fullrecord |
[{"key": "dc.contributor.advisor", "value": "Lehto, Martti", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Palonen, Olli-Pekka", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2019-09-06T05:29:56Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2019-09-06T05:29:56Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2019", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/65430", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "T\u00e4ss\u00e4 tutkimuksessa tarkastellaan kyberturvallisuutta ja sen strategista johtamista valtion n\u00e4k\u00f6kulmasta. Tutkimuksen teoriaosuuden tarkoituksena oli selvitt\u00e4\u00e4 mit\u00e4 strateginen johtaminen on erityisesti kyberturvallisuuden kontekstissa. Tutkimuksen empiirisess\u00e4 osuudessa tutkittiin kansallisen tason kyberturvallisuuden johtamista kolmessa kyberturvallisuuden n\u00e4k\u00f6kulmasta tarkasteltuna k\u00e4rkivaltiossa. Tutkimuksessa pyrittiin my\u00f6s selvitt\u00e4m\u00e4\u00e4n, voidaanko tutkimustulosten perusteella l\u00f6yt\u00e4\u00e4 tekij\u00f6it\u00e4, joita voidaan jalostaa kansallisen kyberturvallisuuden kehitt\u00e4misajatuksiksi. Tutkimuksen aihe on t\u00e4rke\u00e4, koska sen avulla voidaan m\u00e4\u00e4ritt\u00e4\u00e4 kyberturvallisuuden strategista johtamista valtion tasolla sek\u00e4 sill\u00e4 voidaan l\u00f6yt\u00e4\u00e4 tutkittavien valtioiden johtamisesta tekij\u00f6it\u00e4, joita voidaan edelleen jalostaa kansallisen kyberturvallisuuden kehitt\u00e4miseksi. Tutkimuksen teoriaosuus sek\u00e4 empiirinen osuus toteutettiin aineistol\u00e4ht\u00f6ist\u00e4 sis\u00e4ll\u00f6nanalyysi\u00e4 k\u00e4ytt\u00e4en. Tutkimusmateriaali ker\u00e4ttiin julkisesti saatavissa olevista l\u00e4hteist\u00e4. Tutkimuksen teoriaosuudessa havaittiin, ett\u00e4 kyberturvallisuuden johtamisessa korostuu ajantasainen tilannetieto, toimijoiden v\u00e4linen yhteisty\u00f6, uhkien tunnistaminen ja niihin vastaaminen sek\u00e4 yhteiskunnan toimintojen jatkuvuuden varmistaminen ja niihin kohdistuvien h\u00e4iri\u00f6iden vaikutuksista palautuminen mahdollisimman nopeasti. Tutkimuksen empiirisess\u00e4 osiossa havaittiin, ett\u00e4 tarkastelluissa valtioissa kyberturvallisuutta tuotetaan kokonaisvaltaisesti kansainv\u00e4lisist\u00e4 yhteisty\u00f6kumppanuuksista yksityisiin kansalaisiin. Kokonaisvaltainen toiminnan koordinointi edellytt\u00e4\u00e4 riitt\u00e4vi\u00e4 toimivaltuuksia ja kehitt\u00e4minen riitt\u00e4vi\u00e4 resursseja ja investointeja. Lis\u00e4ksi organisaatiorakenteita pyrit\u00e4\u00e4n yksinkertaistamaan keskitt\u00e4m\u00e4ll\u00e4 t\u00e4rkeit\u00e4 toimintoja ja karsimalla sellaisia organisaatioita, joiden toimintaa voidaan yhdist\u00e4\u00e4 (Lehto 2018, 64).", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "This study examines cyber security and its strategic management from a state\nperspective. The purpose of the theoretical part of the study was to find out\nwhat strategic management is especially in the context of cyber security. The\nempirical part of the research explored cyber security at national level in three\ncyber security perspectives in the top state. The study also sought to find out\nwhether, on the basis of research results, there are factors that can be refined\ninto national cyber security development ideas. The subject of the study is important because it can be used to determine the strategic management of cyber\nsecurity at the state level, and it can find factors that can be further refined in\norder to develop national cyber security. The theoretical part of the research\nand the empirical part were carried out using data-based content analysis. The\nresearch material was collected from publicly available sources. In the theoretical part of the research, it was found that cyber security management emphasizes up-to-date situational information, co-operation between actors, identifying and responding to threats, and ensuring the continuity of social activities\nand restoring the impact of disruptions to them as quickly as possible. In the\nempirical part of the research, cyber security in the countries under review was\ncomprehensively produced from international partnerships with private citizens. Comprehensive coordination of activities requires adequate powers and\ndevelopment of adequate resources and investments. In addition, efforts are\nmade to simplify organizational structures by centralizing important activities\nand cutting down organizations that can be combined (Lehto 2018, 64).", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Miia Hakanen (mihakane@jyu.fi) on 2019-09-06T05:29:56Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2019-09-06T05:29:56Z (GMT). No. of bitstreams: 0\n Previous issue date: 2019", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "80", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "kansallinen kyberturvallisuus", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Kyberturvallisuuden johtaminen Virossa, Israelissa ja Alankomaissa : mit\u00e4 voimme oppia?", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201909064032", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "strateginen johtaminen", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
|