fullrecord |
[{"key": "dc.contributor.advisor", "value": "Siponen, Mikko", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Ritola, Jouni", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2022-05-11T05:38:51Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2022-05-11T05:38:51Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2022", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/80979", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Tutkijat pyrkiv\u00e4t selitt\u00e4m\u00e4\u00e4n reaalimaailman loogisia tapahtumia syy-seuraussuhteella, jossa toimintaa seuraa vastatoiminta. Syy-seuraussuhteen lis\u00e4ksi osalle onnettomuuksia on olemassa toinenkin selitys. T\u00e4m\u00e4 selitys perustuu teoriaan, jonka mukaisesti v\u00e4ist\u00e4m\u00e4t\u00f6n katastrofi on sis\u00e4\u00e4n rakennettu kompleksisiin j\u00e4rjestelmiin. \nT\u00e4ss\u00e4 tutkimuksessa osoitetaan, miten kompleksisen j\u00e4rjestelmist\u00e4 koostuvan kyberj\u00e4rjestelm\u00e4n komponentit ovat viritt\u00e4ytyneet itseorganisoidun kriittisyyden (Self-Organized Criticality, SOC) tilaan ja miten n\u00e4iden komponenttien h\u00e4iri\u00f6t aiheuttavat laajavaikutteisen normaalin onnettomuuden (Normal Accident Theory, NAT). Tutkimuksessa t\u00e4t\u00e4 v\u00e4ist\u00e4m\u00e4t\u00f6nt\u00e4 kyberonnettomuutta kutsutaan kybervy\u00f6ryksi. \nTutkimus jakautuu kolmeen loogiseen kokonaisuuteen, joista ensimm\u00e4isess\u00e4 k\u00e4sitell\u00e4\u00e4n kybermaailmaa ja kompleksista j\u00e4rjestelm\u00e4\u00e4 monista n\u00e4k\u00f6kulmista ja m\u00e4\u00e4ritet\u00e4\u00e4n tutkimuksen kannalta merkitt\u00e4vimm\u00e4t k\u00e4sitteet. Luvussa kuvataan kybermaailmaa uhkaavat uhat ja rakennetaan t\u00e4t\u00e4 kuvaava viitekehys. Toinen luku sis\u00e4lt\u00e4\u00e4 kolme onnettomuuksia kuvaavaa teoriaa, jotka analysoidaan hermeneuttisen k\u00e4siteanalyysin keinoin edellisen luvun viitekehyksen kautta katsottuna. Kolmannessa luvussa k\u00e4sitemallit konstruoidaan yhdeksi kybervy\u00f6ry\u00e4 kuvaavaksi kokonaisteoriaksi ja vastataan tutkimuskysymykseen: Miksi kyberonnettomuuksia tapahtuu?", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Scientists tries to explain logical events in the real world with a cause-and-effect relationship where action comes with reaction. In addition to the cause-and-effect relationship, there is another explanation for some of the accidents. This explanation is based on the theory that the inevitable catastrophe is built into complex systems.\nThis study demonstrates how cyber system can be treated like complex system of systems and how components of a that system are tuned into a state of self-organized criticality (SOC). Study shows how incidents of these com-ponents causes disastrous normal accident (Normal Accident Theory, NAT). In this study, this inevitable cyber-accident is called a cyber avalanche.\nThis study is divided into three logical parts. First one explains the cy-berspace and the complex system from many perspectives and defines the most important concepts for this study. It also describes the threats to the cy-berspace and builds a framework to describe this. The second part contains three accident theories, which are analyzed using hermeneutic conceptual analysis as a method. Theories are viewed through the framework from the previous part. In the third chapter, the conceptual models are constructed as one overall theory describing the cyber avalanche. At the end study uses this theory of cyber avalanche to answer the research question: Why do cyber accidents happen?", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2022-05-11T05:38:51Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2022-05-11T05:38:51Z (GMT). No. of bitstreams: 0\n Previous issue date: 2022", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "87", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "kyberymp\u00e4rist\u00f6", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "normaalien onnettomuuksien teoria NAT", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "itseorganisoitunut kriittisyys SOC", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "voimalaki", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kybervy\u00f6ry", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Kybervy\u00f6ry", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202205112629", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Kyberturvallisuus", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Kyberturvallisuus", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "turvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "verkkohy\u00f6kk\u00e4ykset", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tutkimus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoverkot", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "onnettomuudet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "teoriat", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "Internet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoj\u00e4rjestelm\u00e4t", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "k\u00e4sitteet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
|