fullrecord |
[{"key": "dc.contributor.advisor", "value": "Lehto, Martti", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "J\u00e4rvinen, Heikki", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2020-05-25T07:04:24Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2020-05-25T07:04:24Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2020", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/69152", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Tutkimuksessa selvitettiin Yritys X:n kyberturvallisuuteen liittyvi\u00e4 avainkompetenssialueita. Tutkimus toisti aiemmin Jyv\u00e4skyl\u00e4n yliopistossa samasta aiheesta tehdyn tutkimuksen tutkimusasetelman, mutta eri toimialalla. Tutkimuksen teoreettisena viitekehyksen\u00e4 k\u00e4ytettiin amerikkalaista National Institute of Standards and Technologyn (NIST) kehitt\u00e4m\u00e4\u00e4 kyberturvallisuuden osaamista kuvaavaa ja luokittelevaa NCWF-viitekehyst\u00e4.\n\nTutkimuksen kirjallisuuskatsauksessa selvitettiin kyberturvallisuuden osaamiseen liittyvi\u00e4 yleisi\u00e4 viitekehyksi\u00e4. Katsaus keskittyi kohdeyrityksess\u00e4 k\u00e4yt\u00f6ss\u00e4 oleviin tai muutoin yleisesti tunnettuihin kyberturvallisuuden hallinta- j\u00e4rjestelmiin ja standardeihin sek\u00e4 kompetenssien kehitt\u00e4misen ty\u00f6kaluihin ja viitekehyksiin. Tutkimus toteutettiin laadullisena tapaustutkimuksena ja aineistonkeruumenetelm\u00e4n\u00e4 k\u00e4ytettiin teemahaastatteluita. Haastatteluiden lis\u00e4ksi tutustuttiin my\u00f6s kohdeyrityksen laatuj\u00e4rjestelm\u00e4\u00e4n, turvallisuuspolitiikkaan ja turvallisuuteen liittyviin ohjeisiin.\n\nTutkimuksen teemahaastattelut toteutettiin kahtena erillisen\u00e4 et\u00e4haastatteluna. Ensimm\u00e4isess\u00e4 haastattelussa haastateltiin kohdeyrityksen turvallisuusyksik\u00f6n johtajaa ja toisessa ICT-yksik\u00f6n johtajaa. Molemmat haastattelut tallennettiin ja tallenteet litteroitiin. Litteroidut aineistot luokiteltiin ja analysoitiin k\u00e4ytt\u00e4en teorial\u00e4ht\u00f6isen sis\u00e4lt\u00f6analyysin periaatteita ja NCWF-viitekehyst\u00e4.\n\nTutkimustuloksista muodostettiin kohdeyrityksen kyberturvallisuuden ydinkompetenssiesitys. Saatuja tutkimustuloksia vertailtiin my\u00f6s aiemman tutkimuksen tuloksiin. Tutkimusten vertailun avulla pyrittiin laajentamaan kyberturvallisuuden osaamiseen liittyv\u00e4\u00e4 yleist\u00e4 ymm\u00e4rryst\u00e4 ja tietoa.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "This study examined the cyber security core competence areas at the Company X. In addition to case study approach this study replicated also a previous study research setting. That previous study examined also cyber security core competences, but in a different business sector. Both studies were conducted in the University of Jyv\u00e4skyl\u00e4 and they both utilized the same competence framework, which was the NCWF framework, by the National Institute of Standards and Technology (NIST). The framework was used as a theoretical framework to ex- amine and categorize the cyber competences in the research setting. \n\nThe literature view of this study examined overall cyber security competence frameworks along with other general cyber security standards and tools used to operate, develop and maintain cyber security competences, systems and operations in organizations. The research was conducted as qualitative study with case study approach. The research data was gathered with theme interviews. Along with the interviews also quality system, security policies and security guidance of the research target were examined. \n\nResearch interviews were conducted as two separate interviews. First inter- view was done with the Chief Security Officer of the Company X and the second with the Chief Information Officer. Both interviews were conducted remotely and recorded. Recordings were transcribed and analyzed with theory-based con- tent analysis and NCWF framework. \n\nBased on the findings the study presented a cyber security core competence model for the research target company. Study findings were also compared to previous study findings. With that comparison, this study aimed to enhance the general understanding and the body of knowledge in the field of cyber security competences.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2020-05-25T07:04:24Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2020-05-25T07:04:24Z (GMT). No. of bitstreams: 0\n Previous issue date: 2020", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "68", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "ydinkompetenssi", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "NCWF", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kyberosaaminen", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kyberkompetenssi", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Kyberturvallisuuden nykyiset ja tulevat osaamistarpeet ohjelmistoyrityksess\u00e4 : tapaustutkimus", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202005253405", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietojenk\u00e4sittelytiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Computer Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.collaborator", "value": "business", "language": "", "element": "contractresearch", "qualifier": "collaborator", "schema": "yvv"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "yvv.contractresearch.initiative", "value": "student", "language": "", "element": "contractresearch", "qualifier": "initiative", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "ydinosaaminen", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "osaaminen", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "yritykset", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tutkimus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kompetenssi", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kehitt\u00e4minen", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "ammattitaito", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
|