fullrecord |
[{"key": "dc.contributor.advisor", "value": "Lehto, Martti", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Ilom\u00e4ki, Kati", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2023-04-13T06:12:13Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2023-04-13T06:12:13Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2023", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/86323", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Tietoisuus kyber- ja tietoturvallisuusriskeist\u00e4 sek\u00e4 n\u00e4iden vaikutuksista kansalliseen ja kansainv\u00e4liseen turvallisuuteen on kasvanut viimeisen vuosikymmenen aikana. Tiedosta muodostuva arvopotentiaali on keskeinen osa kybertoimintaymp\u00e4rist\u00f6n turvaamista, eik\u00e4 se ole mahdollista ilman eri toimijoiden v\u00e4list\u00e4 yhteisty\u00f6t\u00e4. Tietovirtojen avulla voidaan tarkastella organisaatioiden kyky\u00e4 muuntaa tietoresursseja arvoksi, joka t\u00e4ss\u00e4 tutkimuksessa sidottiin kybertilannekuvan muodostamiseen. Yleisesti tietojohtamisen teht\u00e4v\u00e4 on parantaa organisaatioissa ja sen sidosryhmiss\u00e4 tapahtuvaa arvonluomiskyky\u00e4. T\u00e4m\u00e4n tutkimuksen tavoitteena oli pyrki\u00e4 tunnistamaan parhaat k\u00e4yt\u00e4nteet tietovirtojen hallintaan kybertilannekuvan muodostamisen kontekstissa. Parhaiden k\u00e4yt\u00e4nteiden tunnistamiseksi tutkimuksessa selvitettiin tietovirtojen muodostumisen ja niiden hallinnan yleisi\u00e4 periaatteita sek\u00e4 lis\u00e4ksi pyrittiin tunnistamaan, millaisia k\u00e4yt\u00e4nn\u00f6n haasteita n\u00e4ihin mahdollisesti liittyy. Havaintojen pohjalta pyrittiin selvitt\u00e4m\u00e4\u00e4n, onko tietovirtojen hallintaan kybertilannekuvan muodostamisen kontekstissa esitett\u00e4viss\u00e4 jonkinlainen ideaalimalli. Tutkimus toteutettiin monimenetelm\u00e4isen\u00e4 kvalitatiivisena tutkimuksena. Tutkimusaineisto ker\u00e4ttiin havainnoimalla er\u00e4st\u00e4 kotimaista kyberturvallisuusharjoitusta sek\u00e4 haastattelemalla yhteens\u00e4 kahdeksaa asiantuntijaa nelj\u00e4st\u00e4 eri organisaatiosta. Tietovirtoja pyrittiin hahmottamaan kybertilannekuvan muodostamisen kontekstissa hakien n\u00e4kemyksi\u00e4 niin organisaation, verkoston kuin my\u00f6s laajemmin yhteiskunnan n\u00e4k\u00f6kulmasta. Monipuolisen ja laajahkon tulokulman valinta perustui siihen, ett\u00e4 aihetta on tutkittu Suomessa aiemmin jokseenkin v\u00e4h\u00e4n. Tietoon ja siihen liittyv\u00e4t ilmi\u00f6t miellet\u00e4\u00e4n usein monimutkaisiksi ja abstrakteiksi, mik\u00e4 teki my\u00f6s t\u00e4st\u00e4 tutkimuksesta osaltaan haastavan kokonaisuuden. Saadut tulokset kuvaavat ilmi\u00f6t\u00e4 yl\u00e4tasolla, eik\u00e4 kovinkaan yksityiskohtaisia k\u00e4yt\u00e4nteit\u00e4 tietovirtojen hallintaan ole mahdollista tutkimuksen pohjalta esitt\u00e4\u00e4. Tutkimuksessa kuitenkin tunnistettiin melko laajasti yleisi\u00e4 periaatteita ja haasteita, joita tietovirtoihin ja niiden hallintaan kybertilannekuvan muodostamisen kontekstissa liittyy. Tietovirrat ja niiden hallinta kybertilannekuvan muodostamisen kontekstissa on moniulotteinen ja laaja kokonaisuus, jota ei voida pit\u00e4\u00e4 itsest\u00e4\u00e4nselvyyten\u00e4. Tutkimusaihe on merkitt\u00e4v\u00e4, sill\u00e4 ilman ymm\u00e4rryst\u00e4 organisaatioiden tietoprosesseista ei pystyt\u00e4 hy\u00f6dynt\u00e4m\u00e4\u00e4n tietoresurssien todellista arvoa kybertilannekuvan muodostamisessa.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Overall awareness of cyber and information security risks and their potential impact on national and international security has grown over the past decade. The value potential created by knowledge is a crucial element of securing cyber operational environment, and furthermore, which is not succeeded without cooperation between different organisations and other actors. Knowledge flows can be used to examine the ability of how organisations transform their knowledge resources into value, which in this study is related to maintaining cyber situational picture. In general, knowledge management aims at improving the value creating capability of organisations and their stakeholders. The objective of this study was to identify best practices for managing knowledge flows in the context of maintaining cyber situational picture. To identify best practices, the research explored the general principles of knowledge flows and their management, as well as challenges associated with the research topic. Based on the findings of this study, it was sought to identify whether some kind of ideal model for managing knowledge flows could be formed. The study was carried out as a multimethod qualitative study. The research material was collected by observing a Finnish cybersecurity exercise and by interviewing a total of eight specialists from four different organisations, seeking perspective from organisations, networks as well as from wider society point of view. The versatile and wide-ranging approach was partly explained by as not much of previous research in Finland had been made within the same context. Knowledge and related phenomena are often considered as complex and abstract, which also made this study challenging to conduct. The obtained results describe the phenomenon at a high level, and thus, it is not possible to present very detailed practices for managing the knowledge flows based on this study. However, the study identified rather broadly general principles and challenges associated with knowledge flows and their management in the context of maintaining cyber situational picture. The knowledge flows and their management in this context are multidimensional and extensive, which cannot be taken for granted. The research topic is significant since without understanding of organisations\u2019 knowledge processes, we are unable to utilize the true value of knowledge resources on maintaining cyber situational picture.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2023-04-13T06:12:13Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2023-04-13T06:12:13Z (GMT). No. of bitstreams: 0\n Previous issue date: 2023", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "99", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": null, "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "kybertilannekuva", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Tietovirrat ja niiden hallinta kybertilannekuvan muodostamisen kontekstissa", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202304132451", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Turvallisuus ja strateginen analyysi", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Turvallisuus ja strateginen analyysi", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.copyright", "value": "\u00a9 The Author(s)", "language": null, "element": "rights", "qualifier": "copyright", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tiet\u00e4myksenhallinta", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietovirrat", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|