fullrecord |
[{"key": "dc.contributor.advisor", "value": "Halttunen, Veikko", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Virolainen, Sirja", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2020-10-09T05:50:58Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2020-10-09T05:50:58Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2020", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/72076", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Nykyp\u00e4iv\u00e4n\u00e4 asiantuntijaorganisaatioissa k\u00e4sitell\u00e4\u00e4n suurta m\u00e4\u00e4r\u00e4\u00e4 tietoa, kuten heid\u00e4n asiakkaisiinsa ja ty\u00f6ntekij\u00f6ihin liittyv\u00e4\u00e4 sensitiivist\u00e4 tietoa. Erityisesti asiantuntijaorganisaatiot ovat hyvin riippuvaisia heid\u00e4n maineestaan ja luotettavuudesta asiakkaiden silmiss\u00e4, koska koko organisaation liiketoiminta perustuu asiakkaiden luottamukseen. Tietoturva on suurimpia organisaatioiden kohtaamia haasteita, ja monet yritykset vastaavat t\u00e4h\u00e4n haasteeseen erilaisin teknologiaratkaisuin. Identiteetin- ja p\u00e4\u00e4synhallinta on t\u00e4rke\u00e4 osa organisaation tietoturvaa, koska sen avulla voidaan taata organisaatioresursseihin p\u00e4\u00e4sy vain valtuutetuille k\u00e4ytt\u00e4jille. T\u00e4m\u00e4n tutkimuksen tavoitteena oli selvitt\u00e4\u00e4 identiteetin- ja p\u00e4\u00e4synhallintaan liittyvi\u00e4 riskej\u00e4 asiantuntijaorganisaatioissa. Tutkimus toteutettiin kirjallisuuskatsauksena ja empiirisen\u00e4 tutkimuksena, jolle kirjallisuuskatsaus muodostaa teoreettisen perustan. Tutkielma toteutettiin toimeksiantona kohdeorganisaatiolle. Kirjallisuuskatsauksen perusteella luotiin teemahaastattelurunko, jolla pyrittiin selvitt\u00e4m\u00e4\u00e4n erilaisia identiteetin- ja p\u00e4\u00e4synhallintaan liittyvi\u00e4 riskej\u00e4. Haastateltavina toimivat kohdeorganisaation asiantuntijat, joita tutkimukseen haastateltiin kymmenen. Haastateltavia valittiin kolmesta eri asiantuntijaryhmist\u00e4, joita olivat tietohallinnon asiantuntijat, identiteetin- ja p\u00e4\u00e4synhallinnan asiantuntijat ja sis\u00e4isen tietoturvan asiantuntijat. Haastattelun perusteella selvisi identiteetin- ja p\u00e4\u00e4synhallintaan liittyv\u00e4n runsaasti erilaisia riskej\u00e4. Tutkimuksessa esiin nousseet riskiteemat olivat manuaalisuus, hajautuneisuus, pilvipalveluihin liittyv\u00e4t riskit, keskitetyn identiteetin- ja p\u00e4\u00e4synhallinnan riskit, automaation riskit ja organisaation sis\u00e4iset riskit. Jokaiseen riskiteemaan tunnistettiin niin kirjallisuuskatsauksessa, kuin empiirisess\u00e4kin tutkimuksessa runsaasti riskej\u00e4. Identiteetin- ja p\u00e4\u00e4synhallintaan voidaan siis tutkielman perusteella liittyv\u00e4n runsaasti erilaisia riskej\u00e4, joita asiantuntijaorganisaatioiden tulee ottaa huomioon heid\u00e4n identiteetin- ja p\u00e4\u00e4synhallinnassa, etenkin pohdittaessa uuden ratkaisun valintaa ja hankintaa.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2020-10-09T05:50:58Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2020-10-09T05:50:58Z (GMT). No. of bitstreams: 0\n Previous issue date: 2020", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "91", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "identiteetin- ja p\u00e4\u00e4synhallinta", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "identiteetinhallinta", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "p\u00e4\u00e4synhallinta", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "keskitetty identiteetinhallinta", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Identiteetin- ja p\u00e4\u00e4synhallintaan liittyv\u00e4t riskit asiantuntijaorganisaatioissa", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202010096132", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.collaborator", "value": "business", "language": "", "element": "contractresearch", "qualifier": "collaborator", "schema": "yvv"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "yvv.contractresearch.initiative", "value": "student", "language": "", "element": "contractresearch", "qualifier": "initiative", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "riskit", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "automaatio", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "identiteetti", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "p\u00e4\u00e4synvalvonta", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
|