_version_ |
1799745895061782528
|
annif_keywords_txtF_mv |
safety and security
data security
literature surveys
methodology
data systems
|
annif_uris_txtF_mv |
http://www.yso.fi/onto/yso/p7349
http://www.yso.fi/onto/yso/p5479
http://www.yso.fi/onto/yso/p7595
http://www.yso.fi/onto/yso/p7509
http://www.yso.fi/onto/yso/p3927
|
author |
Yang, Yaping
|
author2 |
Informaatioteknologian tiedekunta
Faculty of Information Technology
Informaatioteknologia
Information Technology
Jyväskylän yliopisto
University of Jyväskylä
Tietojenkäsittelytiede
Computer Science
601
|
author_facet |
Yang, Yaping
Informaatioteknologian tiedekunta
Faculty of Information Technology
Informaatioteknologia
Information Technology
Jyväskylän yliopisto
University of Jyväskylä
Tietojenkäsittelytiede
Computer Science
601
Yang, Yaping
|
author_sort |
Yang, Yaping
|
building |
Jyväskylän yliopisto
JYX-julkaisuarkisto
|
datasource_str_mv |
jyx
|
department_txtF |
Informaatioteknologia
|
faculty_txtF |
Informaatioteknologian tiedekunta
|
first_indexed |
2019-08-19T08:22:04Z
|
format |
Pro gradu
|
format_ext_str_mv |
Opinnäyte
Maisterivaiheen työ
|
free_online_boolean |
1
|
fullrecord |
<?xml version="1.0"?>
<qualifieddc schemaLocation="http://purl.org/dc/terms/ http://dublincore.org/schemas/xmls/qdc/2006/01/06/dcterms.xsd http://purl.org/dc/elements/1.1/ http://dublincore.org/schemas/xmls/qdc/2006/01/06/dc.xsd"><title>Literature review of information security practice survey reports</title><creator>Yang, Yaping</creator><contributor type="tiedekunta" lang="fi">Informaatioteknologian tiedekunta</contributor><contributor type="tiedekunta" lang="en">Faculty of Information Technology</contributor><contributor type="laitos" lang="fi">Informaatioteknologia</contributor><contributor type="laitos" lang="en">Information Technology</contributor><contributor type="yliopisto" lang="fi">Jyväskylän yliopisto</contributor><contributor type="yliopisto" lang="en">University of Jyväskylä</contributor><contributor type="oppiaine" lang="fi">Tietojenkäsittelytiede</contributor><contributor type="oppiaine" lang="en">Computer Science</contributor><contributor type="oppiainekoodi">601</contributor><subject type="other">information security</subject><subject type="other">cyber security</subject><subject type="other">computer security</subject><subject type="other">digital business</subject><subject type="other">information technology</subject><subject type="other">cyber attacks and breaches</subject><subject type="other">cyber intelligence</subject><subject type="yso">kyberturvallisuus</subject><subject type="yso">tietoverkkorikokset</subject><subject type="yso">tietomurto</subject><subject type="yso">tietosuoja</subject><subject type="yso">tietoturva</subject><subject type="yso">verkkohyökkäykset</subject><subject type="yso">data</subject><subject type="yso">haittaohjelmat</subject><subject type="yso">cyber security</subject><subject type="yso">netcrime</subject><subject type="yso">data break-in</subject><subject type="yso">data privacy</subject><subject type="yso">data security</subject><subject type="yso">cyber attacks</subject><subject type="yso">data</subject><subject type="yso">malware</subject><available>2018-09-06T10:17:47Z</available><issued>2018</issued><type lang="en">Master’s thesis</type><type lang="fi">Pro gradu -tutkielma</type><identifier type="uri">https://jyx.jyu.fi/handle/123456789/59443</identifier><identifier type="urn">URN:NBN:fi:jyu-201809064034</identifier><language type="iso">en</language><rights type="copyright" lang="fi">Julkaisu on tekijänoikeussäännösten alainen. Teosta voi lukea ja tulostaa henkilökohtaista käyttöä varten. Käyttö kaupallisiin tarkoituksiin on kielletty.</rights><rights type="copyright" lang="en">This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.</rights><permaddress type="urn">http://www.urn.fi/URN:NBN:fi:jyu-201809064034</permaddress><file bundle="ORIGINAL" href="https://jyx.jyu.fi/bitstream/123456789/59443/1/URN%3aNBN%3afi%3ajyu-201809064034.pdf" name="URN:NBN:fi:jyu-201809064034.pdf" type="application/pdf" length="2172988" sequence="1"/><recordID>123456789_59443</recordID></qualifieddc>
|
id |
jyx.123456789_59443
|
language |
eng
|
last_indexed |
2024-05-13T20:05:12Z
|
main_date |
2018-01-01T00:00:00Z
|
main_date_str |
2018
|
online_boolean |
1
|
online_urls_str_mv |
{"url":"https:\/\/jyx.jyu.fi\/bitstream\/123456789\/59443\/1\/URN%3aNBN%3afi%3ajyu-201809064034.pdf","text":"URN:NBN:fi:jyu-201809064034.pdf","source":"jyx","mediaType":"application\/pdf"}
|
oppiainekoodi_txtF |
601
|
publication_first_indexed |
2018-08-19T08:22:04Z
|
publishDate |
2018
|
record_format |
qdc
|
source_str_mv |
jyx
|
spellingShingle |
Yang, Yaping
Literature review of information security practice survey reports
information security
cyber security
computer security
digital business
information technology
cyber attacks and breaches
cyber intelligence
kyberturvallisuus
tietoverkkorikokset
tietomurto
tietosuoja
tietoturva
verkkohyökkäykset
data
haittaohjelmat
netcrime
data break-in
data privacy
data security
cyber attacks
malware
|
subject_txtF |
Kognitiotiede
|
thumbnail |
https://jyu.finna.fi/Cover/Show?source=Solr&id=jyx.123456789_59443&index=0&size=large
|
title |
Literature review of information security practice survey reports
|
title_full |
Literature review of information security practice survey reports
|
title_fullStr |
Literature review of information security practice survey reports
Literature review of information security practice survey reports
|
title_full_unstemmed |
Literature review of information security practice survey reports
Literature review of information security practice survey reports
|
title_short |
Literature review of information security practice survey reports
|
title_sort |
literature review of information security practice survey reports
|
title_txtP |
Literature review of information security practice survey reports
|
topic |
information security
cyber security
computer security
digital business
information technology
cyber attacks and breaches
cyber intelligence
kyberturvallisuus
tietoverkkorikokset
tietomurto
tietosuoja
tietoturva
verkkohyökkäykset
data
haittaohjelmat
netcrime
data break-in
data privacy
data security
cyber attacks
malware
|
topic_facet |
computer security
cyber attacks
cyber attacks and breaches
cyber intelligence
cyber security
data
data break-in
data privacy
data security
digital business
haittaohjelmat
information security
information technology
kyberturvallisuus
malware
netcrime
tietomurto
tietosuoja
tietoturva
tietoverkkorikokset
verkkohyökkäykset
|
url |
https://jyx.jyu.fi/handle/123456789/59443
http://www.urn.fi/URN:NBN:fi:jyu-201809064034
|
work_keys_str_mv |
AT yangyaping literaturereviewofinformationsecuritypracticesurveyreports
|