fullrecord |
[{"key": "dc.contributor.advisor", "value": "Pekka Abrahamsson, Ville Vakkuri", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "M\u00e4\u00e4tt\u00e4, Krista", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2021-05-28T11:54:31Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2021-05-28T11:54:31Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2021", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/76041", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Lohkoketjuteknologialla tarkoitetaan teknologiaa, joka mahdollistaa hajautetun ja l\u00e4pin\u00e4kyv\u00e4n tietokannan, jossa toisilleen tuntemattomat tahot voivat toimia kesken\u00e4ns\u00e4 luotettavasti ilman erillist\u00e4 v\u00e4lik\u00e4ten\u00e4 toimivaa kolmatta osapuolta. Lohkoketjuteknologiaa voidaan hy\u00f6dynt\u00e4\u00e4 useiden eri alojen IT-j\u00e4rjestelmiss\u00e4 kolmannen osapuolen poistajana. Lohkoketjusovelluksien m\u00e4\u00e4r\u00e4 on kasvussa ja tarve n\u00e4iden sovellusten luotettavuudelle on kriittinen, sill\u00e4 niiss\u00e4 k\u00e4sitell\u00e4\u00e4n usein arkaluonteista dataa. Lohkoketjuteknologian keskeisimm\u00e4t ominaisuudet ovat sen hajautuneisuus, muuttumattomuus, l\u00e4pin\u00e4kyvyys ja turvallisuus. T\u00e4m\u00e4n tutkielman tavoitteena oli selvitt\u00e4\u00e4, millainen eettisesti luotettava lohkoketjusovellus on, kuinka sellaista pyrit\u00e4\u00e4n kehitt\u00e4m\u00e4\u00e4n ja kuinka t\u00e4m\u00e4 toteutuu k\u00e4yt\u00e4nn\u00f6ss\u00e4. Tutkielma toteutettiin kahdessa osassa, integroivana kirjallisuuskatsauksena ja tapaustutkimuksena, joista j\u00e4lkimm\u00e4iseen sovellettiin sek\u00e4 haastattelututkimusta ett\u00e4 grounded theory - menetelm\u00e4\u00e4. Johtop\u00e4\u00e4t\u00f6kset koottiin tutkimuksen molempien osioiden tuloksista. Johtop\u00e4\u00e4t\u00f6sten mukaan lohkoketjuteknologian erityisominaisuudet tukevat luotettavuuden muodostumista j\u00e4rjestelm\u00e4ss\u00e4, ja implementoimalla lohkoketju osaksi IT-j\u00e4rjestelm\u00e4\u00e4 voidaan parantaa j\u00e4rjestelm\u00e4n luotettavuutta. Lis\u00e4ksi havaittiin, ett\u00e4 luotettavien lohkoketjusovellusten kehitt\u00e4misen alalle tarvitaan lis\u00e4\u00e4 lohkoketjuspesifej\u00e4 ty\u00f6kaluja, menetelmi\u00e4 ja resursseja.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Blockchain technology refers to a technology that enables a decentralized and transparent database in which unknown parties can interact reliably with each other without a separate intermediary third party. Blockchain technology can be used in IT systems of different fields to eliminate the third party. The number of blockchain applications is growing and the need for the trustworthiness of those applications is critical, as they often process sensitive data. The key features of blockchain technology are its decentralization, immutability, transparency, and security. The main goal of this master\u2019s thesis was to research how trustworthy blockchain applications are developed and which factors establish trustworthiness in the context of blockchain technology. This research was conducted as an integrative literature review and a case study, in which both interview study and grounded theory methods were applied to the case study part. Primary empirical conclusions were concluded from the results of both parts of the study. According to these conclusions specific features of blockchain technology support the formation of trustworthiness in the system, and the implementing blockchain into the IT system will result as an improvement of the trustworthiness in that system. In addition, it was found that more blockchain-specific tools, methods, and resources are needed for the field of developing trustworthy blockchain applications.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2021-05-28T11:54:31Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2021-05-28T11:54:31Z (GMT). No. of bitstreams: 0\n Previous issue date: 2021", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "111", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.title", "value": "Luotettavan lohkoketjusovelluksen kehitt\u00e4minen", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202105283286", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietotekniikka", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Mathematical Information Technology", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "602", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "luotettavuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "lohkoketjut", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "teko\u00e4ly", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "ohjelmistokehitys", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "etiikka", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
|