fullrecord |
[{"key": "dc.contributor.advisor", "value": "P\u00f6yh\u00f6nen, Jouni", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.advisor", "value": "Nuojua, Viivi", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Mustonen, Lassi", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2021-04-23T06:10:46Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2021-04-23T06:10:46Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2021", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/75170", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Kyberturvallisuudella mahdollistetaan modernien organisaatioiden digitaalinen toiminta ja sit\u00e4 kautta my\u00f6s yhteiskunnan toiminta. Keskeisess\u00e4 roolissa ovat organisaatiot, jotka toimivat kriittisen infrastruktuurin parissa. T\u00e4ss\u00e4 tapaustutkimuksessa tarkasteltiin kriittisen infrastruktuurin parissa toimivan organisaation kyberturvallisuuden hallintorakennetta. Organisaatiot voivat muodostaa kyberturvallisuuden hallintorakenteen monella tavalla. T\u00e4ss\u00e4 tutkimuksessa k\u00e4yd\u00e4\u00e4n l\u00e4pi yksi tapa, joka toimii hyvin t\u00e4m\u00e4n organisaation kontekstissa ja mahdollisesti my\u00f6s muissa organisaatioissa. Tutkimuksen tavoitteena on selvitt\u00e4\u00e4, miten kyberturvallisuuden hallintorakenne vaikuttaa kyberturvallisuuden hallintaan. Tutkimusta t\u00e4ydent\u00e4v\u00e4t alatutkimuskysymyksist\u00e4 muodostuvat n\u00e4k\u00f6kulmat viestinn\u00e4n ja tiedonhallinnan osalta. Tutkimuksen metodologinen l\u00e4hestyminen on laadullinen. Tutkimus toteutettiin tapaustutkimuksena keskisuuressa kriittisen infrastruktuurin parissa toimivassa organisaatiossa. Empiirinen aineisto hankittiin puoliksi rakenteellisten haastattelujen avulla. Haastatteluaineistoanalysoitiin temaattisella analyysill\u00e4. Empiiriseen aineistoon kuului my\u00f6s tutkittavan organisaation tietoturvaorganisaation rakennekaavio. Tutkimuksen tuloksissa nousi esiin kolme merkitt\u00e4v\u00e4\u00e4 l\u00f6yt\u00f6\u00e4. Organisaation toimijat, eli ihmiset ja ryhm\u00e4t, voidaan jakaa kolmelle p\u00e4\u00e4t\u00f6ksentekotasolle ja teknisen tai hallinnollisen tietoturvan puolelle. Toinen l\u00f6yt\u00f6 oli organisaation muodostamat yhteisty\u00f6ryhm\u00e4t, joissa oli edustusta kaikista p\u00e4\u00e4t\u00f6ksentekotasoista, sek\u00e4 tekniselt\u00e4 ett\u00e4 hallinnolliselta puolelta. Tutkimuksen kolmas l\u00f6yt\u00f6 liittyy l\u00e4heisesti yhteisty\u00f6ryhmiin ja se oli henkil\u00f6st\u00f6n osallistaminen kyberturvallisuuden toteutukseen.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Cybersecurity enables the digital operations of modern organizations and society. Organizations that work in critical infrastructure play a key role in ensuring the functioning of modern society. This case study examined the cybersecurity governance structure of an organization operating on critical infrastructure. Organizations can form a cybersecurity governance structure in multiple ways. This study reviews one specific way that works well in the context of this organization and possibly in other organizations. The study aims to find out how the structure of a cybersecurity management organization affects cybersecurity management. The research is complemented with sub-research questions regarding communication and knowledge-management. The methodological approach of the study is qualitative. The study is a case study in a medium-sized organization operating on critical infrastructure. The empirical material was obtained through semi-structural interviews, which were then analyzed by thematic analysis. The empirical material also contained an organizational chart of the organization's cybersecurity management structure. The results of the study revealed three significant findings. The actors in an organization i.e., people and groups, can be divided into three levels of decision making and technical or administrative cybersecurity. The second discovery was the co-operation groups formed by the organization. Groups had representation from all levels of decision-making and both the technical and the administrative sides of cybersecurity. The third finding of the study is closely related to the collaboration groups. It was the involvement of staff in the implementation of information security.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2021-04-23T06:10:46Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2021-04-23T06:10:46Z (GMT). No. of bitstreams: 0\n Previous issue date: 2021", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "69", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "hallintorakenne", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Kyberturvallisuuden hallintorakenteen toiminnan analyysi : tapaus kriittisen infrastruktuurin organisaatiossa", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202104232467", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietotekniikka", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Mathematical Information Technology", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "yvv.contractresearch.initiative", "value": "business", "language": "", "element": "contractresearch", "qualifier": "initiative", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "602", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "osallistaminen", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "organisaatiot", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tiedonhallinta", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tilannekuva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
|