fullrecord |
[{"key": "dc.contributor.advisor", "value": "Halttunen, Veikko", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Kettunen, Aku", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2024-09-24T06:04:35Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2024-09-24T06:04:35Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2024", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/97159", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Teknologian nopea kehitys on aiheuttanut merkitt\u00e4vi\u00e4 yksityisyysongelmia erityisesti tietojen ker\u00e4\u00e4misen ja sen k\u00e4sittelyn osalta ja n\u00e4ihin ongelmiin on vaihtelevia reaktioita: Euroopan unioni pyrkii suojelemaan yksil\u00f6n yksityisyytt\u00e4 ja rajoittamaan yksityist\u00e4 tietoa ker\u00e4\u00e4vien teknologioiden k\u00e4ytt\u00f6\u00e4, kun taas Kiina\nk\u00e4ytt\u00e4\u00e4 niit\u00e4 luodakseen laajan valvontainfrastruktuurin. Koska yksityisyyden\nm\u00e4\u00e4ritelm\u00e4 vaihtelee kulttuurien ja kansojen v\u00e4lill\u00e4, tutkielmassa tarkasteltiin,\nkuinka yksityisyys m\u00e4\u00e4ritell\u00e4\u00e4n Kiinassa ja kuinka t\u00e4m\u00e4 vaikuttaa sen tiedonkeruuseen ja teknologian k\u00e4ytt\u00f6\u00f6n. Lis\u00e4ksi tutkielmassa selvitettiin, mit\u00e4 teknologioita tiedonker\u00e4yksess\u00e4 ja tarkkailussa k\u00e4ytet\u00e4\u00e4n ja miten ker\u00e4tty\u00e4 tietoa k\u00e4ytet\u00e4\u00e4n. Erityisesti tutkielmassa keskityttiin kansalaisen n\u00e4k\u00f6kulmaan, sek\u00e4 mit\u00e4\nhy\u00f6tyj\u00e4 ja haittoja Kiinan l\u00e4hestymistavasta heille on. Tutkimuskysymys oli seuraava: Onko yksityisyyden uhraaminen teknologian hy\u00f6tyjen saamiseksi hyv\u00e4ksytt\u00e4v\u00e4 l\u00e4hestymistapa? Aiheesta l\u00f6ytyy aiempaa tutkimusmateriaalia, mutta\ntutkimuskysymys ja ajankohta antavat t\u00e4rke\u00e4n n\u00e4k\u00f6kulman aiheeseen ja tarjoavat vaihtoehtoisen n\u00e4k\u00f6kulman teknologian ja yksityisyyden suhteelle. Tutkielma toteutettiin systemaattisena kirjallisuuskatsauksena. Tutkielman aineistona oli 30 vertaisarvioitua englanninkielist\u00e4 tutkimusta, jotka haettiin Google\nScholar, Taylor & Francis, ja Elsevier \u2013 tietokantoja k\u00e4ytt\u00e4en hakutermej\u00e4 kuten\nData privacy in China, Social Credit System, ja Technology and privacy. Tutkielmaan k\u00e4ytettiin sek\u00e4 kansainv\u00e4lisi\u00e4, ett\u00e4 kiinalaisia tutkimusartikkeleita. Tutkielmassa selvisi, ett\u00e4 Kiinassa p\u00e4\u00e4asiassa yhteis\u00f6n etua arvostavan kulttuurin takia\nyksityisyytt\u00e4 ei ole pidetty korkeassa arvossa. Kuitenkin yksil\u00f6n yksityisyyden\nt\u00e4rkeys on noussut etenkin uusien teknologioiden vaatiessa hyvin arkaluontoista\ninformaatiota. Massadataa analysoimalla Kiina saa ker\u00e4tty\u00e4 suuren m\u00e4\u00e4r\u00e4n yksityist\u00e4 informaatiota ja arkaluontoisen informaation ker\u00e4\u00e4miseen k\u00e4ytet\u00e4\u00e4n p\u00e4\u00e4asiassa kasvojentunnistusteknologiaa ja GPS-j\u00e4ljityssovelluksia. Ker\u00e4tty\u00e4 informaatiota k\u00e4ytet\u00e4\u00e4n etenkin sosiaaliseen luottoluokitusj\u00e4rjestelm\u00e4\u00e4n. Kiinan l\u00e4hestymistavasta yksityisyyteen on selkeit\u00e4 hy\u00f6tyj\u00e4 kansalaisille, kuten korkeampi turvallisuus. Kuitenkin yksityisen informaation k\u00e4ytt\u00f6 mm. v\u00e4hemmist\u00f6jen syrjint\u00e4\u00e4n vahvasti kyseenalaistaa sen, voiko Kiinan tiedusteluj\u00e4rjestelm\u00e4 olla\nkansalaisille eduksi.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "The rapid development of technology poses significant privacy concerns, particularly regarding information collection and data privacy. Global reactions vary;\nthe European Union aims to protect individual privacy and limit the use of private information collecting technologies, while China uses them to build extensive surveillance infrastructure. Given the cultural differences in defining privacy, this research investigates how privacy is defined in China, its influence on\ninformation gathering, and the use of technology. It examines what technologies\nare used for information collection and surveillance, and how the collected information is used. A specific focus was on the Chinese citizens' perspectives and the\nadvantages and disadvantages of China's approach. The research question was\nthe following: Is sacrificing privacy for technological benefits an acceptable approach? Prior research material on the subject is available, but the research question and recency of the study offer an important point of view to the subject as\nwell as an optional viewpoint on the relationship between technology and privacy. Conducted as a systematic literature review, the study utilized 30 crossevaluated English-language articles sourced from Google Scholar, Taylor & Francis, and Elsevier with terms like \"Data privacy in China,\" \"Social Credit System,\"\nand \"Technology and privacy.\" Both international and Chinese studies were included. The research article found that because of China's group-based culture\nindividual privacy has not been highly valued. However, its importance is growing especially because of technologies demanding sensitive information. China\ncan collect large amounts of private information by analyzing big data, and sensitive private information is collected using technologies like facial recognition\nand GPS applications. The collected information is primarily used for the Social\nCredit System. While China's approach offers benefits such as enhanced security,\nits use of private information for minority discrimination and other issues raises\nserious concerns about the system's overall benefit to citizens.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2024-09-24T06:04:35Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2024-09-24T06:04:35Z (GMT). No. of bitstreams: 0\n Previous issue date: 2024", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "31", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "yksityisyys verkossa", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "datanker\u00e4ys", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "sosiaalinen luottoluokitusj\u00e4rjestelm\u00e4", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Teknologian vaikutus yksityisyyteen Kiinassa", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202409246037", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "koneoppiminen", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "big data", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "Kiina", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "yksityisyys", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "yksil\u00f6nsuoja", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "teknologinen kehitys", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "teknologia", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "informaatio", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|