fullrecord |
[{"key": "dc.contributor.advisor", "value": "Kypp\u00f6, Jorma", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Lehtovaara, Lassi", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2021-01-08T07:08:26Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2021-01-08T07:08:26Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2020", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/73551", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Turvallisuuskriittinen j\u00e4rjestelm\u00e4 on j\u00e4rjestelm\u00e4, jonka pett\u00e4minen tai ep\u00e4onnistuminen voi aiheuttaa ihmishenkien menetyst\u00e4 tai merkitt\u00e4v\u00e4\u00e4 haittaa ymp\u00e4rist\u00f6lle. J\u00e4rjestelmien kriittisyyden vuoksi yksi olennainen tekij\u00e4 turvallisuuskriittisiss\u00e4 j\u00e4rjestelmiss\u00e4 on niiden k\u00e4ytt\u00f6liittym\u00e4. Huonosti suunniteltu k\u00e4ytt\u00f6liittym\u00e4 voi johtaa siihen, ett\u00e4 k\u00e4ytt\u00e4j\u00e4 tekee virheen josta voi aiheutua haittaa ihmisille, omaisuudelle tai ymp\u00e4rist\u00f6lle. Ihminen on usein turvallisuuskriittisten j\u00e4rjestelmien heikoin lenkki, jonka takia ihmisen ja teknologian v\u00e4liseen vuorovaikutukseen tulisi panostaa t\u00e4llaisten kriittisten virheiden v\u00e4ltt\u00e4miseksi. T\u00e4m\u00e4 tutkielma keskittyy tutkimaan suunnittelussa huomioitavia asioita. Tutkielma on toteutettu systemaattisena kirjallisuuskatsauksena, jossa on k\u00e4ytetty l\u00e4htein\u00e4 ajankohtaisia ja aiheen kannalta merkitt\u00e4vi\u00e4 tieteellisi\u00e4 l\u00e4hteit\u00e4. Tutkielma pyrkii vastaamaan tutkimuskysymykseen: mit\u00e4 tulee huomioida turvallisuuskriittist\u00e4 k\u00e4ytt\u00f6liittym\u00e4\u00e4 suunnitellessa?", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "A safety-critical system is a system in which failure could cause loss of life or serious damage to the environment. Because of the critical nature of these systems, a crucial factor in a safety-critical system is the user interface. A badly designed user interface can cause the human operator to make a critical mistake that can then lead to the same result as stated above. A human is usually the weakest point in a safety-critical system which is the reason why organizations should invest in human-computer interaction to prevent these critical mistakes. This paper focuses on researching what are the things designers need to take into account when designing safety-critical systems. This paper is a systematic literature review and the sources used in this paper are the most relevant scientific papers and research for this topic. This paper focuses on finding an answer to the research question: what things to consider when designing safety-critical systems?", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2021-01-08T07:08:26Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2021-01-08T07:08:26Z (GMT). No. of bitstreams: 0\n Previous issue date: 2020", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "32", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "turvallisuuskriittiset j\u00e4rjestelm\u00e4t", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "K\u00e4ytt\u00f6liittym\u00e4suunnittelu turvallisuuskriittisiss\u00e4 j\u00e4rjestelmiss\u00e4", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202101081031", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "k\u00e4ytett\u00e4vyys", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "k\u00e4ytt\u00f6liittym\u00e4t", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|