fullrecord |
[{"key": "dc.contributor.advisor", "value": "Riekkinen, Janne", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Suontausta, Samuel", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2020-06-26T06:12:03Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2020-06-26T06:12:03Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2020", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/70938", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Tietotekniikan k\u00e4ytt\u00f6 yleistyy jatkuvasti kaikilla yhteiskunnan ja el\u00e4m\u00e4n osa-\naluilla. T\u00e4m\u00e4n digitalisaation mukana tulee my\u00f6s monia ongelmia, kuten kybe-\nruhat, jotka kohdistuvat kybermaailmaan. Kyberturvallisuudella pyrit\u00e4\u00e4n varautumaan erilaiseen kyberuhkiin. Digitalisaation nopea eteneminen ja kiihtyv\u00e4 kasvuvauhti tuo kyberturvallisuudelle haasteita, kun kyberuhat yleistyv\u00e4t ja\nmuuttuvat digitalisaation mukana. Kybermaailmaan kohdistuneilla hy\u00f6kk\u00e4yksill\u00e4 kyet\u00e4\u00e4nkin nyky\u00e4\u00e4n aiheuttamaan suurta vahinkoa, joten kybertuvallisuudella on suuri rooli kaikilla yhteiskunnan osa-alueilla.\n\nT\u00e4ss\u00e4 kandidaatin tutkielmassa perehdyt\u00e4\u00e4n kyberturvallisuuteen ja siihen, miten sit\u00e4 voidaan johtaa strategisesti. Kyberturvallisuuden strategisella\njohtamisella kyet\u00e4\u00e4n hallitsemaan haastavia ja monimutkaisia kokonaisuuksia\nniin, ett\u00e4 monet kyberuhkien aiheuttamat riskit saadaan minimoitua. Strateginen johtaminen liitet\u00e4\u00e4n usein liiketoiminnan johtamiseen, mutta nyky\u00e4\u00e4n sill\u00e4\n\non suuri tarve my\u00f6s kyberturvallisuuden hallinnassa.\nStrategisella johtamisella kyet\u00e4\u00e4n sitouttamaan organisaation sis\u00e4iset ja\nulkoiset sidosryhm\u00e4t kyberturvallisuuden hallintaan. Strategisella johtamisella\n\nvoidaan my\u00f6s asettaa pidemm\u00e4n aikav\u00e4lin tavoitteita niin, ett\u00e4 toiminta kehittyy haluttuun suuntaan. Lis\u00e4ksi toiminnan seuranta ja sen analysointi tehostuu,\n\njolloin voidaan havaita puutteet ja n\u00e4in tehostaa toimintaa. Voidaankin tiivist\u00e4,\n\nett\u00e4 strateginen johtaminen tuo kyberturvallisuuden toimintaan tavoitteellisuutta, datan hy\u00f6dynt\u00e4mist\u00e4, toiminnan seuraamista ja se yhdist\u00e4\u00e4 koko organisaation toimimaan yhteisen tavoitteen hyv\u00e4ksi.\n\nTutkielma toteutettiin kirjallisuuskatsauksena ja tarkoituksena on esitell\u00e4\nkyberturvallisuuden johtamisen erityispiirteit\u00e4 ja miten strateginen johtaminen\nlinkittyy siihen. My\u00f6s kyberturvallisuuteen ja strategiaan pureudutaan yleisell\u00e4\ntasolla.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "The use of information technology is becoming more common in all areas of life\nand society. This so-called digitalization also comes with many problems, such\nas cyber threats that endanger the cyber world. Cyber security aims to prepare\n\nfor these various cyber threats. The rapid advancement of digitalization accelerating growth rate pose challenges to cyber security as cyber threats become\n\nmore common and these threats change with digitalization. Attacks on the\n\ncyber space are now likely to cause great damage, so cyber security plays a major in all areas of society.\n\nThis bachelor\u2019s thesis explores cyber security and how it can be managed\n\nstrategically. Strategic management of cyber security enable to manage challenging and complex entities so that many of the risks posed by cyber threats\n\ncan be minimized. Strategic management is often associated with business\n\nmanagement, but nowadays it also has a great need in cyber security management.\n\nWith strategic management it is possible to engage the organization\u2019s internal and external stakeholders in management of cyber security. Strategic\n\nmanagement can also set long-term goals so that operations develop in the desired direction. In addition, the monitoring and analysis of operations will be\n\nmore efficient, which will make it possible to identify shortcomings and thus\n\nincrease the efficiency of operations. It can be summarized that strategic management brings purposefulness to cyber security operations, data utilization,\n\nactivity monitoring and it unites the entire organization to work for common\ngoal.\nThis bachelor\u2019s thesis was carried out as a literature review and it aims to\npresent the specific features of cyber security management and how strategic\n\nmanagement is linked to it. Cyber security and strategy are also being addressed at a general level.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Miia Hakanen (mihakane@jyu.fi) on 2020-06-26T06:12:03Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2020-06-26T06:12:03Z (GMT). No. of bitstreams: 0\n Previous issue date: 2020", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "25", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.title", "value": "Kyberturvallisuuden strateginen johtaminen yrityksiss\u00e4", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202006265126", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "restrictedAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "johtaminen", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "yritykset", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "strateginen johtaminen", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "liikkeenjohto", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "The author has not given permission to make the work publicly available electronically. Therefore the material can be read only at the archival workstation at Jyv\u00e4skyl\u00e4 University Library (https://kirjasto.jyu.fi/en/workspaces/facilities).", "language": "en", "element": "rights", "qualifier": "accessrights", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "Tekij\u00e4 ei ole antanut lupaa avoimeen julkaisuun, joten aineisto on luettavissa vain Jyv\u00e4skyl\u00e4n yliopiston kirjaston arkistoty\u00f6semalta. Ks. https://kirjasto.jyu.fi/fi/tyoskentelytilat/laitteet-ja-tilat..", "language": "fi", "element": "rights", "qualifier": "accessrights", "schema": "dc"}]
|