_version_ 1799745895061782528
annif_keywords_txtF_mv safety and security data security literature surveys methodology data systems
annif_uris_txtF_mv http://www.yso.fi/onto/yso/p7349 http://www.yso.fi/onto/yso/p5479 http://www.yso.fi/onto/yso/p7595 http://www.yso.fi/onto/yso/p7509 http://www.yso.fi/onto/yso/p3927
author Yang, Yaping
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Tietojenkäsittelytiede Computer Science 601
author_facet Yang, Yaping Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Tietojenkäsittelytiede Computer Science 601 Yang, Yaping
author_sort Yang, Yaping
building Jyväskylän yliopisto JYX-julkaisuarkisto
datasource_str_mv jyx
department_txtF Informaatioteknologia
faculty_txtF Informaatioteknologian tiedekunta
first_indexed 2019-08-19T08:22:04Z
format Pro gradu
format_ext_str_mv Opinnäyte Maisterivaiheen työ
free_online_boolean 1
fullrecord <?xml version="1.0"?> <qualifieddc schemaLocation="http://purl.org/dc/terms/ http://dublincore.org/schemas/xmls/qdc/2006/01/06/dcterms.xsd http://purl.org/dc/elements/1.1/ http://dublincore.org/schemas/xmls/qdc/2006/01/06/dc.xsd"><title>Literature review of information security practice survey reports</title><creator>Yang, Yaping</creator><contributor type="tiedekunta" lang="fi">Informaatioteknologian tiedekunta</contributor><contributor type="tiedekunta" lang="en">Faculty of Information Technology</contributor><contributor type="laitos" lang="fi">Informaatioteknologia</contributor><contributor type="laitos" lang="en">Information Technology</contributor><contributor type="yliopisto" lang="fi">Jyv&#xE4;skyl&#xE4;n yliopisto</contributor><contributor type="yliopisto" lang="en">University of Jyv&#xE4;skyl&#xE4;</contributor><contributor type="oppiaine" lang="fi">Tietojenk&#xE4;sittelytiede</contributor><contributor type="oppiaine" lang="en">Computer Science</contributor><contributor type="oppiainekoodi">601</contributor><subject type="other">information security</subject><subject type="other">cyber security</subject><subject type="other">computer security</subject><subject type="other">digital business</subject><subject type="other">information technology</subject><subject type="other">cyber attacks and breaches</subject><subject type="other">cyber intelligence</subject><subject type="yso">kyberturvallisuus</subject><subject type="yso">tietoverkkorikokset</subject><subject type="yso">tietomurto</subject><subject type="yso">tietosuoja</subject><subject type="yso">tietoturva</subject><subject type="yso">verkkohy&#xF6;kk&#xE4;ykset</subject><subject type="yso">data</subject><subject type="yso">haittaohjelmat</subject><subject type="yso">cyber security</subject><subject type="yso">netcrime</subject><subject type="yso">data break-in</subject><subject type="yso">data privacy</subject><subject type="yso">data security</subject><subject type="yso">cyber attacks</subject><subject type="yso">data</subject><subject type="yso">malware</subject><available>2018-09-06T10:17:47Z</available><issued>2018</issued><type lang="en">Master&#x2019;s thesis</type><type lang="fi">Pro gradu -tutkielma</type><identifier type="uri">https://jyx.jyu.fi/handle/123456789/59443</identifier><identifier type="urn">URN:NBN:fi:jyu-201809064034</identifier><language type="iso">en</language><rights type="copyright" lang="fi">Julkaisu on tekij&#xE4;noikeuss&#xE4;&#xE4;nn&#xF6;sten alainen. Teosta voi lukea ja tulostaa henkil&#xF6;kohtaista k&#xE4;ytt&#xF6;&#xE4; varten. K&#xE4;ytt&#xF6; kaupallisiin tarkoituksiin on kielletty.</rights><rights type="copyright" lang="en">This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.</rights><permaddress type="urn">http://www.urn.fi/URN:NBN:fi:jyu-201809064034</permaddress><file bundle="ORIGINAL" href="https://jyx.jyu.fi/bitstream/123456789/59443/1/URN%3aNBN%3afi%3ajyu-201809064034.pdf" name="URN:NBN:fi:jyu-201809064034.pdf" type="application/pdf" length="2172988" sequence="1"/><recordID>123456789_59443</recordID></qualifieddc>
id jyx.123456789_59443
language eng
last_indexed 2024-05-13T20:05:12Z
main_date 2018-01-01T00:00:00Z
main_date_str 2018
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstream\/123456789\/59443\/1\/URN%3aNBN%3afi%3ajyu-201809064034.pdf","text":"URN:NBN:fi:jyu-201809064034.pdf","source":"jyx","mediaType":"application\/pdf"}
oppiainekoodi_txtF 601
publication_first_indexed 2018-08-19T08:22:04Z
publishDate 2018
record_format qdc
source_str_mv jyx
spellingShingle Yang, Yaping Literature review of information security practice survey reports information security cyber security computer security digital business information technology cyber attacks and breaches cyber intelligence kyberturvallisuus tietoverkkorikokset tietomurto tietosuoja tietoturva verkkohyökkäykset data haittaohjelmat netcrime data break-in data privacy data security cyber attacks malware
subject_txtF Kognitiotiede
thumbnail https://jyu.finna.fi/Cover/Show?source=Solr&id=jyx.123456789_59443&index=0&size=large
title Literature review of information security practice survey reports
title_full Literature review of information security practice survey reports
title_fullStr Literature review of information security practice survey reports Literature review of information security practice survey reports
title_full_unstemmed Literature review of information security practice survey reports Literature review of information security practice survey reports
title_short Literature review of information security practice survey reports
title_sort literature review of information security practice survey reports
title_txtP Literature review of information security practice survey reports
topic information security cyber security computer security digital business information technology cyber attacks and breaches cyber intelligence kyberturvallisuus tietoverkkorikokset tietomurto tietosuoja tietoturva verkkohyökkäykset data haittaohjelmat netcrime data break-in data privacy data security cyber attacks malware
topic_facet computer security cyber attacks cyber attacks and breaches cyber intelligence cyber security data data break-in data privacy data security digital business haittaohjelmat information security information technology kyberturvallisuus malware netcrime tietomurto tietosuoja tietoturva tietoverkkorikokset verkkohyökkäykset
url https://jyx.jyu.fi/handle/123456789/59443 http://www.urn.fi/URN:NBN:fi:jyu-201809064034
work_keys_str_mv AT yangyaping literaturereviewofinformationsecuritypracticesurveyreports