fullrecord |
[{"key": "dc.contributor.advisor", "value": "Palonen, Teija", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Vidgren, Jiri", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2019-06-04T12:11:12Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2019-06-04T12:11:12Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2019", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/64333", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Kyberturvallisuuden integroiminen osaksi yrityksen kaikkia toimintoja, henkil\u00f6st\u00f6n kouluttaminen ja tietoisuuden lis\u00e4\u00e4minen vaativat yrityksen korkeimman johdon vastuunkantoa ja sitoutumista. Yritysjohdon t\u00e4rkeimp\u00e4n\u00e4 ty\u00f6kaluna yrityksen ohjaamiseen on yritysstrategia, joka on yrityksen kattavin kokonaissuunnitelma siit\u00e4, miten yritys suorittaa kokonaisteht\u00e4v\u00e4\u00e4ns\u00e4, eli missiota. T\u00e4m\u00e4n kirjallisuuskatsauksena toteutetun tutkielman tarkoituksena on selvitt\u00e4\u00e4, miten kyberturvallisuus ilmenee yritysstrategiassa ja millaisia hy\u00f6tyj\u00e4 kyberturvallisuuden integroinnilla yritysstrategiaan voidaan saavuttaa. Tutkielmassa tarkastellaan kyberturvallisuuden implementointia yritysstrategiaan, yrityksen johdon ja henkil\u00f6st\u00f6n roolia t\u00e4ss\u00e4 jatkuvaluonteisessa prosessissa sek\u00e4 yritysjohdon sitoutumista ja vastuunkantoa. Tutkielmassa luodaan katsaus kyberturvallisuuden yritysstrategisen implementoinnin vaikuttavuuden arviointiin ja saavutettaviin hy\u00f6tyihin. Kyberturvallisuuden implementointi yrityksen kokonaisstrategiaan viestii tehokkaalla tavalla koko yritysorganisaation henkil\u00f6st\u00f6lle, ett\u00e4 ylin johto on vastuullisesti sitoutunut yrityksen kyberturvallisuuden jatkuvaan yll\u00e4pitoon ja kehitt\u00e4miseen. Kyberturvallisuuden yritysstrategisesta integroinnista saavutettavista hy\u00f6dyist\u00e4 keskeisimpi\u00e4 ovat yrityksen parantunut suojaus kyberhy\u00f6kk\u00e4yksi\u00e4 vastaan, kyky yll\u00e4pit\u00e4\u00e4 toimintakyky\u00e4 muuttuvissa olosuhteissa, valmius kohdata h\u00e4iri\u00f6it\u00e4 ja kriisej\u00e4 sek\u00e4 koko organisaation tasoinen tietoisuus yrityksen kyberturvallisuudesta. Muita hy\u00f6tyj\u00e4 ovat muun muassa yritysimagon parantuminen ja sit\u00e4 kautta vaikutukset yrityksen arvostukseen my\u00f6s osakemarkkinoilla.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Integrating cyber security to all functions of the enterprise, educating the per-sonnel and increase awareness demands accountability and commitment from the top management of the organization. The most important tool of top management to steer the enterprise direction is corporate strategy, which is the most comprehensive plan about the execution of the overall mission. The purpose of this research conducted by literature review, is to clarify how the cyber security occurs in the corporate strategy and which kind of benefits are achievable by integrating cyber security in to the corporate strategy. In this research, we examine the occurrence of cyber security in corporate strategy, the role of the top management and the personnel of the enterprise in this sustained process as well as review the commitment and accountability of the top management. In addition, we create an overview to impact assessment and achievable profits of strategic implementation of cyber security. Implementing cyber security to corporate strategy communicates effectively to the personnel of the enterprise, that the top management is responsibly committed to continuous maintenance and development of cyber security in the enterprise. The clearest profits from the implementation of cyber security into the corporate strategy are improved resilience and the enterprise-wide awareness of the cyber security. Other profits are improved company public image and the effects from that regarding the valuation of the company in the stock exchange.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Miia Hakanen (mihakane@jyu.fi) on 2019-06-04T12:11:12Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2019-06-04T12:11:12Z (GMT). No. of bitstreams: 0\n Previous issue date: 2019", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "37", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.title", "value": "Kyberturvallisuus yritysstrategiassa", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201906042941", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "yritysstrategiat", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "yritykset", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "strateginen suunnittelu", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "strategiaty\u00f6", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|