fullrecord |
[{"key": "dc.contributor.advisor", "value": "Marttiin, Pentti", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.advisor", "value": "H\u00e4m\u00e4l\u00e4inen, Timo", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Kausto, Mikko", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Koivistoinen, Eetu", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2024-05-06T11:05:28Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2024-05-06T11:05:28Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2024", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/94712", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "T\u00e4m\u00e4n pro gradu \u2013tutkielman tavoitteena oli perehty\u00e4 kyberturvallisuuden\nkanssa ty\u00f6skentelevien organisaatioiden kyberturvallisuusosaamisen hallintaan\nja johtamiseen liittyviin prosesseihin ja k\u00e4yt\u00e4nteisiin, sek\u00e4 selvitt\u00e4\u00e4, kuinka tiedolla johtamisen ja osaamisen hallinnan k\u00e4yt\u00e4nteit\u00e4 hy\u00f6dynnet\u00e4\u00e4n organisaation\ntoiminnan ohjaamisessa nimenomaan kyberturvallisuuden saralla. Tutkimus toteutettiin laadullisena tutkimuksena, jonka teoriapohjana hy\u00f6dynnettiin kirjallisuuskatsausta. Laadullisen tutkimuksen aineisto ker\u00e4ttiin puolistrukturoitujen\nyksil\u00f6haastatteluiden my\u00f6t\u00e4. Tutkimuksiin valikoitui 9 eri organisaatiota. Tulokset analysoitiin laadullisen sis\u00e4ll\u00f6nanalyysin avulla. Tutkimuksen kirjallisuuskatsauksessa k\u00e4vi ilmi, ett\u00e4 kyberturvallisuus ilmi\u00f6n\u00e4 on johdettavissa tiedolla\njohtamisen ja osaamisen hallinnan k\u00e4yt\u00e4ntein yht\u00e4 lailla muiden organisaation\nydintoimintojen tapaan. Laadullinen tutkimus osoitti, ett\u00e4 organisaatiot tunnistavat kyberturvallisuuden olevan toden totta johdettavissa ja hallittavissa oleva\nilmi\u00f6, ja siihen liittyvi\u00e4 prosesseja toteutetaan organisaatioissa jo entuudestaan.\nKuitenkin huomattavaa oli se, ett\u00e4 tutkimuksessa k\u00e4vi ilmi, etteiv\u00e4t n\u00e4m\u00e4 prosessit v\u00e4ltt\u00e4m\u00e4tt\u00e4 ole viel\u00e4 kyberturvallisuuden kohdalla samalla tapaa vakioituja tai dokumentoituja, ja kyberturvallisuusosaamisen johtaminen ja hallinta\nvoisi hy\u00f6ty\u00e4 viel\u00e4 j\u00e4rjestelm\u00e4llisemm\u00e4st\u00e4 l\u00e4hestymistavasta. Teoreettiseen pohjaan verrattuna huomion arvoista oli my\u00f6s se, kuinka laadullisen tutkimuksen\npohjalta voitiin todeta organisaation sis\u00e4isten prosessien olevan valittua mallia\nmonimuotoisempia. My\u00f6s ulkoisten tekij\u00f6iden merkitys tunnistettiin osana organisaation tiedonkeruuta ja osaamisen kehitt\u00e4mist\u00e4, mit\u00e4 tutkimusta tukeva\nmalli ei tunnistanut. Tutkimuksen tulosten perusteella esitimmekin kattavampaa\nversiota tutkimukseen valitusta teoreettisesta mallista kyberturvallisuusosaamisen johtamiseen ja hallintaan. T\u00e4ss\u00e4 kehitetyss\u00e4 versiossa prosessien v\u00e4linen vuorovaikutus sek\u00e4 ulkoisten tekij\u00f6iden merkitys on otettu huomioon.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "The aim of this master's thesis was to familiarize oneself with the processes and\npractices related to the management of cyber security competence in\norganizations working with cyber security, and to find out how knowledge\nmanagement and competence management practices are utilized in guiding the\norganization's operations specifically in the field of cyber security. The study was\ncarried out as a qualitative study. However, the theoretical basis of the study was\nbuilt in the form of a literature review. The data for the qualitative study was\ncollected through semi-structured individual interviews. 9 different\norganizations were selected for the studies. The results were analyzed using\nqualitative content analysis. The literature review of the study revealed that\ncyber security as a phenomenon can be managed through knowledge\nmanagement and competence management practices just like other core\nfunctions of an organization. The qualitative study showed that organizations\ntruly recognize cyber security as a manageable phenomenon, and related\nprocesses are already being implemented in organizations. However, it should\nbe noted that the study showed that these processes may not yet be standardized\nor documented in the same way in cybersecurity, and the management of\ncybersecurity skills could benefit from an even more systematic approach.\nCompared to the theoretical basis, it was also worth noting how qualitative\nresearch made it possible to conclude that the internal processes of the\norganization are more diverse than modelled in the framework chosen for the\nstudy. The importance of external factors was also recognized as part of the\norganization's data collection and competence development, which the selected\nmodel didn\u2019t recognise. Based on the results of the study, we presented a more\ncomprehensive version of the chosen theoretical model for the management of\ncyber security competence. In this developed version, the interaction between\nprocesses, as well as the importance of external factors, are taken into account.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2024-05-06T11:05:28Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2024-05-06T11:05:28Z (GMT). No. of bitstreams: 0\n Previous issue date: 2024", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "107", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "osaamisen hallinta", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kyberturvallisuusosaaminen", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Kyberturvallisuusosaamisen hallinta ja johtaminen", "language": null, "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202405063479", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.copyright", "value": "\u00a9 The Author(s)", "language": null, "element": "rights", "qualifier": "copyright", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": null, "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tiedolla johtaminen", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "osaaminen", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|