fullrecord |
[{"key": "dc.contributor.advisor", "value": "Ojala, Arto", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Erola, Olli-Pekka", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2018-05-25T05:40:54Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2018-05-25T05:40:54Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2018", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/58083", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "The aim of this study was to find out what kind of challenges are connected to the information security of cloud computing. The advantages of cloud computing are highly identified and now the challenges are getting more and more attention. The aim of this study was to take a closer look of how the commonly known challenges are affecting users behavior with cloud computing. The challenges of information security were limited to the SaaS-layer challenges, because that is the layer that users are dealing with. This study was based on a literature review. Based on that literature review, some deductions were made for the empirical part of the study. The empirical part was executed by qualitative interviews, which were held among cloud computing users. The questions for the interviews were based on the literature review. Because of that it was possible to compare the answers of the empirical part to the conclusions made from the literature review. The answers from the interviews were decoded by finding similar things between them. Because of the decoding it was easier to compare answers between each other. The main findings concerning the information security of SaaS-services were the many problems of data security. In addition to that challenges were found from the security of applications and network, access controlling and requirements of availability and the challenges that comes with it. All these together are limiting the way that cloud computing users are using the services. Users are not willing to give all their information to cloud services because they feel that the level of information security is not high enough. Users also feel that they are able to affect quite little to the information security. Service providers are carrying the biggest responsibility of information security. The only way that users felt they could affect the level of information security was to control which kind of data they are moving to the cloud. The main conclusion of this study was that the challenges related to the information security of cloud computing are limiting the way that users are using them. Users are not ready to give away all of their information to the service provider. That\u2019s why they are controlling which kind of data they are moving to the cloud.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "T\u00e4m\u00e4n tutkielman tarkoituksena oli tutustua paremmin siihen, mit\u00e4 haasteita liittyy pilvipalveluiden tietoturvallisuuteen. Pilvipalveluiden hy\u00f6dyt ovat laajasti tunnistettuja ja niiden tietoturvaan liitetyt haasteet ovat saaneet my\u00f6s huomiota osakseen. T\u00e4ss\u00e4 tutkielmassa tarkoituksena oli luoda tarkempi kuva siit\u00e4, miten yleisesti tunnistetut haasteet vaikuttavat k\u00e4ytt\u00e4jien toimintaan pilvipalveluiden parissa. Tietoturvallisuuteen liittyv\u00e4t haasteet rajattiin koskemaan SaaS-tason palveluita, koska niiden kanssa k\u00e4ytt\u00e4j\u00e4t ovat eniten tekemisiss\u00e4. Tutkielman pohjana toimi kirjallisuuskatsaus, jonka pohjalta luotiin johtop\u00e4\u00e4t\u00f6ksi\u00e4 empiirist\u00e4 osuutta varten. Empiirinen osuus toteutettiin laadullisten haastatteluiden avulla, jotka suoritettiin pilvipalveluiden k\u00e4ytt\u00e4jien parissa. Haastatteluiden kysymykset johdettiin kirjallisuuskatsauksen pohjalta. N\u00e4in ollen empiirisen osuuden vastausten ja kirjallisuuskatsauksen pohjalta tehtyjen johtop\u00e4\u00e4t\u00f6sten vertailu oli mahdollista. Haastatteluiden vastauksia tulkittiin teemoittelun avulla, jonka my\u00f6t\u00e4 niiden yhten\u00e4inen tulkitseminen muodostui helpommaksi. Tutkielman t\u00e4rkeimpin\u00e4 tuloksina nousi esille SaaS-palveluiden tietoturvasta moninaiset dataan liittyv\u00e4t ongelmat. T\u00e4m\u00e4n lis\u00e4ksi haasteita l\u00f6ydettiin sovellusten ja verkon turvallisuudesta, p\u00e4\u00e4syn kontrolloinnista sek\u00e4 saatavuuden vaatimuksista ja sen mukana tulevista haasteista. N\u00e4m\u00e4 kaikki yhdess\u00e4 vaikuttavat pilvipalveluiden k\u00e4ytt\u00e4jiin rajoittavasti. K\u00e4ytt\u00e4j\u00e4t eiv\u00e4t ole halukkaita luovuttamaan kaikkea dataa pilvipalveluihin, koska he eiv\u00e4t koe tietoturvallisuuden olevan tarpeeksi korkealla tasolla. K\u00e4ytt\u00e4j\u00e4t kokivat my\u00f6s voivansa itse vaikuttaa hyvin v\u00e4h\u00e4n tietoturvaan. Suurin vastuu pilvipalveluiden tietoturvasta on palveluntarjoajalla. K\u00e4ytt\u00e4j\u00e4t kokivat ainoaksi keinoksi juuri sen kontrolloimisen, mit\u00e4 dataa pilvipalveluihin luovutetaan. Tutkielman keskeisemp\u00e4n\u00e4 johtop\u00e4\u00e4t\u00f6ksen\u00e4 oli se, ett\u00e4 pilvipalveluiden tietoturvallisuuteen liittyv\u00e4t haasteet rajoittavat k\u00e4ytt\u00e4jien toimintaa niiden parissa. K\u00e4ytt\u00e4j\u00e4t eiv\u00e4t ole valmiita luovuttamaan kaikkea tietoa palveluntarjoajan vastuulle ja n\u00e4in ollen kontrolloivat sit\u00e4, mink\u00e4laista dataa he pilveen luovuttavat.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Irene Yl\u00f6nen (ireylon@jyu.fi) on 2018-05-25T05:40:54Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2018-05-25T05:40:54Z (GMT). No. of bitstreams: 0\n Previous issue date: 2018", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "66", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "pilvipalvelumallit", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "SaaS", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "turvallisuushaasteet", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "k\u00e4ytt\u00e4jien n\u00e4k\u00f6kulma", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Pilvipalveluiden tietoturvallisuus ja sen vaikutukset k\u00e4ytt\u00e4jien toimintaan", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201805252755", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "pilvipalvelut", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "pilvet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "data", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
|