fullrecord |
[{"key": "dc.contributor.advisor", "value": "Lehto, Martti", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Vaija, Markus", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2023-10-30T07:01:36Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2023-10-30T07:01:36Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2023", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/91017", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Kyberterrorismi on usein tunnistettu uhka, mutta silt\u00e4 puuttuu yhteisesti hyv\u00e4ksytty ja eri toimijoiden jakama m\u00e4\u00e4ritelm\u00e4. T\u00e4m\u00e4 jo pitk\u00e4\u00e4n tiedostettu problematiikka haastaa sek\u00e4 akateemista keskustelua ett\u00e4 viranomaisyhteisty\u00f6t\u00e4 uhkaan vastaamisessa. T\u00e4ss\u00e4 tutkimuksessa perehdyttiin tapoihin, joilla kyberterrorismia on aiemmin pyritty m\u00e4\u00e4rittelem\u00e4\u00e4n, ja mink\u00e4laisia l\u00e4hestymistapoja on koetettu. Tutkimus toteutettiin alkuvaiheen kirjallisuuskatsauksena ja my\u00f6hemmin teorial\u00e4ht\u00f6ist\u00e4 sis\u00e4ll\u00f6nanalyysi\u00e4 hy\u00f6dynt\u00e4en. Kirjallisuuden joukosta valittiin parhaaksi ja kattavimmaksi todettu m\u00e4\u00e4ritelm\u00e4, jonka avulla l\u00e4hestyttiin viimeisen vuoden aikana tapahtuneita tosimaailman kyberhy\u00f6kk\u00e4yksi\u00e4. Teorial\u00e4ht\u00f6isen sis\u00e4ll\u00f6nanalyysin avulla pyrittiin selvitt\u00e4m\u00e4\u00e4n, toimiiko t\u00e4m\u00e4 valittu m\u00e4\u00e4rittelytapa tapausten luokittelemiseen kyberterrorismiksi, tai voidaanko sen avulla aiemmin haastavat rajatapaukset sulkea m\u00e4\u00e4ritelm\u00e4n ulkopuolelle. Tutkimuksessa l\u00f6ydettiin tapauksia, jotka sopivat m\u00e4\u00e4ritelm\u00e4n mukaiseen k\u00e4sitykseen kyberterrorismista, mutta valitun taksonomian k\u00e4ytt\u00f6\u00f6n liittyi my\u00f6s merkitt\u00e4vi\u00e4 haasteita. Er\u00e4s suurimmista haasteista oli toimijoiden tunnistaminen kyberhy\u00f6kk\u00e4ysten taustalla, ja etenkin ei-valtiollisen toiminnan erottaminen valtiollisesta. Toinen merkitt\u00e4v\u00e4 haaste liittyi hy\u00f6kk\u00e4ysten aikomuksen, eli tavoitteen arviointiin, joka usein edellytti varsin korkeaa tulkinnanvaraisuutta. Kokonaisuudessaan kuitenkin taksonomian voitiin todeta olevan toimiva tunnistamaan kyberterrorismin m\u00e4\u00e4ritelm\u00e4\u00e4n sopivia tapauksia ja ett\u00e4 ilmi\u00f6n erottaminen muista kyberuhista on mahdollista, joskin haastavaa. Jatkotutkimusaiheiksi esitet\u00e4\u00e4n etenkin kyberterrorismik\u00e4sitteen laajentamista koskemaan my\u00f6s mahdollisen valtiollisen taustan tai motiivin omaavia hy\u00f6kk\u00e4yksi\u00e4 sek\u00e4 luopumista vaatimuksesta, ett\u00e4 tullakseen m\u00e4\u00e4ritellyksi kyberterrorismiksi, tulee kybertapahtuman johtaa kineettisiin, eli fyysisen maailman seurauksiin.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Cyberterrorism is an often identified threat, but one that lacks a commonly agreed definition shared by different actors. This problem, which has been rec-ognised for a long time, challenges both academic discussion and cooperation between authorities in responding to the threat. This study explored the ways in which cyberterrorism has been defined in the past and what approaches have been tried. The study was carried out as an initial literature review, and later using theory-based content analysis. Among the literature, the best and most comprehensive definition of cyberterrorism was selected and applied to real-world cyberattacks that have occurred in the past year. The purpose of theory-based content analysis was to find out whether this chosen definition method works for classifying cases as cyberterrorism, or whether it can be used to ex-clude previously challenging borderline cases from the definition. The study found both cases that fit the definition of cyberterrorism, but there were also significant challenges associated with the use of the chosen taxonomy. One of the major challenges was related to difficulties in differentiating between non-state and state supported actors behind the attacks. Another encountered issue had to do with need of assessing the intent, i.e. objective, of the cyberattacks, which often came with a high degree of ambiguity. However, the taxonomy overall was found to be effective in identifying cases that fit the definition of cyberterrorism, and that distinguishing the phenomenon from other cyber threats is possible, albeit challenging. Suggested further research topics include expanding the concept of cyber terrorism to include attacks with a possible state background or motive, and waiving the requirement that in order to be defined as cyberterrorism, a cyber event must lead to kinetic, i.e. physical, consequences.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2023-10-30T07:01:36Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2023-10-30T07:01:36Z (GMT). No. of bitstreams: 0\n Previous issue date: 2023", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "54", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": null, "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "kyberuhat", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kyberterrorismi", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Kyberterrorismi - todellinen ilmi\u00f6 vai tulevaisuuden uhka?", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202310307044", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Turvallisuus ja strateginen analyysi", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Turvallisuus ja strateginen analyysi", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.copyright", "value": "\u00a9 The Author(s)", "language": null, "element": "rights", "qualifier": "copyright", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "terrorismi", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "verkkohy\u00f6kk\u00e4ykset", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|