fullrecord |
[{"key": "dc.contributor.advisor", "value": "Siponen, Mikko", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.advisor", "value": "Lehto, Martti", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Suoninen, Harri", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2018-12-11T07:36:03Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2018-12-11T07:36:03Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2018", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/60556", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Kyberrikollisuus muodostaa vakavan uhkan yritysten liiketoiminnalle. Rikollisten motiivit vaihtelevat kiusanteosta taloudellisen hy\u00f6dyn hakemiseen, teollisuusvakoilusta liiketoiminnan vahingoittamiseen. Kyberrikollisuutta vastaan varaudutaan teknisin keinoin, luomalla toimintamalleja sek\u00e4 kouluttamalla henkil\u00f6kuntaa tunnistamaan uhkat.\nT\u00e4ss\u00e4 tutkielmassa selvitet\u00e4\u00e4n kuinka pelkk\u00e4 kyberuhka vaikuttaa yritysten liiketoimintaan, miten uhkatietoa haetaan ja mit\u00e4 tiedolla sen j\u00e4lkeen tehd\u00e4\u00e4n ja mihin toimiin uhka-arvioiden perusteella on ryhdytty. Lis\u00e4ksi selvitet\u00e4\u00e4n uhkatiedon vaikutukset liiketoiminnan suunnitteluun, tuotteisiin ja palveluihin sek\u00e4 toimintamalleihin. Tutkielma jakautuu kahteen osaan kirjallisuuskatsaukseen ja empiiriseen monitapaustutkimukseen. Kirjallisuuskatsauksella muodostetaan yleiskuva yrityksiin kohdistuvasta kyberrikollisuudesta, sen vaikutuksista liiketoimintaan, uhkakent\u00e4st\u00e4, riskienhallinnasta, kyberturvallisuuden johtamisesta ja organisoinnista. T\u00e4t\u00e4 kirjallisuuskatsausta hy\u00f6dynt\u00e4en rakennettiin tietopohja monitapaustutkimusta varten. N\u00e4in pystyttiin arvioimaan tutkimuksen kannalta relevantit teemat tutkimusongelman ratkaisemiseksi. Monitapaustutkimuksen kohteena oli nelj\u00e4 yrityst\u00e4 eri kokoluokista ja toimialoilta, henkil\u00f6kohtaisia haastatteluita tehtiin 12 ja vastaajat edustivat kyberturvallisuuden ja tietohallinnon johtoa, liiketoimintajohtoa sek\u00e4 yrityksen kannalta muita kriittisi\u00e4 toimintoja. Tulokset osoittavat miten pelkk\u00e4 kyberuhka vaikuttaa yrityksen eri toimintoihin ja niiden suunnitteluun, riippumatta siit\u00e4 onko uhka toteutunut. Tutkielmassa selvi\u00e4\u00e4 kuinka uhkatieto hankitaan ja tavat tiedon jatkok\u00e4sittelyyn. Tutkimuksen tuloksena luotiin malli uhkatiedon k\u00e4sittelyst\u00e4 ja hy\u00f6dynt\u00e4misest\u00e4. Tutkimustuloksia voidaan hy\u00f6dynt\u00e4\u00e4 paitsi tieteellisess\u00e4 jatkotutkimuksessa, my\u00f6s yritysten toimintatapojen kehitt\u00e4misess\u00e4 kyberturvallisuutta parantavasti ja kyberrikosten aiheuttamien vahinkojen minimoimiseksi.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Cybercrime constitutes a serious threat to the business of companies. The motives of the criminals vary from mischief to the seeking of economic benefit, industrial spying and the harming of business. One can prepare against cybercrime with technical methods, by creating operating models, and training staff to identify threats. This thesis examines how cyber threats alone affect the business of companies, how threat related information is sought and what is afterwards done with this information, and what actions are taken on the basis of the threat assessment. Furthermore, we will investigate the effects of threat related information on the planning of business, products and services, as well as operating models. The thesis is divided into two parts; a survey of the literature and an empirical multiple case study. The survey of literature will form an overview of the cybercrime that targets companies, its effects on business, the field of threat, risk management, and cybersecurity leadership and organization. Utilizing the survey of literature, an informational groundwork was built for the multiple case study. In this way relevant themes for resolving the research problem could be estimated. The objects of the multiple case study were four companies of different sizes and industries. Twelve personal interviews were conducted. The interviewees represented the management of cybersecurity and data administration, business management, as well as other critical functions in a company. The results clearly show how cyber threats alone affect a company\u2019s different functions and their planning, regardless of whether the threat actualizes. The study shows how information regarding threats is procured and by what methods said information is further processed. Based on the results of the study, a model was created for processing the threat related information and its utilization. The study results may be utilized not only in further scientific study, but also for developing company procedures to improve cybersecurity and minimize harm caused by cybercrime.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2018-12-11T07:36:03Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2018-12-11T07:36:03Z (GMT). No. of bitstreams: 0\n Previous issue date: 2018", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "86", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "liiketoiminnan uhka", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "uhkatieto", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Kyberrikollisuuden uhkakuvat yritysten liiketoiminnalle", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201812115055", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "riskienhallinta", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberrikollisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "yritykset", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "uhat", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
|