_version_ 1799744929268760576
annif_keywords_txtF_mv data security cyber security strategic leadership enterprises strategic planning
annif_uris_txtF_mv http://www.yso.fi/onto/yso/p5479 http://www.yso.fi/onto/yso/p26189 http://www.yso.fi/onto/yso/p5767 http://www.yso.fi/onto/yso/p3128 http://www.yso.fi/onto/yso/p13653
author Isokangas, Jyrki
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Tietojärjestelmätiede Information Systems Science 601
author_facet Isokangas, Jyrki Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Tietojärjestelmätiede Information Systems Science 601 Isokangas, Jyrki
author_sort Isokangas, Jyrki
building Jyväskylän yliopisto JYX-julkaisuarkisto
datasource_str_mv jyx
department_txtF Informaatioteknologia
faculty_txtF Informaatioteknologian tiedekunta
first_indexed 2021-05-18T20:04:34Z
format Pro gradu
format_ext_str_mv Opinnäyte Pro gradu
free_online_boolean 1
fullrecord <?xml version="1.0"?> <qualifieddc schemaLocation="http://purl.org/dc/terms/ http://dublincore.org/schemas/xmls/qdc/2006/01/06/dcterms.xsd http://purl.org/dc/elements/1.1/ http://dublincore.org/schemas/xmls/qdc/2006/01/06/dc.xsd"><title>Strategic cybersecurity analysis</title><creator>Isokangas, Jyrki</creator><contributor type="tiedekunta" lang="fi">Informaatioteknologian tiedekunta</contributor><contributor type="tiedekunta" lang="en">Faculty of Information Technology</contributor><contributor type="laitos" lang="fi">Informaatioteknologia</contributor><contributor type="laitos" lang="en">Information Technology</contributor><contributor type="yliopisto" lang="fi">Jyv&#xE4;skyl&#xE4;n yliopisto</contributor><contributor type="yliopisto" lang="en">University of Jyv&#xE4;skyl&#xE4;</contributor><contributor type="oppiaine" lang="fi">Tietoj&#xE4;rjestelm&#xE4;tiede</contributor><contributor type="oppiaine" lang="en">Information Systems Science</contributor><contributor type="oppiainekoodi">601</contributor><subject type="other">strategic</subject><subject type="other">analysis</subject><subject type="other">constructive research</subject><subject type="yso">p&#xE4;&#xE4;t&#xF6;ksenteko</subject><subject type="yso">kyberturvallisuus</subject><subject type="yso">kyberavaruus</subject><subject type="yso">uhat</subject><subject type="yso">kansallinen turvallisuus</subject><subject type="yso">verkkohy&#xF6;kk&#xE4;ykset</subject><subject type="yso">hybridisota</subject><subject type="yso">tieto- ja viestint&#xE4;tekniikka</subject><subject type="yso">decision making</subject><subject type="yso">cyber security</subject><subject type="yso">cyberspace</subject><subject type="yso">threats</subject><subject type="yso">national security</subject><subject type="yso">cyber attacks</subject><subject type="yso">hybrid warfare</subject><subject type="yso">information and communications technology</subject><available>2021-05-18T10:11:45Z</available><issued>2021</issued><type lang="fi">Pro gradu -tutkielma</type><type lang="en">Master&#x2019;s thesis</type><identifier type="uri">https://jyx.jyu.fi/handle/123456789/75718</identifier><identifier type="urn">URN:NBN:fi:jyu-202105182986</identifier><language type="iso">en</language><rights type="copyright" lang="fi">Julkaisu on tekij&#xE4;noikeuss&#xE4;&#xE4;nn&#xF6;sten alainen. Teosta voi lukea ja tulostaa henkil&#xF6;kohtaista k&#xE4;ytt&#xF6;&#xE4; varten. K&#xE4;ytt&#xF6; kaupallisiin tarkoituksiin on kielletty.</rights><rights type="copyright" lang="en">This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.</rights><permaddress type="urn">http://www.urn.fi/URN:NBN:fi:jyu-202105182986</permaddress><file bundle="ORIGINAL" href="https://jyx.jyu.fi/bitstream/123456789/75718/1/URN%3aNBN%3afi%3ajyu-202105182986.pdf" name="URN:NBN:fi:jyu-202105182986.pdf" type="application/pdf" length="1573554" sequence="1"/><recordID>123456789_75718</recordID></qualifieddc>
id jyx.123456789_75718
language eng
last_indexed 2024-05-13T20:01:36Z
main_date 2021-01-01T00:00:00Z
main_date_str 2021
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstream\/123456789\/75718\/1\/URN%3aNBN%3afi%3ajyu-202105182986.pdf","text":"URN:NBN:fi:jyu-202105182986.pdf","source":"jyx","mediaType":"application\/pdf"}
oppiainekoodi_txtF 601
publication_first_indexed 2021-05-18T20:04:34Z
publishDate 2021
record_format qdc
source_str_mv jyx
spellingShingle Isokangas, Jyrki Strategic cybersecurity analysis strategic analysis constructive research päätöksenteko kyberturvallisuus kyberavaruus uhat kansallinen turvallisuus verkkohyökkäykset hybridisota tieto- ja viestintätekniikka decision making cyber security cyberspace threats national security cyber attacks hybrid warfare information and communications technology
subject_txtF Kognitiotiede
thumbnail https://jyu.finna.fi/Cover/Show?source=Solr&id=jyx.123456789_75718&index=0&size=large
title Strategic cybersecurity analysis
title_full Strategic cybersecurity analysis
title_fullStr Strategic cybersecurity analysis Strategic cybersecurity analysis
title_full_unstemmed Strategic cybersecurity analysis Strategic cybersecurity analysis
title_short Strategic cybersecurity analysis
title_sort strategic cybersecurity analysis
title_txtP Strategic cybersecurity analysis
topic strategic analysis constructive research päätöksenteko kyberturvallisuus kyberavaruus uhat kansallinen turvallisuus verkkohyökkäykset hybridisota tieto- ja viestintätekniikka decision making cyber security cyberspace threats national security cyber attacks hybrid warfare information and communications technology
topic_facet analysis constructive research cyber attacks cyber security cyberspace decision making hybrid warfare hybridisota information and communications technology kansallinen turvallisuus kyberavaruus kyberturvallisuus national security päätöksenteko strategic threats tieto- ja viestintätekniikka uhat verkkohyökkäykset
url https://jyx.jyu.fi/handle/123456789/75718 http://www.urn.fi/URN:NBN:fi:jyu-202105182986
work_keys_str_mv AT isokangasjyrki strategiccybersecurityanalysis