fullrecord |
[{"key": "dc.contributor.advisor", "value": "Lehto, Martti", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Merilehto, Juhani", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2023-06-06T06:33:54Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2023-06-06T06:33:54Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2023", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/87455", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "T\u00e4m\u00e4 tutkielma tarkastelee Ukrainan IT-Armeijan (ITAU) toimintoja ja ominaisuuksia Kompleksisten Adaptiivisten J\u00e4rjestelmien (CAS) teorian n\u00e4k\u00f6kulmas-ta. ITAU, ad-hoc-tyyppinen valtion tukema kybertoimija, tarjoaa erinomaisen tapauksen siit\u00e4, miten t\u00e4llaiset ryhm\u00e4t toimivat nopeasti kehittyv\u00e4ss\u00e4 kybersodank\u00e4ynnin maisemassa. P\u00e4\u00e4asiallinen tutkimuskysymys tutkii CAS:n ominaisuuksia, joita voidaan l\u00f6yt\u00e4\u00e4 ITAU:sta. Tukikysymysten kautta syvennymme erityisiin ominaisuuksiin, kuten sopeutumiseen, ep\u00e4lineaarisuuteen, emergenssiin, itseorganisoitumiseen, palautteeseen, monimuotoisuuteen, yhteisty\u00f6h\u00f6n, viestint\u00e4\u00e4n, yhteisevoluutioon ja kontekstuaalisuuteen. Analyysi paljastaa, ett\u00e4 ITAU osoittaa keskeisi\u00e4 CAS:n ominaisuuksia, kuten sopeutumisen nopeasti muuttuviin olosuhteisiin, kollektiivisen kyvykkyyden kyberulottuvuudessa, ja oppimiskyvyn joka mahdollistaa ryhm\u00e4n toiminnan jatkumisen muuttuvissa ja kehittyviss\u00e4 olosuhteissa. T\u00e4m\u00e4 tutkimus edist\u00e4\u00e4 kybersodank\u00e4ynnin kirjallisuutta tarjoamalla yksityiskohtaisia n\u00e4kemyksi\u00e4 ITAU:n toiminnoista ja osoittamalla CAS-teorian soveltuvuuden kyberryhmien analyysiin. Analyyttisen linssin k\u00e4ytett\u00e4vyys osoittaa sen, ett\u00e4 sit\u00e4 voitaisiin k\u00e4ytt\u00e4\u00e4 analysoimaan ja ymm\u00e4rt\u00e4m\u00e4\u00e4n vastaavan kaltaisia ryhmittymi\u00e4, joita voi ilmet\u00e4 tulevaisuudessa.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "This thesis explores the activities and properties of the IT Army of Ukraine (ITAU) through the lens of Complex Adaptive Systems (CAS) theory. As an ad-hoc state sponsored cybergroup, the ITAU provides a compelling case study for understanding how such groups operate in the rapidly evolving landscape of cyberwarfare. The primary research question investigates the characteristics of CAS that can be found in the ITAU. Through supporting questions, we delve into specific attributes such as adaptation, nonlinearity, emergence, self-organization, feedback, diversity, cooperation, communication, co-evolution, and contextuality. The analysis reveals that the ITAU exhibits key CAS charac-teristics, including adaptation to rapidly changing conditions, the emergence of collective cyber-capabilities and learning that allows the group to continue functioning in changing and evolving circumstances. This study contributes to the literature on cyberwarfare by offering detailed insights into the operations of the ITAU and demonstrating the applicability of CAS theory to the analysis of cybergroups. The usability of the analytical lens can have practical implications, suggesting that it could be used for understanding and responding to similar groups that may emerge in the future.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Miia Hakanen (mihakane@jyu.fi) on 2023-06-06T06:33:54Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2023-06-06T06:33:54Z (GMT). No. of bitstreams: 0\n Previous issue date: 2023", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "67", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "eng", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": null, "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "omplex Adaptive System", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "IT Army of Ukraine", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "IT Army of Ukraine as Complex Adaptive System", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202306063526", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Turvallisuus ja strateginen analyysi", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Turvallisuus ja strateginen analyysi", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.copyright", "value": "\u00a9 The Author(s)", "language": null, "element": "rights", "qualifier": "copyright", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "joukkoistaminen", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kybersodank\u00e4ynti", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "crowdsourcing", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "cyberwarfare", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|