fullrecord |
[{"key": "dc.contributor.advisor", "value": "Lehto, Martti", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Laitinen, Otto", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2023-11-14T06:53:55Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2023-11-14T06:53:55Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2023", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/91911", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "\u00c4lypuhelimien k\u00e4ytt\u00e4j\u00e4m\u00e4\u00e4r\u00e4 on kasvanut huomattavasti viimeisimpien vuosien aikana ja suurin osa ihmisist\u00e4 ymp\u00e4ri maailmaa omistaa \u00e4lypuhelimen jossakin vaiheessa el\u00e4m\u00e4\u00e4ns\u00e4. \u00c4lypuhelimien suosion kasvu on tuonut mukanaan alalle huomattavan m\u00e4\u00e4r\u00e4n rikollisuutta ja valtiollista hyv\u00e4ksik\u00e4ytt\u00f6\u00e4. T\u00e4ss\u00e4 pro gradu -tutkielmassa tutkittiin kybertoimintaymp\u00e4rist\u00f6n hierarkkista rakennemallia viitekehyksen\u00e4 hy\u00f6dynt\u00e4en mallin eri kerroksissa esiintyvi\u00e4 kyberuhkia.\nKybertoimintaymp\u00e4rist\u00f6n hierarkkista rakennemallia muotoiltiin tutkimusta varten niin, ett\u00e4 sit\u00e4 pystyttiin k\u00e4ytt\u00e4m\u00e4\u00e4n \u00e4lypuhelimien kontekstissa. Tutkielman teoriaosassa selvisi, ett\u00e4 \u00e4lypuhelimiin kohdistuvien kyberuhkien m\u00e4\u00e4r\u00e4 on huomattavassa nousussa. \u00c4lypuhelimiin kohdistuvien hy\u00f6kk\u00e4ysvektorien m\u00e4\u00e4r\u00e4 ja laatu vastaavat t\u00e4n\u00e4 p\u00e4iv\u00e4n\u00e4 jo tietokoneisiin suunnattuja hy\u00f6kk\u00e4ysvektoreita.\nEnnusteet \u00e4lypuhelimien tulevasta kehittymisest\u00e4 osoittavat my\u00f6s sen, ett\u00e4 kybertoimintaymp\u00e4rist\u00f6\u00f6n on ennustettavissa tulevan uusia, viel\u00e4kin suurempia uhkia \u00e4lypuhelimille ja \u00e4lypuhelimien k\u00e4ytt\u00e4jille. Tutkielman empiirinen osa suoritettiin laadullisena sis\u00e4ll\u00f6nanalyysin\u00e4 ja aineisto ker\u00e4ttiin puolistrukturoiduilla haastatteluilla. Haastatteluiden tuloksista selvisi, ett\u00e4 verrattuna aiempiin tutkimuksiin, \u00e4lypuhelink\u00e4ytt\u00e4jien tietoturvatuntemus ja valmius erilaisia tietoturvauhkia vastaan on p\u00e4\u00e4osin hyv\u00e4ll\u00e4 tasolla.\n\u00c4lypuhelimien k\u00e4ytt\u00e4j\u00e4t ovat tutkimuksen mukaan hyvin tietoisia fyysisist\u00e4 uhkista, kuten \u00e4lypuhelimen varastamisen, katoamisen tai hajoamisen mahdollisuudesta. Samalla \u00e4lypuhelimien k\u00e4ytt\u00e4j\u00e4t pyrkiv\u00e4t est\u00e4m\u00e4\u00e4n n\u00e4it\u00e4 tapahtumasta tehokkaasti. \u00c4lypuhelimien k\u00e4ytt\u00e4j\u00e4t ovat my\u00f6s tarkkoja laitteiden k\u00e4ytt\u00f6j\u00e4rjestelmien ja laiteohjelmistojen ajantasaisuudesta sek\u00e4 luvallisuudesta. Tutkimus osoittaa, ett\u00e4 turvallisuuden kannalta varomattomimpia \u00e4lypuhelimien k\u00e4ytt\u00e4j\u00e4t ovat erilaisten sovellusten asentamisen ja k\u00e4yt\u00f6n osalta.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "The number of smartphone users has grown significantly in recent years, and most people around the world own a smartphone at some point in their lives. The increase in the popularity of smartphones has brought with it a significant amount of cybercrime and state-sponsored exploitation in the field. This master's thesis examined a hierarchical structural model of the cyber environment, utilizing the model's various layers as a framework for understanding cyber threats that occur in the context of smartphones.\nThe hierarchical structural model of the cyber environment was tailored for the research, making it suitable for use in the context of smartphones. The theoretical part of the thesis revealed that the number of cyber threats targeting smartphones is on a significant rise. The quantity and quality of attack vectors targeting smartphones now correspond to those directed at computers. Predictions about the future development of smartphones also indicate that there are expected to be new, even greater threats to smartphones and smartphone users in the cyber operational environment. The empirical part of the thesis was conducted as a qualitative content analysis, and the data was collected through semi-structured interviews. The results of the interviews revealed that compared to previous studies, smartphone users' knowledge of and preparedness against various cybersecurity threats are generally at a good level.\nAccording to the research, smartphone users are very aware of physical threats such as the possibility of their smartphones being stolen, lost, or damaged. At the same time, smartphone users actively try to prevent these events from happening effectively. Smartphone users are also meticulous about the up-to-date and legitimate use of operating systems and device firmware. The study shows that, in terms of security, users are less cautious when it comes to installing and using various applications.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2023-11-14T06:53:55Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2023-11-14T06:53:55Z (GMT). No. of bitstreams: 0\n Previous issue date: 2023", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "69", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": null, "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "kyberuhka", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kybertoimintaymp\u00e4rist\u00f6n hierarkkinen rakennemalli", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Kybertoimintaymp\u00e4rist\u00f6n hierarkkisen rakennemallin hy\u00f6dynt\u00e4minen \u00e4lypuhelimissa", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202311147933", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Kyberturvallisuus", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Kyberturvallisuus", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.copyright", "value": "\u00a9 The Author(s)", "language": null, "element": "rights", "qualifier": "copyright", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "\u00e4lypuhelimet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "turvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|