fullrecord |
[{"key": "dc.contributor.advisor", "value": "Lehto, Martti", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Kilpi\u00e4inen, Juha", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2020-11-10T07:23:44Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2020-11-10T07:23:44Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2020", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/72549", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Nyky-yhteiskuntaamme on tullut olennainen lis\u00e4, teko\u00e4ly. Se koskettaa useita yhteis\u00f6mme eri osia ja on tullut tukemaan erityisesti modernia palveluyhteiskuntaamme. P\u00e4ivitt\u00e4in modernin palveluyhteiskuntamme useat eri palvelut hy\u00f6dynt\u00e4v\u00e4t teko\u00e4lyj\u00e4rjestelmi\u00e4. N\u00e4it\u00e4 ovat muun muassa tietoliikenne- pankki-, terveys- ja kaupanala sek\u00e4 s\u00e4hk\u00f6inen viestint\u00e4. S\u00e4hk\u00f6isess\u00e4 viestinn\u00e4ss\u00e4 erityisesti puhelin, televisio, radio, sosiaalinen media ja internet hy\u00f6dynt\u00e4v\u00e4t teko\u00e4ly\u00e4. Esill\u00e4 olevien positiivisten hy\u00f6tyjen lis\u00e4ksi teko\u00e4lykontekstissa on alkanut n\u00e4ky\u00e4 my\u00f6s negatiivisia vaikutuksia. Teko\u00e4ly kuten mik\u00e4\u00e4n muukaan ICT-j\u00e4rjestelm\u00e4 ei ole vastustuskykyinen toimijoille, jotka haluavat hy\u00f6dynt\u00e4\u00e4 sen haavoittuvuuksia omien tavoitteiden saavuttamiseksi. Teko\u00e4lyn kyberturvallisuusymp\u00e4rist\u00f6ss\u00e4 toimijan on ymm\u00e4rrett\u00e4v\u00e4, ett\u00e4 teko\u00e4lyll\u00e4 on haavoittuvuuksia, joita voidaan k\u00e4ytt\u00e4\u00e4 sit\u00e4 vastaan. T\u00e4m\u00e4 teko\u00e4lyn kielteinen hy\u00f6dynt\u00e4minen koskettaa niin julkispalveluita, suuryrityksi\u00e4 kuin yksil\u00f6it\u00e4.\nT\u00e4ss\u00e4 pro gradussa tutkitaan teko\u00e4lyn haavoittuvuuksia. Tutkimus on rajattu koskemaan teko\u00e4lyn haavoittuvuuksia, jotka esiintyv\u00e4t sen kybertoimintaymp\u00e4rist\u00f6ss\u00e4. Tutkimuksen kohdetta on syvennetty tarkastelemalla kybertoimintaymp\u00e4rist\u00f6ss\u00e4 esiintyvi\u00e4 hy\u00f6kk\u00e4yksi\u00e4 teko\u00e4ly\u00e4 vastaan.\nTutkimus on suuntautunut laadullisesti. Koska tutkimuskysymykseen liittyv\u00e4st\u00e4 ilmi\u00f6st\u00e4 on vain v\u00e4h\u00e4n teoriaa ja tutkimuskirjallisuutta, aineistonkeruumenetelm\u00e4n\u00e4 k\u00e4ytettiin erilaisiin dokumentteihin, raportteihin ja julkaistuun kirjallisuuteen perustuvaa tietoa.\nJohtop\u00e4\u00e4t\u00f6ksen\u00e4 teko\u00e4lyst\u00e4 l\u00f6ytyy haavoittuvuuksia oppimiseen, opettamiseen, koulutusmateriaaliin, algoritmeihin, tunnistustekniikoihin ja ymm\u00e4rrykseen liittyen. Haavoittuvuuksia on my\u00f6s koodi-, ohjelmisto- ja laitetasolla sek\u00e4 tietoverkoissa. Lis\u00e4ksi yh\u00e4 monimutkaisemmaksi muuttuvat teko-\u00e4lyj\u00e4rjestelm\u00e4kokonaisuudet korostavat n\u00e4ist\u00e4 koostuvien ratkaisujen haavoittuvuutta. Tutkimuksessa esille tuodut teko\u00e4lyn haavoittuvuudet ovat vain haasteita, jotka ymm\u00e4rr\u00e4mme teko\u00e4lyst\u00e4 t\u00e4n\u00e4\u00e4n. Teknologioiden kehittyess\u00e4 ja uusien k\u00e4ytt\u00f6tarkoitusten ilmaantuessa ei ole vaikea kuvitella tulevia uusia haavoittuvuuksia. Ne voivat jalostua esiin n\u00e4ist\u00e4 aiheista tai ilmaantua muualta.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "The everyday life of our modern society has changed considerably because of technological developments. In particular, artificial intelligence has become a significant factor in almost every sector of our society, including the sectors providing services for needs of society. In our daily life several different sectors of society and services utilize artificial intelligence systems. In the social sectors and services, such as telecommunications, banking, health and commerce, as well as telephone, television, radio, social media and the Internet, artificial intelligence plays a key role. In addition to the great benefits of artificial intelligence to our lives, negative effects have also begun to show up. Artificial intelligence, similar to ICT system, is not resilient to malicious actors who want to exploit its vulnerabilities to achieve their own goals. When operating in the cyber security environment of artificial intelligence, the actor must understand that artificial intelligence has vulnerabilities that can be exploited against it. This harmful use of artificial intelligence affects public services, large companies and individuals.\nThis Master's Thesis investigates the vulnerabilities of artificial intelligence. The research has been limited to the vulnerabilities of artificial intelligence that occur in the cyber-environment. The subject of the study has been deepened by to look into attacks against artificial intelligence in the cyber security environment.\nThe research is qualitatively oriented. As there is only a theory and research literature on the phenomenon available. Information was gathered from different sources such as various documents, reports and published literature.\nIn conclusion, there are vulnerabilities in artificial intelligence relating to learning, teaching, training materials, algorithms, recognition techniques and content understanding. There are also vulnerabilities in respect of codes, software, and hardware. as well as information networks. Moreover, the increasingly complex artificial intelligence system assemblies highlight the vulnerability of the solutions composed. The vulnerabilities of artificial intelligence discussed in the research are just challenges that we have found out about today\u00b4s artificial intelligence. As technologies evolve and new applications emerge, it is not difficult to imagine future new vulnerabilities. They can be refined from these subjects or they can appear out of nowhere.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2020-11-10T07:23:44Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2020-11-10T07:23:44Z (GMT). No. of bitstreams: 0\n Previous issue date: 2020", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "80", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "kybertoimintaymp\u00e4rist\u00f6", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Teko\u00e4lyn haavoittuvuudet kybertoimintaymp\u00e4rist\u00f6n n\u00e4k\u00f6kulmasta", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202011106589", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Kognitiotiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Cognitive Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "teko\u00e4ly", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "haavoittuvuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
|