fullrecord |
[{"key": "dc.contributor.advisor", "value": "Lehto, Martti", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "N\u00e4tynki, Matti", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2024-11-08T14:44:59Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2024-11-08T14:44:59Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2024", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/98238", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Teko\u00e4lyn k\u00e4ytt\u00f6 on yleistynyt runsaasti viime vuosina. Runsas k\u00e4yt\u00f6n lis\u00e4\u00e4n-tyminen on teko\u00e4lyn etujen ohella tuonut sit\u00e4 k\u00e4ytt\u00e4ville organisaatioille my\u00f6s uusia uhkia kyberturvallisuuteen liittyen. T\u00e4m\u00e4 tutkimus tarkastelee teko\u00e4lyn roolia kyberturvallisuusjohtamisessa. Tukevien tutkimuskysymys-tens\u00e4 avulla se pyrkii esitt\u00e4m\u00e4\u00e4n uhkat, joita teko\u00e4ly osaltaan luo sek\u00e4 ehdot-tamaan n\u00e4ille varautumiskeinoja. Tutkimuksen tavoitteena on luoda lukijal-leen syvempi ymm\u00e4rrys sek\u00e4 teko\u00e4lyst\u00e4 ett\u00e4 kyberturvallisuudesta ja ennen kaikkea n\u00e4iden v\u00e4lisest\u00e4 vuorovaikutuksesta. Tutkimus toteutettiin laadulli-sin tutkimusmenetelmin muodostamalla teoreettinen viitekehys saatavilla olevista kirjallisista l\u00e4hteist\u00e4. Ymm\u00e4rryksen luomiseksi tutkimuksen toteu-tukselle oli ensisijaista luoda ensin ymm\u00e4rrys sen keskeisist\u00e4 k\u00e4sitteist\u00e4 kuten kyberturvallisuus, kybertoimintaymp\u00e4rist\u00f6, kyberturvallisuusjohtaminen, uhka, riski ja varautuminen. Teko\u00e4lyn osalta tutkimus esitt\u00e4\u00e4 eri teknologia-malleja kuten koneoppiminen sek\u00e4 syv\u00e4oppiminen. Lopuksi, aineistoanalyy-sin pohjalta tutkimus osoittaa tutkimustulokset. N\u00e4iden perusteella tutkimus voi todeta teko\u00e4lyn luovan uhkia kyberturvallisuusjohtamiselle, kuten tehos-tunut tiedusteluprosessi sek\u00e4 kohdennetummat tietojenkalastelut ja tunkeu-tumisyritykset. Tutkimus esitt\u00e4\u00e4 miten pitk\u00e4lle aiemminkin k\u00e4ytetyt perintei-set kyberturvallisuuden hallintamallit kuten riitt\u00e4v\u00e4t nyky\u00e4\u00e4nkin varsin pit-k\u00e4lle my\u00f6s teko\u00e4lyn hallinnassa. Tutkimus luo lis\u00e4\u00e4 ymm\u00e4rryst\u00e4 teko\u00e4lyn ja kyberturvallisuuden v\u00e4lisest\u00e4 suhteesta sek\u00e4 luo n\u00e4kemyksi\u00e4 t\u00e4h\u00e4n yht\u00e4l\u00f6\u00f6n. N\u00e4iden avulla tutkimuksen lukijat voivat kehitt\u00e4\u00e4 teko\u00e4lyn hallintaa omissa ymp\u00e4rist\u00f6iss\u00e4\u00e4n.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2024-11-08T14:44:59Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2024-11-08T14:44:59Z (GMT). No. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "68", "language": null, "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.title", "value": "Teko\u00e4lyn vaikutus kyberturvallisuusjohtamiseen: uhkat ja niihin varautuminen", "language": null, "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202411087086", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Kyberturvallisuuden maisteriohjelma", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Master's Degree Programme in Cyber Security", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.copyright", "value": "\u00a9 The Author(s)", "language": null, "element": "rights", "qualifier": "copyright", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|