fullrecord |
[{"key": "dc.contributor.advisor", "value": "R\u00e4is\u00e4nen, Jaana", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Luukkonen, Emma", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2021-01-28T06:44:23Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2021-01-28T06:44:23Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2021", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/73858", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Tietojenkalastelu on yksi ka\u0308ytettyimmista\u0308 ja toimivimmista kyberrikollisuuden muodoista ta\u0308na\u0308 pa\u0308iva\u0308na\u0308. Tietojenkalastelussa hyo\u0308kka\u0308a\u0308ja\u0308 pyrkii saamaan ka\u0308ytta\u0308ja\u0308n luovuttamaan arkaluontoista tietoa, joita ta\u0308ma\u0308 ka\u0308ytta\u0308a\u0308 hyva\u0308kseen hankkiakseen itselleen etua, joka on yleensa\u0308 taloudellista. Ta\u0308ssa\u0308 tutkielmassa perehdyta\u0308a\u0308n tietojenkalasteluun ja siihen, miten se toimii nykypa\u0308iva\u0308na\u0308 seka\u0308 miksi se yha\u0308 toimii niin tehokkaasti. Aihe on ta\u0308rkea\u0308, koska ensimma\u0308inen tietojenkalasteluhyo\u0308kka\u0308ys suoritettiin noin 25 vuotta sitten, mutta sen esta\u0308miseen ei ole viela\u0308ka\u0308a\u0308n keksitty tehokasta keinoa. Usein myo\u0308s virheellisesti mielleta\u0308a\u0308n, etta\u0308 tietojenkalastelu ei olisi nykyisin yhta\u0308 ka\u0308ytetty kyberrikollisuuden muoto, vaikka todellisuudessa tietojenkalastelun tuottamat voitot hyo\u0308kka\u0308a\u0308jille ovat kasvaneet esimerkiksi viimeisen kolmen vuoden aikana moninkertaisiksi. Tutkielma toteutettiin systemaattisena kirjallisuuskatsauksena ja tutkimusongelma oli \u201dMiksi tietojenkalastelu yha\u0308 toimii?\u201d. Ta\u0308ma\u0308n apuna ka\u0308ytettiin kysymyksia\u0308 \u201dMillaisin tavoin tietojenkalastelua suoritetaan nykypa\u0308iva\u0308na\u0308?\u201d ja \u201d Miten tietojenkalastelu vaikuttaa yhteiskuntaan ja yrityksiin?\u201d. Tutkimuksessa selvisi, etta\u0308 tietojenkalastelurikosten ma\u0308a\u0308ra\u0308 on kasvanut viime vuosina huomattavasti ja mukaan on tullut uusia vektoreita perinteisen sa\u0308hko\u0308postin rinnalle. Tietojenkalastelussa hyo\u0308dynneta\u0308a\u0308n paljon ka\u0308ytta\u0308ja\u0308n manipulaatiota ja erilaisia tapoja suorittaa tietojenkalastelua on monia. Selvisi myo\u0308s, etta\u0308 tietojenkalastelun toimivuus perustuu pitka\u0308lti psykologisiin tekijo\u0308ihin, joita kutsutaan vaikuttavuuden periaatteiksi. Tietojenkalastelu aiheuttaa yksilo\u0308ille ja yrityksille seka\u0308 taloudellisia etta\u0308 henkisia\u0308 menetyksia\u0308, esimerkiksi yksilo\u0308t kokevat paljon stressia\u0308 ja onnistuneet tietojenkalasteluhyo\u0308kka\u0308ykset voivat vaikuttaa yrityksen maineeseen. Ennaltaehka\u0308isyssa\u0308 ja suojautumisessa voidaan hyo\u0308dynta\u0308a\u0308 tietoisuuden lisa\u0308a\u0308mista\u0308 ja koulutusta seka\u0308 teknisia\u0308 ja\u0308rjestelmia\u0308. Tutkielma antaa kattavan yleiskuvan tietojenkalastelusta ta\u0308na\u0308 pa\u0308iva\u0308na\u0308, ja jatkotutkimusta voitaisiin tehda\u0308 esimerkiksi kaikista toimivimmista ihmisla\u0308hto\u0308isista\u0308 suojautumiskeinoista tai siita\u0308, millaisia uusia mahdollisuuksia uudet teknologiat kuten pilvipalvelut voivat tuoda hyo\u0308kka\u0308a\u0308jille.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2021-01-28T06:44:22Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2021-01-28T06:44:23Z (GMT). No. of bitstreams: 0\n Previous issue date: 2021", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "28", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "tietojenkalastelu", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "k\u00e4ytt\u00e4j\u00e4n manipulaatio", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Tietojenkalastelu ja miksi se yh\u00e4 toimii", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202101281317", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "restrictedAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "verkkourkinta", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberrikollisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietomurto", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "The author has not given permission to make the work publicly available electronically. Therefore the material can be read only at the archival workstation at Jyv\u00e4skyl\u00e4 University Library (https://kirjasto.jyu.fi/collections/archival-workstation).", "language": "en", "element": "rights", "qualifier": "accessrights", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "Tekij\u00e4 ei ole antanut lupaa avoimeen julkaisuun, joten aineisto on luettavissa vain Jyv\u00e4skyl\u00e4n yliopiston kirjaston arkistoty\u00f6semalta. Ks. https://kirjasto.jyu.fi/kokoelmat/arkistotyoasema..", "language": "fi", "element": "rights", "qualifier": "accessrights", "schema": "dc"}]
|