Legacyjärjestelmien tietoturva- ja liiketoimintariskit sekä modernisointi

Information systems have been used on a large scale, for example, in the management of processes necessary for business and society for so long that many important information systems still in daily use are technically outdated. The magnitude of the phenomenon is illustrated by the fact that these...

Full description

Bibliographic Details
Main Author: Laari, Joni
Other Authors: Informaatioteknologian tiedekunta, Faculty of Information Technology, Informaatioteknologia, Information Technology, Jyväskylän yliopisto, University of Jyväskylä
Format: Bachelor's thesis
Language:fin
Published: 2023
Subjects:
Online Access: https://jyx.jyu.fi/handle/123456789/90863
_version_ 1828193199758245888
author Laari, Joni
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_facet Laari, Joni Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Laari, Joni Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_sort Laari, Joni
datasource_str_mv jyx
description Information systems have been used on a large scale, for example, in the management of processes necessary for business and society for so long that many important information systems still in daily use are technically outdated. The magnitude of the phenomenon is illustrated by the fact that these systems in production use are estimated to contain up to 200 billion lines of source code world- wide. The modernization or replacement of systems is justified from core business, financial and information security perspectives. The migration or renewal of complex information systems is not always straightforward.
first_indexed 2023-10-27T20:01:01Z
format Kandityö
free_online_boolean 1
fullrecord [{"key": "dc.contributor.advisor", "value": "Kypp\u00f6, Jorma", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Laari, Joni", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2023-10-27T09:00:55Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2023-10-27T09:00:55Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2023", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/90863", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Information systems have been used on a large scale, for example, in the management of processes necessary for business and society for so long that many \nimportant information systems still in daily use are technically outdated. The \nmagnitude of the phenomenon is illustrated by the fact that these systems in production use are estimated to contain up to 200 billion lines of source code world-\nwide. The modernization or replacement of systems is justified from core business, financial and information security perspectives. The migration or renewal \nof complex information systems is not always straightforward.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Miia Hakanen (mihakane@jyu.fi) on 2023-10-27T09:00:55Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2023-10-27T09:00:55Z (GMT). No. of bitstreams: 0\n Previous issue date: 2023", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "25", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "legacyj\u00e4rjestelm\u00e4t", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "refaktorointi", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "yritysj\u00e4rjestelm\u00e4t", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "operaatioturvallisuus", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Legacyj\u00e4rjestelmien tietoturva- ja liiketoimintariskit sek\u00e4 modernisointi", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202310276890", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoj\u00e4rjestelm\u00e4t", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "riskienhallinta", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
id jyx.123456789_90863
language fin
last_indexed 2025-03-31T20:01:28Z
main_date 2023-01-01T00:00:00Z
main_date_str 2023
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstreams\/4b67eb1c-79fd-4d1e-8ac9-4f58edc18826\/download","text":"URN:NBN:fi:jyu-202310276890.pdf","source":"jyx","mediaType":"application\/pdf"}
publishDate 2023
record_format qdc
source_str_mv jyx
spellingShingle Laari, Joni Legacyjärjestelmien tietoturva- ja liiketoimintariskit sekä modernisointi legacyjärjestelmät refaktorointi yritysjärjestelmät operaatioturvallisuus Tietojärjestelmätiede Information Systems Science 601 tietojärjestelmät kyberturvallisuus riskienhallinta
title Legacyjärjestelmien tietoturva- ja liiketoimintariskit sekä modernisointi
title_full Legacyjärjestelmien tietoturva- ja liiketoimintariskit sekä modernisointi
title_fullStr Legacyjärjestelmien tietoturva- ja liiketoimintariskit sekä modernisointi Legacyjärjestelmien tietoturva- ja liiketoimintariskit sekä modernisointi
title_full_unstemmed Legacyjärjestelmien tietoturva- ja liiketoimintariskit sekä modernisointi Legacyjärjestelmien tietoturva- ja liiketoimintariskit sekä modernisointi
title_short Legacyjärjestelmien tietoturva- ja liiketoimintariskit sekä modernisointi
title_sort legacyjärjestelmien tietoturva ja liiketoimintariskit sekä modernisointi
title_txtP Legacyjärjestelmien tietoturva- ja liiketoimintariskit sekä modernisointi
topic legacyjärjestelmät refaktorointi yritysjärjestelmät operaatioturvallisuus Tietojärjestelmätiede Information Systems Science 601 tietojärjestelmät kyberturvallisuus riskienhallinta
topic_facet 601 Information Systems Science Tietojärjestelmätiede kyberturvallisuus legacyjärjestelmät operaatioturvallisuus refaktorointi riskienhallinta tietojärjestelmät yritysjärjestelmät
url https://jyx.jyu.fi/handle/123456789/90863 http://www.urn.fi/URN:NBN:fi:jyu-202310276890
work_keys_str_mv AT laarijoni legacyjärjestelmientietoturvajaliiketoimintariskitsekämodernisointi