_version_ 1799745232465559552
annif_keywords_txtF_mv computer programmes data security data systems software development software design
annif_uris_txtF_mv http://www.yso.fi/onto/yso/p26592 http://www.yso.fi/onto/yso/p5479 http://www.yso.fi/onto/yso/p3927 http://www.yso.fi/onto/yso/p21530 http://www.yso.fi/onto/yso/p27066
author Väyrynen, Aino-Maria Räisänen, Elina
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Tietojenkäsittelytiede Computer Science 601
author_facet Väyrynen, Aino-Maria Räisänen, Elina Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Tietojenkäsittelytiede Computer Science 601 Väyrynen, Aino-Maria Räisänen, Elina
author_sort Väyrynen, Aino-Maria
building Jyväskylän yliopisto JYX-julkaisuarkisto
datasource_str_mv jyx
department_txtF Informaatioteknologia
faculty_txtF Informaatioteknologian tiedekunta
first_indexed 2020-05-28T20:00:48Z
format Pro gradu
format_ext_str_mv Opinnäyte Maisterivaiheen työ
free_online_boolean 1
fullrecord <?xml version="1.0"?> <qualifieddc schemaLocation="http://purl.org/dc/terms/ http://dublincore.org/schemas/xmls/qdc/2006/01/06/dcterms.xsd http://purl.org/dc/elements/1.1/ http://dublincore.org/schemas/xmls/qdc/2006/01/06/dc.xsd"><title>Secure software design and development : towards practical models for implementing information security into the requirements engineering process</title><creator>V&#xE4;yrynen, Aino-Maria</creator><creator>R&#xE4;is&#xE4;nen, Elina</creator><contributor type="tiedekunta" lang="fi">Informaatioteknologian tiedekunta</contributor><contributor type="tiedekunta" lang="en">Faculty of Information Technology</contributor><contributor type="laitos" lang="fi">Informaatioteknologia</contributor><contributor type="laitos" lang="en">Information Technology</contributor><contributor type="yliopisto" lang="fi">Jyv&#xE4;skyl&#xE4;n yliopisto</contributor><contributor type="yliopisto" lang="en">University of Jyv&#xE4;skyl&#xE4;</contributor><contributor type="oppiaine" lang="fi">Tietojenk&#xE4;sittelytiede</contributor><contributor type="oppiaine" lang="en">Computer Science</contributor><contributor type="oppiainekoodi">601</contributor><subject type="other">security requirements</subject><subject type="other">turvallisuusvaatimukset</subject><subject type="yso">vaatimusm&#xE4;&#xE4;rittelyt</subject><subject type="yso">tietoturva</subject><subject type="yso">kyberturvallisuus</subject><subject type="yso">ohjelmistokehitys</subject><subject type="yso">vaatimustenhallinta</subject><subject type="yso">requirement specifications</subject><subject type="yso">data security</subject><subject type="yso">cyber security</subject><subject type="yso">software development</subject><subject type="yso">requirements engineering</subject><available>2020-05-28T10:40:52Z</available><issued>2020</issued><type lang="en">Master&#x2019;s thesis</type><type lang="fi">Pro gradu -tutkielma</type><identifier type="uri">https://jyx.jyu.fi/handle/123456789/69275</identifier><identifier type="urn">URN:NBN:fi:jyu-202005283532</identifier><language type="iso">en</language><rights type="copyright" lang="fi">Julkaisu on tekij&#xE4;noikeuss&#xE4;&#xE4;nn&#xF6;sten alainen. Teosta voi lukea ja tulostaa henkil&#xF6;kohtaista k&#xE4;ytt&#xF6;&#xE4; varten. K&#xE4;ytt&#xF6; kaupallisiin tarkoituksiin on kielletty.</rights><rights type="copyright" lang="en">This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.</rights><permaddress type="urn">http://www.urn.fi/URN:NBN:fi:jyu-202005283532</permaddress><file bundle="ORIGINAL" href="https://jyx.jyu.fi/bitstream/123456789/69275/1/URN%3aNBN%3afi%3ajyu-202005283532.pdf" name="URN:NBN:fi:jyu-202005283532.pdf" type="application/pdf" length="3066922" sequence="1"/><recordID>123456789_69275</recordID></qualifieddc>
id jyx.123456789_69275
language eng
last_indexed 2024-05-13T20:04:12Z
main_date 2020-01-01T00:00:00Z
main_date_str 2020
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstream\/123456789\/69275\/1\/URN%3aNBN%3afi%3ajyu-202005283532.pdf","text":"URN:NBN:fi:jyu-202005283532.pdf","source":"jyx","mediaType":"application\/pdf"}
oppiainekoodi_txtF 601
publication_first_indexed 2020-05-28T20:00:48Z
publishDate 2020
record_format qdc
source_str_mv jyx
spellingShingle Väyrynen, Aino-Maria Räisänen, Elina Secure software design and development : towards practical models for implementing information security into the requirements engineering process security requirements turvallisuusvaatimukset vaatimusmäärittelyt tietoturva kyberturvallisuus ohjelmistokehitys vaatimustenhallinta requirement specifications data security cyber security software development requirements engineering
subject_txtF Kognitiotiede
thumbnail https://jyu.finna.fi/Cover/Show?source=Solr&id=jyx.123456789_69275&index=0&size=large
title Secure software design and development : towards practical models for implementing information security into the requirements engineering process
title_full Secure software design and development : towards practical models for implementing information security into the requirements engineering process
title_fullStr Secure software design and development : towards practical models for implementing information security into the requirements engineering process Secure software design and development : towards practical models for implementing information security into the requirements engineering process
title_full_unstemmed Secure software design and development : towards practical models for implementing information security into the requirements engineering process Secure software design and development : towards practical models for implementing information security into the requirements engineering process
title_short Secure software design and development
title_sort secure software design and development towards practical models for implementing information security into the requirements engineering process
title_sub towards practical models for implementing information security into the requirements engineering process
title_txtP Secure software design and development : towards practical models for implementing information security into the requirements engineering process
topic security requirements turvallisuusvaatimukset vaatimusmäärittelyt tietoturva kyberturvallisuus ohjelmistokehitys vaatimustenhallinta requirement specifications data security cyber security software development requirements engineering
topic_facet cyber security data security kyberturvallisuus ohjelmistokehitys requirement specifications requirements engineering security requirements software development tietoturva turvallisuusvaatimukset vaatimusmäärittelyt vaatimustenhallinta
url https://jyx.jyu.fi/handle/123456789/69275 http://www.urn.fi/URN:NBN:fi:jyu-202005283532
work_keys_str_mv AT väyrynenainomaria securesoftwaredesignanddevelopmenttowardspracticalmodelsforimplementinginforma