fullrecord |
[{"key": "dc.contributor.advisor", "value": "Lehto, Martti", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Keinonen, Maria", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2023-05-15T06:21:54Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2023-05-15T06:21:54Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2023", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/86939", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Tutkimuksessa selvitettiin kyberoperaatioiden k\u00e4ytt\u00f6\u00e4 valtion pelotevaikutusten luomiseen. Tutkimuksen tavoitteena oli m\u00e4\u00e4ritell\u00e4 kyberpelote, l\u00f6yt\u00e4\u00e4 sen yhteys valtion pelotteeseen ja m\u00e4\u00e4ritell\u00e4 keinoja kyberoperaatioiden k\u00e4yt\u00f6st\u00e4 pelotevaikutusten luomiseen. Tutkimuksen tarkoituksena oli luoda teoreettinen tietopohja k\u00e4sitellyst\u00e4 aiheesta. Tutkimuksen p\u00e4\u00e4tutkimuskysymykseksi asetettiin: Miten kyberoperaatioita voidaan k\u00e4ytt\u00e4\u00e4 pelotevaikutusten luomiseen?\nTutkimus toteutettiin hermeneuttisen tieteenfilosofian mukaisesti aineistol\u00e4ht\u00f6isen\u00e4 sis\u00e4ll\u00f6nanalyysin\u00e4. Tutkijan esiymm\u00e4rryksen ohjaamana asetettiin kolme teemaa, joiden mukaan aineisto ker\u00e4ttiin ja analysoitiin. N\u00e4m\u00e4 teemat olivat pelote, kyberpelote ja kyberoperaatiot. Analyysin edetess\u00e4 l\u00e4hdeaineistoa teemoiteltiin ja tyypiteltiin, lopuksi havainnot koottiin synteesiksi.\nTutkimuksen ensimm\u00e4isten analyysikierrosten aikana tehtiin kaksi havaintoa, jotka ohjasivat analyysin jatkamista. Ensinn\u00e4kin, Toisen maailmansodan j\u00e4lkeen syntynyt jako kielto- ja rankaisupelotteeseen on perustavanlaatuinen. Vaikka globaalin uhkaymp\u00e4rist\u00f6n ja kybertoimintaymp\u00e4rist\u00f6n kehitys ovat asettaneet uudenlaisia vaatimuksia pelotestrategioille, pohjautuvat ne kuitenkin mainitulle kahtiajaolle. Toisekseen, kyberpelote on haastavaa rakentaa pelkin kybersuorituskyvyin kybertoimintaymp\u00e4rist\u00f6ss\u00e4 tapahtuvaksi toiminnaksi muun muassa attribuutiohaasteen ja valtioiden pyrkimyksen salata kybersuorituskykyns\u00e4 takia. T\u00e4m\u00e4n vuoksi kybertoimintaymp\u00e4rist\u00f6n suvereniteetin suojeleminen edellytt\u00e4\u00e4 valtion voiman instrumenttien, kuten poliittisten ja taloudellisten sek\u00e4 lakia ja informaatioymp\u00e4rist\u00f6\u00e4 hy\u00f6dynt\u00e4vien keinojen k\u00e4ytt\u00f6\u00e4.\nTutkimuksen lopputuloksena voidaan todeta, ett\u00e4 jokaista kyberoperaatioiden tyyppi\u00e4; hy\u00f6kk\u00e4yksellisi\u00e4 ja puolustuksellisia kyberoperaatioita sek\u00e4 JOJ\u00c4-operaatioita, voidaan k\u00e4ytt\u00e4\u00e4 valtion pelotevaikutusten luomiseen. Kyber-operaatioilla, etenkin JOJ\u00c4- ja puolustuksellisilla kyberoperaatioilla, on selke\u00e4 rooli pelotteen luomisessa kybertoimintaymp\u00e4rist\u00f6ss\u00e4 tai sen v\u00e4lityksell\u00e4 tapahtuvia uhkatoimia vastaan. Puolustukselliset kyberoperaatiot yhdess\u00e4 JOJ\u00c4-operaatioiden kanssa luovat kyberturvallisuutta ja resilienssi\u00e4, jotka puolestaan toimivat erityisesti kieltopelotteen keinoina. Hy\u00f6kk\u00e4ykselliset kyberoperaatiot toimivat parhaiten osana rankaisupelotetta, johon liittyy asevoiman k\u00e4yt\u00f6n lis\u00e4ksi my\u00f6s poliittiset ja taloudelliset keinot.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2023-05-15T06:21:54Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2023-05-15T06:21:54Z (GMT). No. of bitstreams: 0\n Previous issue date: 2023", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "65", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": null, "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "kyberpelote", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kyberoperaatio", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kybertoimintaymp\u00e4rist\u00f6", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Kyberoperaatioiden k\u00e4ytt\u00f6 pelotevaikutusten luomiseen", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202305153009", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Kyberturvallisuus", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Kyberturvallisuus", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.copyright", "value": "\u00a9 The Author(s)", "language": null, "element": "rights", "qualifier": "copyright", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "pelotteet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberavaruus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|