fullrecord |
[{"key": "dc.contributor.advisor", "value": "Kari, Martti", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.advisor", "value": "Lehto, Martti", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Takamaa, Markus", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2024-03-13T06:39:29Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2024-03-13T06:39:29Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2024", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/93885", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Tietoverkoissa toteutettavat kyberoperaatiot ovat uusimpia keinoja valtioille kohdistaa voimaansa toisia valtioita kohtaan. N\u00e4iden k\u00e4ytt\u00f6mahdollisuudet ovat tulleet ensimm\u00e4isen kerran laajemman yleis\u00f6n tietouteen Stuxnet-tapauksen my\u00f6t\u00e4 2010-luvun vaihteen paikkeilla. Koska kyberoperaatiot ovat olleet laajassa tiedossa vasta hieman yli vuosikymmenen ajan, on niiden k\u00e4yt\u00f6ss\u00e4 monia kysymyksi\u00e4, joita ei viel\u00e4 ole toistaiseksi tiedossa. Erityisesti kokonaiskattavaa poikkitieteellist\u00e4 ymm\u00e4rryst\u00e4 ei ole toistaiseksi ollut saatavissa.\n\nT\u00e4m\u00e4 tutkielma tavoittelee kokonaisvaltaisen ymm\u00e4rryksen muodostamista kyberoperaatioista. Tutkimus pyrkii luomaan ymm\u00e4rryksen analysoimalla ja kokoamalla yhteen poikkitieteellisist\u00e4 hajanaisista yksityiskohdista muodostuvaa tietoa ilmi\u00f6st\u00e4. Tutkimuksen tarkoituksena on tarjota akateemiselle tutkimukselle parempaa ymm\u00e4rryst\u00e4 toistaiseksi melko tuntemattomasta ilmi\u00f6st\u00e4. Lis\u00e4ksi pyrit\u00e4\u00e4n selvent\u00e4m\u00e4\u00e4n nykytiet\u00e4myksen laajuutta mahdollisia jakotutkimuksia varten.\n\nTutkimus toteutettiin soveltamalla Anselm Strauss:in ja Juliet Corbin:in luomaa versiota Grounded Theory -tutkimusmetodologiasta. Metodologiaa sovellettiin p\u00e4\u00e4asiassa akateemisissa julkaisuissa l\u00f6ydett\u00e4v\u00e4\u00e4n tiedon murusiin, joissa k\u00e4sitell\u00e4\u00e4n kyberoperaatioiden k\u00e4ytt\u00f6\u00e4 eri n\u00e4k\u00f6kulmista. Erityisesti tutkimuksessa tarkasteltiin valtioiden kyberoperaatioiden k\u00e4ytt\u00f6\u00e4 vuoden 2010 j\u00e4lkeisell\u00e4 ajanjaksolla, joiden tarkoituksena on ollut toisen valtion toimintaan vaikuttaminen. Yhteens\u00e4 tieteellisi\u00e4 julkaisuja tutkittiin tutkimuksen aikana 37 kappaletta, ja julkaisuja tukemaan k\u00e4ytettiin my\u00f6s muutamaa valtioiden ja organisaatioiden julkaisemaa dokumenttia. \n\nTuloksissa havainnoitiin kyberoperaatioiden k\u00e4ytt\u00f6menetelmi\u00e4 valtioiden v\u00e4lisess\u00e4 toiminnassa. Tuloksissa havaitaan kyberoperaatioihin liittyvi\u00e4 aspekteja niin hy\u00f6kk\u00e4yksellisen, puolustuksellisen, sotilaallisen, kuin my\u00f6s eri toimijoiden n\u00e4k\u00f6kulmasta. Lis\u00e4ksi tuloksissa selitet\u00e4\u00e4n osa-alueiden v\u00e4lisi\u00e4 riippuvuussuhteita. Tulosten havainnoitiin olevan kokonaiskattavia ja onnistuneen tutkimuksen tavoitteissa. Tutkimustulosten katsottiin olevan verifioitavissa ja toistettavissa, sek\u00e4 tarjoavan kokonaisakattavaa ymm\u00e4rryst\u00e4 akateemisen tutkimuksen piiriin ilmi\u00f6st\u00e4, jonka avulla voidaan my\u00f6s suorittaa jatkotutkimuksia aiheesta.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Cyber operations through information networks are among the newest means for nations to project their power onto other nation-states. The possibilities of their use were first brought to general awareness through the Stuxnet case around the turn of the 2010s. Since the public has been aware of the phenomenon for more than ten years, there are still unknown aspects of cyber opera-tions. This is especially true for the comprehensive interdisciplinary understanding of the subject.\n\nThis thesis aims to form a holistic understanding of cyber operations. The study aims to create this understanding by analysing and gathering the current information made of interdisciplinary, fragmented details. The goal is to provide scholars with a complete picture of the current understanding of the use of cyber operations between states. The thesis also aims to clarify the extent of current knowledge of the subject matter for the basis of potential future studies.\n\n The study was conducted using the version of the Grounded theory -methodology by Anselm Strauss and Juliet Corbin. The methodology was used to form a complete picture provided by scientific publications, each providing small amounts of information about the studied phenomenon from different perspectives. The study especially used the publications to study the usage of cyber operations from 2010 and beyond in cases where the goal has been to disrupt the target nations' actions or regular operations. In total, the thesis studied 37 publications from academic journals, as well as a few papers published by governments and organisations, to support the gathered information.\n\nThe results show methods of using cyber operations in interstate activities. We observed various aspects relating to cyber operations in offensive, defensive, and militaristic aspects while also providing the viewpoints of different actors. We also present dependencies between these sub-areas and concepts. The results provided a holistic understanding of the studied phenomenon, and therefore, the study was deemed successful in its goals. The results were also verifiable and repeatable while providing scholars with a new understanding on which to base their further studies.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2024-03-13T06:39:29Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2024-03-13T06:39:29Z (GMT). No. of bitstreams: 0\n Previous issue date: 2024", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "69", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "kyberoperaatio", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "verkkotoiminta", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Kyberoperaatiot poliittisen ja sotilaallisen vaikuttamisen keinoina", "language": null, "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202403132350", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Cyber Security", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Kyberturvallisuus", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.copyright", "value": "\u00a9 The Author(s)", "language": null, "element": "rights", "qualifier": "copyright", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": null, "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "hy\u00f6kk\u00e4ys", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "puolustus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kybersodank\u00e4ynti", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "grounded theory", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "politiikka", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "valtio (instituutio)", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberavaruus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|