fullrecord |
[{"key": "dc.contributor.advisor", "value": "Siponen, Mikko", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Lakka-Kolari, Jemina", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2021-06-02T08:52:55Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2021-06-02T08:52:55Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2021", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/76151", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Yritykset ja organisaatiot ovat yh\u00e4 h\u00e4ik\u00e4ilem\u00e4tt\u00f6m\u00e4mpien kyberiskujen kohteena. Moni yritys onkin huomioinut t\u00e4m\u00e4n kasvavan riskin, ja t\u00e4st\u00e4 syyst\u00e4 panostanut turvallisuuden lis\u00e4\u00e4miseen. Heikoimpana lenkkin\u00e4 kyberturvallisuudessa \non tunnetusti ollut ihminen. T\u00e4st\u00e4 syyst\u00e4 yritykset ja organisaatiot ostavatkin \nkoulutuksia valistaakseen ty\u00f6ntekij\u00f6it\u00e4\u00e4n minimoidakseen omia riskej\u00e4\u00e4n. Vastauksena t\u00e4h\u00e4n kysynt\u00e4\u00e4n moni yksityinen yritys on alkanut tarjoamaan maksullisia kyberturvallisuuteen liittyvi\u00e4 koulutuksia. T\u00e4ss\u00e4 tutkielmassa k\u00e4siteltiin \nyksityisten yritysten tarjoamia kyberturvallisuuskoulutuksia. Ilmi\u00f6t\u00e4 l\u00e4hestyttiin pedagogiikan kautta, ja tarkoituksena oli tunnistaa yrityksien k\u00e4ytt\u00e4mi\u00e4 \npedagogisia aspekteja. N\u00e4it\u00e4 aspekteja reflektoitiin kyberturvallisuuskoulutuksen sek\u00e4 aikuiskoulutuksen viitekehyksiin, jotta saatiin kattava k\u00e4sitys n\u00e4iden \naspektien sopivuudesta kyberturvallisuuden alalle sek\u00e4 aikuisten kouluttamiseen. Empiirinen aineisto ker\u00e4ttiin viidelt\u00e4 yritykselt\u00e4 verkkokyselyll\u00e4. Ainoa \nkriteeri yritykselle oli, ett\u00e4 he tarjoavat kyberturvallisuuskoulutusta Suomessa. \nMuilla tekij\u00f6ill\u00e4, kuten yrityksen koolla tai koulutuksen sis\u00e4ll\u00f6ll\u00e4, ei ollut merkityst\u00e4. Kysely toteutettiin hy\u00f6dynt\u00e4en sek\u00e4 laadullisia ett\u00e4 m\u00e4\u00e4r\u00e4llisi\u00e4 kysymyksi\u00e4, jotta kyettiin saamaan kattava k\u00e4sitys yrityksien koulutusten pedagogiikasta. T\u00e4ten tutkimus toteutettiin mixed method-tyylill\u00e4. Tutkimuksessa selvisi, ett\u00e4 yritykset l\u00e4hestyiv\u00e4t koulutuksia kolmesta eri n\u00e4k\u00f6kulmasta: (1) opiskelijal\u00e4ht\u00f6isyys, (2) sis\u00e4lt\u00f6l\u00e4ht\u00f6isyys, sek\u00e4 (3) ostajal\u00e4ht\u00f6isyys. T\u00e4m\u00e4n lis\u00e4ksi \nyritykset hy\u00f6dynsiv\u00e4t monenlaisia menetelmi\u00e4 opetuksessa. N\u00e4m\u00e4 metodit sek\u00e4 l\u00e4hestymistavat sopivat hyvin sek\u00e4 kyberturvallisuuden ett\u00e4 aikuiskasvatuksen viitekehyksiin. Asioita, jotka tunnistettiin olevan ristiriidassa m\u00e4\u00e4riteltyjen \nviitekehysten kanssa, olivat mm. kouluttajan rooli oppimisprosessissa sek\u00e4 koulutuksen tehokkuuden mittaristo. Tutkimusta ei suoraan voida n\u00e4hd\u00e4 validioivan yksityisten yritysten koulutuksien tehokkuutta, mutta sit\u00e4 voidaan hy\u00f6dynt\u00e4\u00e4 tulevaisuudessa t\u00e4llaista tehokkuutta mittaavan tutkimuksen teossa.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Companies and organizations are increasingly subject to unscrupulous cyber \nthreats. Many companies have acknowledged this growing risk, as well as invested in increasing safety. The weakest link in this security has identified to be \nhumans. For this reason, companies and organizations are willing to train their \nemployees to minimize their own risks. This has been noted as a business opportunity and many private companies are now offering paid cybersecurity \ntrainings. This dissertation dealt with cybersecurity training provided by private companies. The phenomenon was approached through pedagogy, with the \naim of identifying the pedagogical aspects used by companies. These aspects \nwere reflected on the frameworks of cybersecurity education and adult education in order to gain a comprehensive understanding of aspects\u2019 suitability to \nteach in the field of cyber security as well as adults. Empirical data was collected from five companies through an online survey. The only criterion for the \ncompany was that they offer cyber security training in Finland. Other factors, \nsuch as the size of the company or the content of the training, were not taken \ninto consideration. The survey was conducted using both qualitative and quantitative questions in order to gain a comprehensive understanding of the pedagogy used by the companies. Thus, the study was conducted as a mixed method research. The study found that companies approached training from three \ndifferent angles: (1) student-oriented, (2) content-oriented, and (3) customer-\noriented. In addition to this, companies utilized a wide variety of methods in \nteaching. These methods and approaches fit well into the frameworks of both \ncybersecurity and adult education. Issues that were seen to be contradicted to \nthe defined frameworks included the role of the educator in the learning process and the metrics for the effectiveness of the education. The research cannot \nbe directly seen to validate the effectiveness of private company training, but it \ncan be used in the future to conduct research measuring such effectiveness.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2021-06-02T08:52:55Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2021-06-02T08:52:55Z (GMT). No. of bitstreams: 0\n Previous issue date: 2021", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "73", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "eng", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.title", "value": "Pedagogical aspects in cyber security trainings offered by private companies", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202106023385", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "aikuiskoulutus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "koulutusyritykset", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "oppiminen", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "henkil\u00f6st\u00f6koulutus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "cyber security", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "adult education", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "training companies", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "learning", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "data security", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "personnel training", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
|