fullrecord |
[{"key": "dc.contributor.advisor", "value": "Lehto, Martti", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Laakso, Sanna", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2023-02-20T11:57:18Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2023-02-20T11:57:18Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2023", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/85545", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Kybertoimintaymp\u00e4rist\u00f6 laajenee koko ajan kattaen yh\u00e4 suuremman osan maailmasta. Kehitys haastaa strategista johtamista, jota on kehitetty Suomessa vasta\nverrattain v\u00e4h\u00e4n aikaa. Aiemmat tutkimukset ovat osoittaneet, ett\u00e4 johtamisen\nkehitt\u00e4miselle ja koordinoinnille on ollut tarvetta. Hidas ja liiaksi siiloutunut johtamisen malli ei ole vastannut nykyp\u00e4iv\u00e4n tarpeisiin. Kansainv\u00e4linen kehitys tuo\nSuomen osaksi uusia yhteisty\u00f6alustoja ja n\u00e4m\u00e4 tekij\u00e4t huomioiden on t\u00e4rke\u00e4\u00e4,\nett\u00e4 johtamista kehitet\u00e4\u00e4n oikeaan ja tehokkaaseen suuntaan. Tutkielman tavoitteena on laajentaa ja tuoda yhteen kyberturvallisuuden strategisesta johtamisesta\njo olemassa olevaa tutkimustietoa ja perehty\u00e4 Suomen kyberturvallisuuden eri\nosa-alueiden kehitykseen johtamisen n\u00e4k\u00f6kulmasta. Tutkimusaineisto koostui\nerilaisista kyberturvallisuuden johtamiseen liittyvist\u00e4 tutkimuksista ja Sanna\nMarinin hallituskaudella tehdyist\u00e4 valtioneuvoston selonteoista. Kansainv\u00e4lisess\u00e4 vertailussa aineistoa ker\u00e4ttiin Yhdysvaltojen, Ruotsin ja Viron osalta. Ker\u00e4tyst\u00e4 aineistosta analysoitiin kvalitatiivisen sis\u00e4ll\u00f6nanalyysin keinoin kyberturvallisuuden johtamisen toteuttamista. Tuloksista selvi\u00e4\u00e4, ett\u00e4 kyberturvallisuuden kansainv\u00e4linen kehitys ei noudata yht\u00e4 trendi\u00e4, vaikka pieni\u00e4 viitteit\u00e4 johtamisen keskitt\u00e4misest\u00e4 on havaittavissa. Kyberturvallisuuden johtamista kehitet\u00e4\u00e4n Suomessa tietoon pohjautuen, ja muutokset ovat olleet erityisesti kuluvalla\nhallituskaudella kohtalaisen merkitt\u00e4vi\u00e4, joskaan eiv\u00e4t t\u00e4ysin asiantuntijasuositusten mukaisia. Digitaalinen turvallisuus ja kyberturvallisuus tarvitsevat k\u00e4sitteellist\u00e4 selkiytt\u00e4mist\u00e4. Kyberturvallisuuden johtamisen kehitys Suomessa noudattelee osin kansainv\u00e4lisi\u00e4 linjoja, mutta johtavasta kyberturvallisuusmaasta\nYhdysvalloista voisi ottaa enemm\u00e4n mallia erityisesti strukturoidusta johtamismallista. Kansainv\u00e4linen kehitys on huomioitava strategista johtamista kehitt\u00e4ess\u00e4 nykyist\u00e4 paremmin. Kehityssuunta vaikuttaa osittain perustellulta, joskin\naiheen tuoreuden vuoksi pitk\u00e4n aikav\u00e4lin tuloksia ei ole saatavilla.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "The cyberspace is expanding all the time, covering larger part of the world. The\ndevelopment challenges strategic management, which has only been developed\nin Finland for a relatively short time. Previous studies have shown that there has\nbeen a need for management development and coordination. The slow and organization limited management model has not met today's needs. International\ndevelopment brings Finland into new cooperation platforms, and taking these\nfactors into account, it is important that management is developed in the right\nand efficient direction. The aim of the study is to expand and bring together already existing research information on the strategic management of cyber security and to learn about the development of different areas of Finnish cyber security from a management perspective. The research material consisted of various\nstudies related to cyber security management and government reports made during Sanna Marin's government. In the international comparison, material was\ncollected from the United States, Sweden and Estonia. From the collected material, the implementation of cyber security management was analyzed using qualitative content analysis. The results show that the international development of\ncyber security does not follow a single trend, although small indications of the\ncentralization of management can be observed. Cyber security management is\ndeveloped in Finland based on knowledge, and the changes have been moderately significant, especially during the current government term, although not\ncompletely in line with expert recommendations. Digital security and cyber security need conceptual clarification. The development of cyber security management in Finland partly follows international lines, but the leading cyber security\ncountry, the United States, could take more of a model from a specially structured\nmanagement model. International development must be taken into account\nwhen developing strategic management better than at present. The direction of\ndevelopment seems partially justified, although due to the novelty of the topic,\nlong-term results are not available.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2023-02-20T11:57:18Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2023-02-20T11:57:18Z (GMT). No. of bitstreams: 0\n Previous issue date: 2023", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "62", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": null, "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "politiikka", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "strateginen autonomia", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Kyberturvallisuuden strateginen johtaminen kasvavassa kybermaailmassa Suomessa : kehitt\u00e4mistarpeet uusien haasteiden edess\u00e4", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202302201804", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Kyberturvallisuus", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Kyberturvallisuus", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.copyright", "value": "\u00a9 The Author(s)", "language": null, "element": "rights", "qualifier": "copyright", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "restrictedAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "strateginen johtaminen", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "turvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "The author has not given permission to make the work publicly available electronically. Therefore the material can be read only at the archival workstation at Jyv\u00e4skyl\u00e4 University Library (https://kirjasto.jyu.fi/collections/archival-workstation).", "language": "en", "element": "rights", "qualifier": "accessrights", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "Tekij\u00e4 ei ole antanut lupaa avoimeen julkaisuun, joten aineisto on luettavissa vain Jyv\u00e4skyl\u00e4n yliopiston kirjaston arkistoty\u00f6semalta. Ks. https://kirjasto.jyu.fi/kokoelmat/arkistotyoasema..", "language": "fi", "element": "rights", "qualifier": "accessrights", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
|