fullrecord |
[{"key": "dc.contributor.advisor", "value": "Mikkonen, Tommi", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Niemel\u00e4inen, Atro", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2024-05-23T07:37:15Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2024-05-23T07:37:15Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2024", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/95108", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Hy\u00f6kk\u00e4ykset kyberturvallisuutta vastaan ovat lis\u00e4\u00e4ntyneet ja kehittyneet huimaa vauhtia, jonka takia eri alojen yritykset tarvitsevat tietoturvan johtamisj\u00e4rjestelm\u00e4n turvaamaan organisaationsa informaatiota. Muun muassa ISO 27001 on standardi, jonka viitekehyksien mukaan yritykset voivat tehd\u00e4 oman tietoturvan johtamisj\u00e4rjestelm\u00e4ns\u00e4 ja hakea siihen sertifikaattia. Samaan aikaan teko\u00e4ly on kehittynyt ja sen k\u00e4ytt\u00f6 on yleistynyt huimaa vauhtia ja organisaatiot ottavatkin k\u00e4ytt\u00f6\u00f6n eri teko\u00e4lyohjelmia.\nTietoturvan johtamisj\u00e4rjestelm\u00e4n rakentaminen on aikaa ja rahaa viev\u00e4 prosessi. T\u00e4ss\u00e4 Pro Gradu -tutkielmassa tutkitaan, kuinka t\u00e4t\u00e4 prosessia voitaisiin tehostaa hy\u00f6dynt\u00e4m\u00e4ll\u00e4 teko\u00e4ly\u00e4 muun muassa dokumentoinnin ensimm\u00e4isten luonnosten generoimisessa. Tutkielma k\u00e4sittelee Kempower nimisen yrityksen tietoturvan johtamisj\u00e4rjestelm\u00e4 projektia ja siihen kuuluvia lukuisia eri vaiheita. Tutkielmassa k\u00e4sitell\u00e4\u00e4n my\u00f6s teko\u00e4lyn riskej\u00e4, tietoturvan elinkaarta ja muun muassa ISO 27001 standardia.\nTutkielma toteutettiin puolistrukturoituja haastatteluita hy\u00f6dynt\u00e4en. Haastateltaviksi valikoitui henkil\u00f6it\u00e4, jotka olivat projektissa mukana. Kempower nimitti projektiin eri liiketoimintafunktioista kyberresurssi henkil\u00f6it\u00e4, joiden teht\u00e4v\u00e4n\u00e4 oli tarkastaa Kempowerin kyberturvallisuus tiimin teko\u00e4lyn avulla tekem\u00e4t dokumentit.\nTutkimuksen tulokset osoittivat, ett\u00e4 teko\u00e4lyn hy\u00f6dynt\u00e4minen tietoturvan johtamisj\u00e4rjestelm\u00e4n tekemisess\u00e4 s\u00e4\u00e4sti paljon resursseja. Sen huomasi selkeimmin projektin dokumentaatio vaiheessa. Teko\u00e4ly teki projektista mielekk\u00e4\u00e4mm\u00e4n ja se toi uusia n\u00e4k\u00f6kulmia asioihin. Teko\u00e4lyn avulla p\u00e4\u00e4stiin my\u00f6s eroon tyhj\u00e4n paperin kammosta, kun sy\u00f6tt\u00e4m\u00e4ll\u00e4 kehotteen teko\u00e4lylle sai aina dokumentin ty\u00f6st\u00f6n k\u00e4yntiin nopeasti. Tiedonhaku on aikaa viev\u00e4 prosessi, joka saatiin eliminoitua melkein kokonaan teko\u00e4ly\u00e4 hy\u00f6dynt\u00e4m\u00e4ll\u00e4. Tutkielmassa k\u00e4siteltiin my\u00f6s teko\u00e4lyn k\u00e4yt\u00f6n haittapuolia projektissa, joita oli muun muassa Kempower spesifin tiedon puute dokumentaation luonnoksista ja oppimisen puute ISO 27001 standardin eri kontrolleista teko\u00e4lyn k\u00e4yt\u00f6n takia.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Attacks against cyber security have increased and developed at a fast pace, which is why organizations need an information security management system (ISMS) to secure their organization's information assets. ISO 27001 is a standard which companies can use to create their own ISMS and apply for a certificate for it. At the same time, AI has evolved, and its use has become more common at a fast pace as organizations are using various AI tools.\nBuilding an information security management system is a time- and money-consuming process. This master\u2019s thesis examines how this process could be made more efficient by using artificial intelligence (AI) in generating the first drafts of a control document for example. The thesis studies the ISMS project and its numerous different phases of a company called Kempower. The thesis also discusses the risks of AI, information security life cycle, and among other things, the ISO 27001 standard.\nIn this thesis there was semi-structured interviews. People who were involved in the project were selected for interviews. Kempower appointed cyber resource personnels from different business functions to the project, whose task was to review the documents created by Kempower's cyber security team using artificial intelligence.\nThe results of the study showed that utilizing artificial intelligence in creating an ISMS saved a lot of resources. It was most evident in the project\u2019s documentation phase. AI made the project more interesting to work on and brought new perspectives to different things. With the help of AI, the fear of blank paper was also eliminated, as by entering a prompt to the AI, the processing of the document could always be started quickly and not from scratch. Searching for information is a time-consuming process that was almost completely eliminated by utilizing AI. The thesis also addressed the disadvantages of using AI in the project, such as the documents missing Kempower specific information, and lack of learning about different controls of the ISO 27001 standard due to the use of AI.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2024-05-23T07:37:15Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2024-05-23T07:37:15Z (GMT). No. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "49", "language": null, "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "eng", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.title", "value": "Enhancing Productivity with AI During the Development of an ISMS, Case Kempower", "language": null, "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202405233872", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Cyber Security", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Kyberturvallisuus", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.copyright", "value": "\u00a9 The Author(s)", "language": null, "element": "rights", "qualifier": "copyright", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "restrictedAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "The author has not given permission to make the work publicly available electronically. Therefore the material can be read only at the archival workstation at Jyv\u00e4skyl\u00e4 University Library (https://kirjasto.jyu.fi/en/workspaces/facilities/facilities#autotoc-item-autotoc-2).", "language": "en", "element": "rights", "qualifier": "accessrights", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "Tekij\u00e4 ei ole antanut lupaa avoimeen julkaisuun, joten aineisto on luettavissa vain Jyv\u00e4skyl\u00e4n yliopiston kirjaston arkistoty\u00f6semalta. Ks. https://kirjasto.jyu.fi/fi/tyoskentelytilat/laitteet-ja-tilat#autotoc-item-autotoc-2.", "language": "fi", "element": "rights", "qualifier": "accessrights", "schema": "dc"}]
|