fullrecord |
[{"key": "dc.contributor.advisor", "value": "Luoma, Eetu", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Tamminen, Jimi", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2018-06-08T10:27:52Z", "language": "", "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2018-06-08T10:27:52Z", "language": "", "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2018", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/58466", "language": "", "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "T\u00e4ss\u00e4 kandidaatin tutkielmassa esitell\u00e4\u00e4n kirjallisuuskatsauksen keinoin mobiilimaksamista, siihen liittyvi\u00e4 turvallisuusuhkia ja niiden torjuntatapoja. Tutkielmassa esitell\u00e4\u00e4n mobiilimaksamisen t\u00e4rkeimm\u00e4t ominaisuudet ja toimintatavat. Lis\u00e4ksi tutkielmassa esitell\u00e4\u00e4n mobiilimaksamisen mahdollistavia teknologioita. Mobiilimaksamisen suosion arvioidaan kasvavan huomattavasti tulevien vuosien aikana ja yksi t\u00e4rkeimmist\u00e4 tekij\u00f6ist\u00e4 mobiilimaksamisen k\u00e4ytt\u00f6\u00f6noton kannalta on turvallisuus. Turvallisuus on mobiilimaksamisessa t\u00e4rke\u00e4ss\u00e4 asemassa, sill\u00e4 mobiilimaksuj\u00e4rjestelm\u00e4t k\u00e4sittelev\u00e4t arkaluontoista tietoja. \r\nEsimerkiksi henkil\u00f6- ja rahaliikennetiedot voivat olla uhattuina mobiilimaksuj\u00e4rjestelm\u00e4\u00e4n kohdistuvan tietomurron aikana. Tutkimuksessa esitell\u00e4\u00e4n mist\u00e4 \r\nturvallisuus muodostuu mobiilimaksamisessa ja millaisia uhkia siihen liittyy. \r\nLopuksi selvitet\u00e4\u00e4n, mitk\u00e4 ovat olennaisimpia torjuntatapoja mobiilimaksamisen uhkia vastaan.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "The Bachelor\u2019s Thesis is a literature review, which discusses mobile payment, \r\nsecurity threats relating to it, and prevention methods against these threats. The \r\nthesis presents the most important features and functions of mobile payment. \r\nOn top of these, the thesis highlights the technologies that make mobile pay-\r\nment possible. The popularity of mobile payment is projected rise significantly \r\nin the following years and security is one of the most important aspects regard-\r\ning customer acceptance. Security is key attribute for mobile payment systems \r\ndue to the sensitive information that they process. For example, personal and \r\nfinancial information may be compromised in case of a data breach on a mobile \r\npayment system. The thesis explains what the building blocks for security of \r\nmobile payment are and what types of threats related to it. Finally, the thesis \r\nwill describe the essential methods to prevent these threats.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2018-06-08T10:27:52Z\r\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2018-06-08T10:27:52Z (GMT). No. of bitstreams: 0\r\n Previous issue date: 2018", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "33", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "mobiilimaksaminen", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "turvallisuusuhat", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Mobiilimaksamisen turvallisuusuhat ja niiden torjunta", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201806083121", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "mobiilipalvelut", "language": "", "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "turvallisuus", "language": "", "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": "", "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|