fullrecord |
[{"key": "dc.contributor.advisor", "value": "Lehto, Martti", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Postareff, Sadetta", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2024-11-27T07:44:23Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2024-11-27T07:44:23Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2024", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/98636", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Jatkuvuudenhallinta organisaatioissa on kaiken toiminnan perusedellytyksi\u00e4. Ilman sit\u00e4 toimijat eiv\u00e4t ei pysty toipumaan niiden liiketoimintaa merkitt\u00e4v\u00e4sti h\u00e4iritsevist\u00e4, tai kokonaan keskeytt\u00e4vist\u00e4 tapahtumista riitt\u00e4v\u00e4n tehokkaasti ja nopeasti. Jatkuvasti ja nopeasti digitalisoituvassa yhteiskunnassa organisaatiot eiv\u00e4t voi en\u00e4\u00e4 toimia kybermaailman ulkopuolella, ja n\u00e4in ollen kyberuhat muodostavat n\u00e4ille koko ajan merkityksellisemm\u00e4n uhkakent\u00e4n. Siksi kyberturvallisuuden merkitys jatkuvuudenhallinnan osana kasvaa jatkuvasti ja my\u00f6s nousevien uhkien tunnistaminen on entist\u00e4 kriittisemp\u00e4\u00e4.\n\nOrganisaatiokentt\u00e4 on hyvin moninainen ja hajautunut niin toimijoiden koon kuin resurssienkin puolelta, joten my\u00f6s varautumisen k\u00e4yt\u00e4nteet ja toimintatavat vaihtelevat t\u00e4ll\u00e4 puolella laajasti. Lains\u00e4\u00e4d\u00e4nn\u00f6n, standardien ja auditointikriteerist\u00f6jen, viranomaistoimintaa ohjaavien vaatimusten ja asiantuntija-palautteiden avulla haetaan parhaita k\u00e4yt\u00e4nteit\u00e4, jotka toimisivat erikokoisissa organisaatioissa toimialasta riippumatta.\n\nTutkimuksessa selvitet\u00e4\u00e4n teoreettisen tiedon, kirjallisuuskatsauksen, sek\u00e4 empiirisen tutkimuksen keinoin kyselyiden ja haastatteluiden avulla mitk\u00e4 ovat merkitt\u00e4vimpi\u00e4 t\u00e4m\u00e4nhetkisi\u00e4 ja nousevia kyberuhkia, miten hyvin kyberturvallisuus on huomioitu ja tunnistettu t\u00e4ll\u00e4 hetkell\u00e4 osana organisaatioiden jatkuvuudenhallintaa, sek\u00e4 mit\u00e4 keinoja n\u00e4iden osa-alueiden vuorovaikutuksen parantamiseen ja tehostamiseen voidaan tunnistaa ja kehitt\u00e4\u00e4 jatkoa ajatellen ennakoivasti, minimoiden toiminnan jatkuvuuteen vaikuttavia kyberuhkia.\n\nTutkimuksen tarkoituksena on tuottaa katsaus organisaatioiden jatkuvuutta vaarantaviin kyberuhkiin nyt, sek\u00e4 ennakoivasti tulevaisuuden trendit huomioiden. Samalla pyrit\u00e4\u00e4n tarjoamaan erikokoisiin toimintaymp\u00e4rist\u00f6ihin soveltuvaa tietoa kyberturvallisuuden keinojen tehokkaammasta hy\u00f6dynt\u00e4misest\u00e4 jatkuvuudenhallinnan osana.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Business continuity management is a prerequisite for all operations. Without it, organizations won\u00b4t be able to recover effectively enough from incidents that disrupt or stop their businesses. In the continuously and rapidly digitalizing world, actors cannot operate outside of cyberspace anymore, and therefore, cyber threats compose an increasingly significant threat environment for organizations. Consequently, the meaning of cybersecurity as a part of business continuity management is constantly growing.\n\nThe organization domains are very multifaceted and diverse, so the policies and ways of working also differ extensively. In the research, we look for best practices from critical infrastructure actors and authorities, as well as from information security and business continuity standards to provide working solutions suitable for variable organizations.\n\nBy using the theoretical framework and literature review, as well as empirical research via questionnaires and interviews the research examines how well cybersecurity is currently part of the business continuity management in organizations, and what means can be recognized to improve and enhance the interaction between these areas in the future to minimize the cyber threats compromising organization\u00b4s business continuity.\n\nThis research aims to provide information on current and trending cyber threats that impact business continuity in diverse company organizations. At the same time, it aims to more effectively use cybersecurity as a tool and means of business continuity management. This is performed by examining the current situation in companies, future trends and requirements, and, based on these findings, providing solutions for improvement.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2024-11-27T07:44:23Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2024-11-27T07:44:23Z (GMT). No. of bitstreams: 0\n Previous issue date: 2024", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "104", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "kyberuhat", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "jatkuvuus", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "jatkuvuudenhallinta", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "nousevat teknologiat", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kybertrendit", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "BCM", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Kyberturvallisuuden tehokkaampi hy\u00f6dynt\u00e4minen organisaatioiden jatkuvuudenhallinnassa nyt ja huomenna", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202411277460", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Kyberturvallisuus", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Kyberturvallisuus", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "organisaatiot", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "riskienhallinta", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "varautuminen", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "digitalisaatio", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|