fullrecord |
[{"key": "dc.contributor.advisor", "value": "Clements, Kati", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Herrala, Mikael", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2024-03-06T06:56:44Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2024-03-06T06:56:44Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2024", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/93817", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Teko\u00e4ly on yksi nykyp\u00e4iv\u00e4n tutkituimmista teknologioista tehokkuutensa ja valtavan potentiaalinsa ansiosta. Teko\u00e4lyn kehitys on mahdollistanut sen hy\u00f6dynt\u00e4misen useilla eri aloilla, mink\u00e4 seurauksena yritykset ovat alkaneet hy\u00f6dynt\u00e4m\u00e4\u00e4n sit\u00e4 my\u00f6s tietoturvan kehitt\u00e4misess\u00e4. T\u00e4m\u00e4n kanditutkielman tarkoituksena on perehty\u00e4 teko\u00e4lyyn ja yrityksien tietoturvaan, sek\u00e4 tarkastella teko\u00e4lyn mahdollisuuksia erityisesti yritysten tietoturvan kehitt\u00e4misess\u00e4. Tutkielma toteutettiin kirjallisuuskatsauksena, ja tiedonhaussa pyrittiin k\u00e4ytt\u00e4m\u00e4\u00e4n tunnettuja ja luotettavia tietokantoja. Tutkielman tutkimuskysymys on: \u201dMill\u00e4 tavoin teko\u00e4ly\u00e4 voidaan hy\u00f6dynt\u00e4\u00e4 yrityksen tietoturvan kehitt\u00e4misess\u00e4?\u201d Tutkimus koostuu kolmesta p\u00e4\u00e4luvusta. Ensimm\u00e4isess\u00e4 k\u00e4yd\u00e4\u00e4n l\u00e4pi teko\u00e4lyn m\u00e4\u00e4ritelm\u00e4\u00e4, muotoja ja historiaa. Toisessa luvussa tutustutaan tieto-turvaan ja sen m\u00e4\u00e4ritelm\u00e4\u00e4n. Kolmannessa pyrit\u00e4\u00e4n vastaamaan tutkimuskysymykseen kahden ensimm\u00e4isen luvun pohjalta. Tutkielma nostaa esiin teko\u00e4lyteknologioiden mukanaan tuomat hy\u00f6dyt, erityisesti yrityksien tietoturvan n\u00e4k\u00f6kulmasta. Tutkielman johtop\u00e4\u00e4t\u00f6ksen\u00e4 voidaan todeta, ett\u00e4 teko\u00e4ly\u00e4 voidaan hy\u00f6dynt\u00e4\u00e4 tietoturvan kehityksess\u00e4, ja sen rooli voidaan m\u00e4\u00e4ritell\u00e4 yrityksen tarpeiden mukaan. Mukautuvuus onkin teko\u00e4lyj\u00e4rjestelm\u00e4n suurin vahvuus. Teko\u00e4lyn k\u00e4ytt\u00f6 ei kuitenkaan ole ongelmatonta, ja laaja-alainen teko\u00e4lyn hy\u00f6dynt\u00e4minen edellytt\u00e4\u00e4 teko\u00e4lyteknologioiden jatkuvaa kehityst\u00e4.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Artificial Intelligence (AI) is one of today\u2019s most researched technologies, thanks to its efficiency and great potential. The development of artificial intelligence has made it possible to use it in many different areas, because of which companies have also started to use it in the development of information security. The purpose of this thesis is to study AI and information security in enterprises, and to examine the potential of AI especially in the development of information security in enterprises. The thesis was made as a literature review, and the aim was to use well-known and reliable databases to search for information. The research question of the thesis is: \u201cHow can AI be used to improve information security in the enterprise?\u201d. The study consists of three main chapters. The first one reviews the definition, forms, and history of AI. The second chapter introduces security and its definition. The third seeks to answer the research question based on the first two chapters. The thesis highlights the be-nefits of AI technologies, especially from the perspective of enterprise security. The thesis concludes that AI can be used in the development of information security and its role can be defined according to the needs of the company. In fact, adaptability is the main strength of an AI system. However, the use of AI is not without its problems, and the widespread use of AI requires continuous development of AI technologies.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2024-03-06T06:56:44Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2024-03-06T06:56:44Z (GMT). No. of bitstreams: 0\n Previous issue date: 2024", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "23", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.title", "value": "Yrityksen tietoturvan kehitt\u00e4minen teko\u00e4lyn avulla", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202403062282", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "teko\u00e4ly", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "yritykset", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kehitt\u00e4minen", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoj\u00e4rjestelm\u00e4t", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietotekniikka", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "koneoppiminen", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "organisaatiot", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "teknologia", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|