fullrecord |
[{"key": "dc.contributor.advisor", "value": "Siponen, Mikko", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.advisor", "value": "J\u00e4rvel\u00e4inen, Jonna", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Heikkil\u00e4, Miika", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2023-10-03T06:23:05Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2023-10-03T06:23:05Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2023", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/89361", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "2020-luvulla julkishallinnon organisaatioiden toimintaymp\u00e4rist\u00f6n turvallisuustilanne on muuttunut jatkuvasti ep\u00e4varmemmaksi. Kyberturvallisuuden viitekehyksess\u00e4 toteutetulle jatkuvuuden hallinnan suunnittelulle on merkitt\u00e4v\u00e4\u00e4 kysynt\u00e4\u00e4. Suomalaiselle julkishallinnolle tarjolla olevat jatkuvuuden hallinnan suunnittelun ty\u00f6kalut n\u00e4ytt\u00e4v\u00e4t olevan omimmillaan tilanteessa, jossa niihin sy\u00f6tet\u00e4\u00e4n ja taltioidaan toisaalla analysoitua tietoa. T\u00e4ss\u00e4 tutkimuksessa on sovellettu j\u00e4senneltyj\u00e4 tiedusteluanalyysimenetelmi\u00e4 (Structured Analytic Techniques, SAT) jatkuvuuden hallinnan suunnittelussa. Tutkimus on toteutettu systemaattisen kirjallisuuskatsauksen ja kehitt\u00e4v\u00e4n tutkimuksen (Design Science Research, DSR) keinoin. Tutkimustulosten mukaan j\u00e4senneltyj\u00e4 tiedusteluanalyysimenetelmi\u00e4 voidaan hy\u00f6dynt\u00e4\u00e4 toimintaymp\u00e4rist\u00f6analyysiss\u00e4, toiminnanvaikutusanalyysiss\u00e4 ja riskienarvioinnissa, kun organisaation tietojenk\u00e4sittely-ymp\u00e4rist\u00f6 on monimutkainen sosiaalisten sek\u00e4 teknologisten entiteettien kokonaisuus. Menetelm\u00e4t tarjoavat mahdollisuuden asiantuntijan kognitiivisten vinoumien ja intuitiivisten ansojen v\u00e4hent\u00e4miseen, sek\u00e4 vaihtoehtoisia n\u00e4k\u00f6kulmia antavaan syvent\u00e4v\u00e4\u00e4n tausta-analyysiin. Menetelmien k\u00e4ytt\u00f6\u00f6n liittyy varauksellisuutta. Menetelm\u00e4t voivat altistaa virheille niiden luonteen vuoksi, olla ty\u00f6l\u00e4it\u00e4 ja vaatia erityisosaamista. Tutkimuksessa on ehdotettu pidempikestoisia tutkimuksia, joissa j\u00e4senneltyj\u00e4 tiedusteluanalyysi-menetelmi\u00e4 sovelletaan laajemmin perinteisen tiedustelun ulkopuolella. T\u00e4m\u00e4 voisi tapahtua erityisesti jatkuvuuden hallinnan suunnittelussa sek\u00e4 yll\u00e4pidossa, mahdollisesti teko\u00e4lyavusteisesti, arvioiden menetelmien hy\u00f6dyllisyytt\u00e4 sek\u00e4 k\u00e4ytett\u00e4vyytt\u00e4 jatkuvuuden hallinnan prosessissa.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "In the 2020s, the security situation in the operating environment of public administration organizations is more uncertain. There is a continuously and prominent demand for continuity planning within the framework of cybersecurity. The tools available for continuity planning in Finnish public administration seem to be most workable when recorded with pre-analyzed data from elsewhere. This study applies Structured Analytic Techniques (SAT) in continuity planning. The research is implemented by a systematic literature review and Design Science Research (DSR) research methods. According to the research findings, structured intelligence analysis methods can be employed in operating environment analysis, impact analysis, and risk assessment when an organization's information system environment is a complex entity of intertwined social and technological aspects. These methods offer the potential to reduce cognitive biases and intuitive traps for planners, as well as provide in-depth analysis with alternative perspectives. However, there is caution associated with using SATs in continuity planning. Due to their nature, these methods can cause errors in analyzing process, be resource-intensive, and require specialized expertise. The study suggested further research involving the broader application of structured intelligence analysis methods beyond traditional intelligence. These kinds of research could study SATs particularly in continuity planning and continuity maintenance, maybe with Artificial Intelligence applications, with an assessment of SAT\u2019s utility and usability in that lifecycle.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2023-10-03T06:23:05Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2023-10-03T06:23:05Z (GMT). No. of bitstreams: 0\n Previous issue date: 2023", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "111", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": null, "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "jatkuvuuden hallinta", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "j\u00e4sennellyt tiedusteluanalyysimenetelm\u00e4t", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "toimintaymp\u00e4rist\u00f6analyysi", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "toiminnanvaikutusanalyysi", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "J\u00e4senneltyjen tiedusteluanalyysimenetelmien k\u00e4ytt\u00f6 jatkuvuuden hallinnan suunnittelussa", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202310035382", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Kyberturvallisuus", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Kyberturvallisuus", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.copyright", "value": "\u00a9 The Author(s)", "language": null, "element": "rights", "qualifier": "copyright", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "riskinarviointi", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|