fullrecord |
[{"key": "dc.contributor.advisor", "value": "Harjumaa, Lasse", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Nuutinen, Mikko", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2024-12-13T06:56:32Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2024-12-13T06:56:32Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2024", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/98986", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "T\u00e4m\u00e4 tutkielma k\u00e4sittelee IoT-j\u00e4rjestelmien k\u00e4ytt\u00f6\u00f6nottoa organisaatioissa keskittyen erityisesti k\u00e4ytt\u00e4j\u00e4hyv\u00e4ksynn\u00e4n varmistamiseen. IoT-teknologia\ntuo mukanaan uudenlaisia mahdollisuuksia tiedon reaaliaikaiseen ker\u00e4\u00e4miseen ja\nk\u00e4sittelyyn, mutta sen k\u00e4ytt\u00f6\u00f6notto on usein haastavaa k\u00e4ytt\u00e4jien asenteiden, tietoturvan ja j\u00e4rjestelm\u00e4n skaalautuvuuden n\u00e4k\u00f6kulmasta. Tutkimuksessa kehitettiin IoT-j\u00e4rjestelmiin mukautettu teknologian hyv\u00e4ksynt\u00e4malli, joka ottaa huomioon IoT-j\u00e4rjestelmille ominaiset erityispiirteet, kuten koetun luotettavuuden ja tietoturvan. Tutkimuksessa perehdyttiin k\u00e4ytt\u00e4j\u00e4hyv\u00e4ksynn\u00e4n menetelmiin ja tyypillisiin tietoj\u00e4rjestelm\u00e4projektien haasteisiin, jotka vaikuttavat k\u00e4ytt\u00e4j\u00e4hyv\u00e4ksynt\u00e4\u00e4n. Lis\u00e4ksi etsittiin IoT-ratkaisujen erityispiirteit\u00e4, jotka tulisi ottaa huomioon k\u00e4ytt\u00e4j\u00e4hyv\u00e4ksynt\u00e4\u00e4 arvioitaessa. Tutkimus tehtiin konstruktiivisella tutkimusotteella. \nIoT tarjoaa organisaatioille ty\u00f6kalun, jonka avulla voidaan suunnitella k\u00e4ytt\u00e4j\u00e4l\u00e4ht\u00f6isi\u00e4 k\u00e4ytt\u00f6\u00f6nottostrategioita ja minimoida k\u00e4ytt\u00f6\u00f6noton riskej\u00e4. Tutkielman tulokset\nvoivat auttaa organisaatioita edist\u00e4m\u00e4\u00e4n IoT-j\u00e4rjestelmien sujuvaa k\u00e4ytt\u00f6\u00f6nottoa ja parantamaan teknologian hyv\u00e4ksynt\u00e4\u00e4 k\u00e4ytt\u00e4jien keskuudessa.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2024-12-13T06:56:32Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2024-12-13T06:56:32Z (GMT). No. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "54", "language": null, "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "CC BY-NC-ND 4.0", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.title", "value": "IoT -j\u00e4rjestelmien k\u00e4ytt\u00f6\u00f6notto - k\u00e4ytt\u00e4j\u00e4hyv\u00e4ksynn\u00e4n varmistaminen", "language": null, "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202412137808", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Master's Degree Programme in Computer Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietojenk\u00e4sittelytieteen maisteriohjelma", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.copyright", "value": "\u00a9 The Author(s)", "language": null, "element": "rights", "qualifier": "copyright", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://creativecommons.org/licenses/by-nc-nd/4.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|