fullrecord |
[{"key": "dc.contributor.advisor", "value": "Siponen, Mikko", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.advisor", "value": "J\u00e4rvinen, Janne", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Lankia, Otto", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2021-12-22T10:53:07Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2021-12-22T10:53:07Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2021", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/79139", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Ohjelmistorobotiikka on teknologia, joka soveltuu rutiininomaisten ty\u00f6teht\u00e4vien automatisoimiseen. T\u00e4m\u00e4n tutkielman tarkoituksena oli tutustua ohjelmistorobotiikan ominaispiirteisiin, sek\u00e4 syventy\u00e4 tarkastelemaan ohjelmistorobotiikan tietoturvaa ja sen hallintaan. Tavoitteena oli kartoittaa ohjelmistorobotiikkaan kohdistuvia tietoturvahaasteita sek\u00e4 l\u00f6yt\u00e4\u00e4 keinoja n\u00e4ihin haasteisiin vastaamiseksi. Tutkimus koostuu kirjallisuuskatsauksesta sek\u00e4 empiirisest\u00e4 osiosta, joka toteutettiin yksitt\u00e4isen\u00e4 tapaustutkimuksena. Tutkimusmateriaali ker\u00e4ttiin teemahaastattelujen avulla, jonka analysointiin sovellettiin teorial\u00e4ht\u00f6isen sis\u00e4ll\u00f6nanalyysin menetelm\u00e4\u00e4. Tutkimus osoitti, ett\u00e4 identiteetin- ja p\u00e4\u00e4synhallinnan kokonaisuus on merkitt\u00e4vin tekij\u00e4 ohjelmistorobotiikan tietoturvan hallinnan kannalta. Keskeisimm\u00e4t l\u00f6yd\u00f6kset liittyiv\u00e4t ohjelmistorobotin digitaalisen identiteetin elinkaareen ja sen hallintaan, salasanak\u00e4yt\u00e4nt\u00f6ihin, tunnistautumismenetelmiin sek\u00e4 ohjelmistorobotin k\u00e4ytt\u00f6oikeuksiin kohdej\u00e4rjestelmien sis\u00e4ll\u00e4. Muita ohjelmistorobotiikan tietoturvanhallintaan keskeisesti liittyvi\u00e4 teemoja olivat datan eheys, informaatioteknologian kuluttajistuminen sek\u00e4 tietosuoja. Tutkimus osoitti, ett\u00e4 keskeisi\u00e4 keinoja ohjelmistorobotiikan tietoturvan varmistamiseksi ovat organisaation tietoturvapolitiikan ja muiden tietoturvamallien ja -rakenteiden noudattaminen ja soveltaminen, eri sidosryhmien osallistaminen sek\u00e4 tietoisuuden lis\u00e4\u00e4minen organisaation sis\u00e4ll\u00e4.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Robotic process automation is a technology that is suitable for automating routine work tasks. The purpose of this study was to explore the characteristics of robotic process automation and focus on its information security and security management. The aim was to detect the security challenges of robotic process automation and to find ways to meet these challenges. This study consists of a literature review and an empirical section, which was conducted as a single case study. The research material was collected through thematic interviews, which were analyzed using the method of theory-based content analysis. The study showed that the area of identity and access management is the most significant factor in the security management of the robotic process automation. The main findings were related to the life cycle and management of software robot\u2019s digital identity, password policies, authentication methods, and software robot access rights within the target systems. Other important themes related to information security management in robotic process automation were data integrity, the consumerization of information technology, and data privacy. The study showed that applying the organization\u2019s security policy and other information security models is the main way to ensure the security of robotic process automation. Also, involvement of various stakeholders and increasing awareness within the organization are required to ensure proper information security management of robotic process automation.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Miia Hakanen (mihakane@jyu.fi) on 2021-12-22T10:53:07Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2021-12-22T10:53:07Z (GMT). No. of bitstreams: 0\n Previous issue date: 2021", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "66", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "ohjelmistorobotiikka", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "identiteetin- ja p\u00e4\u00e4synhallinta", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "datan eheys", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "informaatioteknologian kuluttajistuminen", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Ohjelmistorobotiikan tietoturvan hallinta", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202112226121", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.collaborator", "value": "business", "language": "", "element": "contractresearch", "qualifier": "collaborator", "schema": "yvv"}, {"key": "yvv.contractresearch.funding", "value": "8490", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "yvv.contractresearch.initiative", "value": "student", "language": "", "element": "contractresearch", "qualifier": "initiative", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietosuoja", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "robotiikka", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
|