fullrecord |
[{"key": "dc.contributor.advisor", "value": "Lehto, Martti", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Laine, Elias", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2023-05-25T05:59:24Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2023-05-25T05:59:24Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2023", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/87174", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Tutkimuksessa tarkastellaan pienten ja keskisuurten kuntien tietoturvallisuuden\nhallintaprosessia sek\u00e4 tiedonhallintalain vaatimuksia. Tutkimuksen tavoitteena\noli selvitt\u00e4\u00e4 pienten ja keskisuurten kuntien tietoturvallisuuden hallinnan taso ja\nsiihen vaikuttavat tekij\u00e4t. T\u00e4m\u00e4n pohjalta tutkimuksessa rakennettiin ISO27001:n\npohjautuva malli tietoturvallisuuden hallintaprosessista kunnille. Esitelt\u00e4v\u00e4\nmalli on yhdenmukaistava ja kokoava, joka toimii pohjana organisaatiokohtaisen\nmallin kehitt\u00e4miselle.\nTutkimus toteutettiin kirjallisuuskatsauksena ja teemahaastatteluna. Tutkimuksen viitekehyksen\u00e4 toimi ISO27001- standardi. Kirjallisuuskatsauksessa pureuduttiin tietoturvallisuuden hallintaprosessiin ja sen vaiheisiin. Kirjallisuuskatsauksen aineistoa ker\u00e4ttiin tutkimukseen kansallisesta lains\u00e4\u00e4d\u00e4nn\u00f6st\u00e4 ja ohjeista sek\u00e4 kansainv\u00e4lisist\u00e4 ohjeista ja standardeista. Teemahaastattelut toteutettiin kolmen eri kunnan tietoturvaan perehtyneen henkil\u00f6n haastatteluna. Haastatteluilla pyrittiin saamaan kattava kuvaus tietoturvallisuuden hallinnasta ja tiedonhallintalain toteutumisesta pieniss\u00e4 ja keskisuurissa kunnissa.\nTutkimuksen perusteella tietoturvallisuuden hallinta ja siihen vaikuttavat\ntekij\u00e4t vaihtelivat kunnittain. Tietoturvallisuuden hallintaa ei kaikilta osin ollut\ntoteutettu kunnissa kokonaisuutena vaan yksitt\u00e4isin\u00e4 toimenpitein\u00e4. Tutkimuksen perusteella kuntien tietoturvallisuuden hallintaan vaikuttivat osaltaan k\u00e4ytett\u00e4viss\u00e4 olevat resurssit sek\u00e4 ohjauksen hajanaisuus. Tiedonhallintalain vaatimuksien osalta tutkimukseen osallistuneet kunnat olivat tehneet toimenpiteit\u00e4,\nmutta kokonaisuudessaan vaatimuksiin ei ollut p\u00e4\u00e4sty. Tiedonhallintalain vaatimuksien t\u00e4ytt\u00e4miseksi tutkimukseen osallistuneet henkil\u00f6t toivoivat ohjausta ja\nyhdenmukaisia toimintamalleja vaatimusten toteuttamiseksi.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "This study examines the information security management process of small and\nmedium-sized municipalities and the requirements of the Finnish data management act. The aim of the study was to find out the level of information security\nmanagement in small and medium-sized municipalities and the factors that affecting it. Based on this, the research built a model of the information security\nmanagement process for municipalities based on ISO27001. The presented model\nis harmonizing and collecting, which serves as a basis for the development of an\norganization-specific model.\nThe research was carried out as a literature review and thematic interview.\nThe ISO27001 served as the research framework. The literature review discussed\nthe information security management process and its stages. The material of the\nliterature review was collected from national legislation and guidelines as well\nas international guidelines and standards. Thematic interviews were carried out\nas an interview with three people familiar with information security in different\nmunicipalities. The interview aimed to get a comprehensive description of information security management and the implementation of the Finnish data management act in small and medium-sized municipalities.\nBased on the research, information security management and the factors affecting it varied by municipality. Information security management had not been\nimplemented in all aspects in the municipalities as a whole, but as individual\nmeasures. Based on research, the municipalities\u2019 information security management was partly influenced by the available resources and the fragmentation of\ncontrol. Regarding the requirements of the Finnish data management act, the municipalities that participated in the study had taken measures, but the requirements has not been fully met. In order to meet the requirements of the data management act, the people who participated in the study wanted guidance and uniform operating models to implement the requirements.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Miia Hakanen (mihakane@jyu.fi) on 2023-05-25T05:59:24Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2023-05-25T05:59:24Z (GMT). No. of bitstreams: 0\n Previous issue date: 2023", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "49", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": null, "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "tietoturvallisuuden hallinta", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kuntien tietoturva", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tietoturvallisuuden prosessi", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Tietoturvallisuuden hallinta kunnissa - prosessi ja sen vaiheet", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202305253238", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Kyberturvallisuus", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Kyberturvallisuus", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.copyright", "value": "\u00a9 The Author(s)", "language": null, "element": "rights", "qualifier": "copyright", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "prosessit", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kunnat", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|