: https://kirjasto.jyu.fi/en/workspaces/facilities.", "language": "en", "element": "rights", "qualifier": "accessrights", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
|