IT Army of Ukraine as Complex Adaptive System

Tämä tutkielma tarkastelee Ukrainan IT-Armeijan (ITAU) toimintoja ja ominaisuuksia Kompleksisten Adaptiivisten Järjestelmien (CAS) teorian näkökulmas-ta. ITAU, ad-hoc-tyyppinen valtion tukema kybertoimija, tarjoaa erinomaisen tapauksen siitä, miten tällaiset ryhmät toimivat nopeasti kehittyvässä kyb...

Täydet tiedot

Bibliografiset tiedot
Päätekijä: Merilehto, Juhani
Muut tekijät: Informaatioteknologian tiedekunta, Faculty of Information Technology, Informaatioteknologia, Information Technology, Jyväskylän yliopisto, University of Jyväskylä
Aineistotyyppi: Pro gradu
Kieli:eng
Julkaistu: 2023
Aiheet:
Linkit: https://jyx.jyu.fi/handle/123456789/87455
_version_ 1828193040153444352
author Merilehto, Juhani
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_facet Merilehto, Juhani Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Merilehto, Juhani Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_sort Merilehto, Juhani
datasource_str_mv jyx
description Tämä tutkielma tarkastelee Ukrainan IT-Armeijan (ITAU) toimintoja ja ominaisuuksia Kompleksisten Adaptiivisten Järjestelmien (CAS) teorian näkökulmas-ta. ITAU, ad-hoc-tyyppinen valtion tukema kybertoimija, tarjoaa erinomaisen tapauksen siitä, miten tällaiset ryhmät toimivat nopeasti kehittyvässä kybersodankäynnin maisemassa. Pääasiallinen tutkimuskysymys tutkii CAS:n ominaisuuksia, joita voidaan löytää ITAU:sta. Tukikysymysten kautta syvennymme erityisiin ominaisuuksiin, kuten sopeutumiseen, epälineaarisuuteen, emergenssiin, itseorganisoitumiseen, palautteeseen, monimuotoisuuteen, yhteistyöhön, viestintään, yhteisevoluutioon ja kontekstuaalisuuteen. Analyysi paljastaa, että ITAU osoittaa keskeisiä CAS:n ominaisuuksia, kuten sopeutumisen nopeasti muuttuviin olosuhteisiin, kollektiivisen kyvykkyyden kyberulottuvuudessa, ja oppimiskyvyn joka mahdollistaa ryhmän toiminnan jatkumisen muuttuvissa ja kehittyvissä olosuhteissa. Tämä tutkimus edistää kybersodankäynnin kirjallisuutta tarjoamalla yksityiskohtaisia näkemyksiä ITAU:n toiminnoista ja osoittamalla CAS-teorian soveltuvuuden kyberryhmien analyysiin. Analyyttisen linssin käytettävyys osoittaa sen, että sitä voitaisiin käyttää analysoimaan ja ymmärtämään vastaavan kaltaisia ryhmittymiä, joita voi ilmetä tulevaisuudessa. This thesis explores the activities and properties of the IT Army of Ukraine (ITAU) through the lens of Complex Adaptive Systems (CAS) theory. As an ad-hoc state sponsored cybergroup, the ITAU provides a compelling case study for understanding how such groups operate in the rapidly evolving landscape of cyberwarfare. The primary research question investigates the characteristics of CAS that can be found in the ITAU. Through supporting questions, we delve into specific attributes such as adaptation, nonlinearity, emergence, self-organization, feedback, diversity, cooperation, communication, co-evolution, and contextuality. The analysis reveals that the ITAU exhibits key CAS charac-teristics, including adaptation to rapidly changing conditions, the emergence of collective cyber-capabilities and learning that allows the group to continue functioning in changing and evolving circumstances. This study contributes to the literature on cyberwarfare by offering detailed insights into the operations of the ITAU and demonstrating the applicability of CAS theory to the analysis of cybergroups. The usability of the analytical lens can have practical implications, suggesting that it could be used for understanding and responding to similar groups that may emerge in the future.
first_indexed 2024-09-11T08:51:06Z
format Pro gradu
free_online_boolean 1
fullrecord [{"key": "dc.contributor.advisor", "value": "Lehto, Martti", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Merilehto, Juhani", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2023-06-06T06:33:54Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2023-06-06T06:33:54Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2023", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/87455", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "T\u00e4m\u00e4 tutkielma tarkastelee Ukrainan IT-Armeijan (ITAU) toimintoja ja ominaisuuksia Kompleksisten Adaptiivisten J\u00e4rjestelmien (CAS) teorian n\u00e4k\u00f6kulmas-ta. ITAU, ad-hoc-tyyppinen valtion tukema kybertoimija, tarjoaa erinomaisen tapauksen siit\u00e4, miten t\u00e4llaiset ryhm\u00e4t toimivat nopeasti kehittyv\u00e4ss\u00e4 kybersodank\u00e4ynnin maisemassa. P\u00e4\u00e4asiallinen tutkimuskysymys tutkii CAS:n ominaisuuksia, joita voidaan l\u00f6yt\u00e4\u00e4 ITAU:sta. Tukikysymysten kautta syvennymme erityisiin ominaisuuksiin, kuten sopeutumiseen, ep\u00e4lineaarisuuteen, emergenssiin, itseorganisoitumiseen, palautteeseen, monimuotoisuuteen, yhteisty\u00f6h\u00f6n, viestint\u00e4\u00e4n, yhteisevoluutioon ja kontekstuaalisuuteen. Analyysi paljastaa, ett\u00e4 ITAU osoittaa keskeisi\u00e4 CAS:n ominaisuuksia, kuten sopeutumisen nopeasti muuttuviin olosuhteisiin, kollektiivisen kyvykkyyden kyberulottuvuudessa, ja oppimiskyvyn joka mahdollistaa ryhm\u00e4n toiminnan jatkumisen muuttuvissa ja kehittyviss\u00e4 olosuhteissa. T\u00e4m\u00e4 tutkimus edist\u00e4\u00e4 kybersodank\u00e4ynnin kirjallisuutta tarjoamalla yksityiskohtaisia n\u00e4kemyksi\u00e4 ITAU:n toiminnoista ja osoittamalla CAS-teorian soveltuvuuden kyberryhmien analyysiin. Analyyttisen linssin k\u00e4ytett\u00e4vyys osoittaa sen, ett\u00e4 sit\u00e4 voitaisiin k\u00e4ytt\u00e4\u00e4 analysoimaan ja ymm\u00e4rt\u00e4m\u00e4\u00e4n vastaavan kaltaisia ryhmittymi\u00e4, joita voi ilmet\u00e4 tulevaisuudessa.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "This thesis explores the activities and properties of the IT Army of Ukraine (ITAU) through the lens of Complex Adaptive Systems (CAS) theory. As an ad-hoc state sponsored cybergroup, the ITAU provides a compelling case study for understanding how such groups operate in the rapidly evolving landscape of cyberwarfare. The primary research question investigates the characteristics of CAS that can be found in the ITAU. Through supporting questions, we delve into specific attributes such as adaptation, nonlinearity, emergence, self-organization, feedback, diversity, cooperation, communication, co-evolution, and contextuality. The analysis reveals that the ITAU exhibits key CAS charac-teristics, including adaptation to rapidly changing conditions, the emergence of collective cyber-capabilities and learning that allows the group to continue functioning in changing and evolving circumstances. This study contributes to the literature on cyberwarfare by offering detailed insights into the operations of the ITAU and demonstrating the applicability of CAS theory to the analysis of cybergroups. The usability of the analytical lens can have practical implications, suggesting that it could be used for understanding and responding to similar groups that may emerge in the future.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Miia Hakanen (mihakane@jyu.fi) on 2023-06-06T06:33:54Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2023-06-06T06:33:54Z (GMT). No. of bitstreams: 0\n Previous issue date: 2023", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "67", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "eng", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": null, "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "omplex Adaptive System", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "IT Army of Ukraine", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "IT Army of Ukraine as Complex Adaptive System", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202306063526", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Turvallisuus ja strateginen analyysi", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Turvallisuus ja strateginen analyysi", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.copyright", "value": "\u00a9 The Author(s)", "language": null, "element": "rights", "qualifier": "copyright", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "joukkoistaminen", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kybersodank\u00e4ynti", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "crowdsourcing", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "cyberwarfare", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
id jyx.123456789_87455
language eng
last_indexed 2025-03-31T20:03:14Z
main_date 2023-01-01T00:00:00Z
main_date_str 2023
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstreams\/d95154fc-58bb-49f7-a28d-904e7e86723c\/download","text":"URN:NBN:fi:jyu-202306063526.pdf","source":"jyx","mediaType":"application\/pdf"}
publishDate 2023
record_format qdc
source_str_mv jyx
spellingShingle Merilehto, Juhani IT Army of Ukraine as Complex Adaptive System omplex Adaptive System IT Army of Ukraine Turvallisuus ja strateginen analyysi 601 joukkoistaminen kybersodankäynti crowdsourcing cyberwarfare
title IT Army of Ukraine as Complex Adaptive System
title_full IT Army of Ukraine as Complex Adaptive System
title_fullStr IT Army of Ukraine as Complex Adaptive System IT Army of Ukraine as Complex Adaptive System
title_full_unstemmed IT Army of Ukraine as Complex Adaptive System IT Army of Ukraine as Complex Adaptive System
title_short IT Army of Ukraine as Complex Adaptive System
title_sort it army of ukraine as complex adaptive system
title_txtP IT Army of Ukraine as Complex Adaptive System
topic omplex Adaptive System IT Army of Ukraine Turvallisuus ja strateginen analyysi 601 joukkoistaminen kybersodankäynti crowdsourcing cyberwarfare
topic_facet 601 IT Army of Ukraine Turvallisuus ja strateginen analyysi crowdsourcing cyberwarfare joukkoistaminen kybersodankäynti omplex Adaptive System
url https://jyx.jyu.fi/handle/123456789/87455 http://www.urn.fi/URN:NBN:fi:jyu-202306063526
work_keys_str_mv AT merilehtojuhani itarmyofukraineascomplexadaptivesystem