Haktivismi kyberaktivismin välineenä

Haktivismiksi lueteltavia hyökkäyksiä tapahtuu paljon, mutta ilmiö on monelle täysin tuntematon. Haktivismin toimien kirjo on laaja, ja niiden vaikutukset voivat olla organisaatioille ja yritykselle merkittäviä. Haktivismi on kyberaktivismin kattotermin alle asettuva ilmiö, jolla tarkoitetaan hakker...

Full description

Bibliographic Details
Main Author: Orpana, Kristian
Other Authors: Informaatioteknologian tiedekunta, Faculty of Information Technology, Informaatioteknologia, Information Technology, Jyväskylän yliopisto, University of Jyväskylä
Format: Bachelor's thesis
Language:fin
Published: 2021
Subjects:
Online Access: https://jyx.jyu.fi/handle/123456789/77595
_version_ 1826225816500961280
author Orpana, Kristian
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_facet Orpana, Kristian Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Orpana, Kristian Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_sort Orpana, Kristian
datasource_str_mv jyx
description Haktivismiksi lueteltavia hyökkäyksiä tapahtuu paljon, mutta ilmiö on monelle täysin tuntematon. Haktivismin toimien kirjo on laaja, ja niiden vaikutukset voivat olla organisaatioille ja yritykselle merkittäviä. Haktivismi on kyberaktivismin kattotermin alle asettuva ilmiö, jolla tarkoitetaan hakkeroinniksi lueteltavien toimien hyödyntämistä kyberaktivismiin. Tutkimus on toteutettu kirjallisuuskatsauksena pyrkimyksenä tuottaa helposti ymmärrettävä katsaus haktivismiin. Kyberaktivismilla on tutkielmassa määritetty kyberympäristössä tapahtuvaksi aktivismiksi. Tämän kirjallisuuskatsauksen tavoitteena on koota eri lähteistä saatua tietoa haktivismista ja sen toteuttamistavoista sekä pyrkiä luomaan kuva haktivismin mahdollisista vaikutuksista. Kirjallisuuskatsauksessa käytettiin laajasti eri tutkimusalojen tutkimuksia, jotta haktivismista ja sen ilmiöistä saatiin kasattua tarpeeksi kattava kuva. Tutkimuksen lähteenä toimivat aihepiiriä käsittelevät akateemiset tutkimukset sekä kyberturvatoimijoiden julkaisemat raportit toteutuneista iskuista. Kirjallisuuskatsaus osoitti, että haktivismin vaikutukset voivat olla taloudellisesti merkittäviä kohteelle, mutta haktivismin tehoa kyberaktivismin keinona ei ole täysin pystytty määrittämään. Historiasta löytyy kuitenkin tapauksia, jossa haktivismilla on saatu aikaan jopa hallintoja kaataneita vaikutuksia. Hacktivism is a phenomenon that is unknown to many even though there has been a lot of attacks which can be identified as a hacktivist attack. Hacktivism includes a myriad of unique means that can have major impact on organizations and enterprises. Hacktivism fits under the umbrella term of cyberactivism and can be defined as a combination of hacking and activism. The term cyberactivism is defined in this study as activism that takes place in the cyberspace. This study is conducted as a literature review aiming to provide a clear overview on hacktivism. This literature review attempts to combine information from different sources to form a summary of hacktivism and different ways it can be implemented. Based on this information a view of possible impacts hacktivism can have will be formed. Source material from different fields of study were used to form a comprehensive perception of hacktivism. Academic articles about the subject matter and reports about past attacks from cyber security organizations were the main sources used in this literature review. This study concludes that the impact hacktivism can have can be economically significant to the target of the attack. Researchers haven’t been able to accurately determine the effect that hacktivism has as a means of cyberactivism. However there have even been events in history where hacktivism has been a factor in overthrowing a government.
first_indexed 2021-08-30T20:01:15Z
format Kandityö
free_online_boolean 1
fullrecord [{"key": "dc.contributor.advisor", "value": "R\u00e4is\u00e4nen, Jaana", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Orpana, Kristian", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2021-08-30T09:09:37Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2021-08-30T09:09:37Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2021", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/77595", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Haktivismiksi lueteltavia hy\u00f6kk\u00e4yksi\u00e4 tapahtuu paljon, mutta ilmi\u00f6 on monelle\nt\u00e4ysin tuntematon. Haktivismin toimien kirjo on laaja, ja niiden vaikutukset voivat\nolla organisaatioille ja yritykselle merkitt\u00e4vi\u00e4. Haktivismi on kyberaktivismin\nkattotermin alle asettuva ilmi\u00f6, jolla tarkoitetaan hakkeroinniksi lueteltavien\ntoimien hy\u00f6dynt\u00e4mist\u00e4 kyberaktivismiin. Tutkimus on toteutettu\nkirjallisuuskatsauksena pyrkimyksen\u00e4 tuottaa helposti ymm\u00e4rrett\u00e4v\u00e4 katsaus\nhaktivismiin. Kyberaktivismilla on tutkielmassa m\u00e4\u00e4ritetty kyberymp\u00e4rist\u00f6ss\u00e4\ntapahtuvaksi aktivismiksi. T\u00e4m\u00e4n kirjallisuuskatsauksen tavoitteena on koota eri\nl\u00e4hteist\u00e4 saatua tietoa haktivismista ja sen toteuttamistavoista sek\u00e4 pyrki\u00e4\nluomaan kuva haktivismin mahdollisista vaikutuksista.\nKirjallisuuskatsauksessa k\u00e4ytettiin laajasti eri tutkimusalojen tutkimuksia, jotta\nhaktivismista ja sen ilmi\u00f6ist\u00e4 saatiin kasattua tarpeeksi kattava kuva.\nTutkimuksen l\u00e4hteen\u00e4 toimivat aihepiiri\u00e4 k\u00e4sittelev\u00e4t akateemiset tutkimukset\nsek\u00e4 kyberturvatoimijoiden julkaisemat raportit toteutuneista iskuista.\nKirjallisuuskatsaus osoitti, ett\u00e4 haktivismin vaikutukset voivat olla taloudellisesti\nmerkitt\u00e4vi\u00e4 kohteelle, mutta haktivismin tehoa kyberaktivismin keinona ei ole\nt\u00e4ysin pystytty m\u00e4\u00e4ritt\u00e4m\u00e4\u00e4n. Historiasta l\u00f6ytyy kuitenkin tapauksia, jossa\nhaktivismilla on saatu aikaan jopa hallintoja kaataneita vaikutuksia.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Hacktivism is a phenomenon that is unknown to many even though there has\nbeen a lot of attacks which can be identified as a hacktivist attack. Hacktivism\nincludes a myriad of unique means that can have major impact on organizations\nand enterprises. Hacktivism fits under the umbrella term of cyberactivism and\ncan be defined as a combination of hacking and activism. The term\ncyberactivism is defined in this study as activism that takes place in the\ncyberspace. This study is conducted as a literature review aiming to provide a\nclear overview on hacktivism. This literature review attempts to combine\ninformation from different sources to form a summary of hacktivism and different\nways it can be implemented. Based on this information a view of possible\nimpacts hacktivism can have will be formed.\nSource material from different fields of study were used to form a\ncomprehensive perception of hacktivism. Academic articles about the subject\nmatter and reports about past attacks from cyber security organizations were\nthe main sources used in this literature review.\nThis study concludes that the impact hacktivism can have can be economically\nsignificant to the target of the attack. Researchers haven\u2019t been able to\naccurately determine the effect that hacktivism has as a means of\ncyberactivism. However there have even been events in history where\nhacktivism has been a factor in overthrowing a government.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2021-08-30T09:09:37Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2021-08-30T09:09:37Z (GMT). No. of bitstreams: 0\n Previous issue date: 2021", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "31", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "kyberaktivismi", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "haktivismi", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "internet-aktivismi", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Haktivismi kyberaktivismin v\u00e4lineen\u00e4", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202108304682", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "aktivismi", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "hakkerointi", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
id jyx.123456789_77595
language fin
last_indexed 2025-02-18T10:55:25Z
main_date 2021-01-01T00:00:00Z
main_date_str 2021
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstreams\/f63489ef-9f3a-47f5-a9cb-864f71b1e88f\/download","text":"URN:NBN:fi:jyu-202108304682.pdf","source":"jyx","mediaType":"application\/pdf"}
publishDate 2021
record_format qdc
source_str_mv jyx
spellingShingle Orpana, Kristian Haktivismi kyberaktivismin välineenä kyberaktivismi haktivismi internet-aktivismi Tietojärjestelmätiede Information Systems Science 601 aktivismi hakkerointi
title Haktivismi kyberaktivismin välineenä
title_full Haktivismi kyberaktivismin välineenä
title_fullStr Haktivismi kyberaktivismin välineenä Haktivismi kyberaktivismin välineenä
title_full_unstemmed Haktivismi kyberaktivismin välineenä Haktivismi kyberaktivismin välineenä
title_short Haktivismi kyberaktivismin välineenä
title_sort haktivismi kyberaktivismin välineenä
title_txtP Haktivismi kyberaktivismin välineenä
topic kyberaktivismi haktivismi internet-aktivismi Tietojärjestelmätiede Information Systems Science 601 aktivismi hakkerointi
topic_facet 601 Information Systems Science Tietojärjestelmätiede aktivismi hakkerointi haktivismi internet-aktivismi kyberaktivismi
url https://jyx.jyu.fi/handle/123456789/77595 http://www.urn.fi/URN:NBN:fi:jyu-202108304682
work_keys_str_mv AT orpanakristian haktivismikyberaktivisminvälineenä