fullrecord |
[{"key": "dc.contributor.advisor", "value": "Clements, Kati", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Klemetti, Anni", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2025-01-02T06:30:04Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2025-01-02T06:30:04Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2024", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/99221", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "2020-luvulla tietoturvaa uhkaavat kriisit ovat lis\u00e4\u00e4ntyneet huomattavasti, mik\u00e4 tekee aiheesta hyvin ajankohtaisen ja t\u00e4rke\u00e4n. T\u00e4m\u00e4 tutkimus tarkastelee eri tietoturvauhkia, joita valtiot, erityisesti pohjoismaat Ruotsi, Norja, Tanska, Islanti sek\u00e4 p\u00e4\u00e4tarkastelukohteena Suomi, ovat kohdanneet kyseisen\u00e4 aikana. Tutkimuksessa k\u00e4sitell\u00e4\u00e4n, miten n\u00e4ihin uhkiin ja kriiseihin valmistaudutaan ja vastataan niin valtioiden sis\u00e4ll\u00e4, kuin kansainv\u00e4lisen yhteisty\u00f6n kautta. Tarkastelun kohteena ovat vuoden 2020 aikana ja j\u00e4lkeen alkaneet kriisit, kuten COVID-19 pandemia ja Ukrainan sota. Tutkimus korostaa kehittyv\u00e4n teknologian roolia kriisitilanteissa sek\u00e4 teknologian tuomia haasteita ja mahdollisuuksia tietoturvan johtamisessa ja kriisitilanteista selviytymisess\u00e4. Tulokset osoittavat, ett\u00e4 pohjoismaat ovat korostaneet erityisesti kansainv\u00e4lisen yhteisty\u00f6n merkityst\u00e4, teknologian hy\u00f6dynt\u00e4mist\u00e4 sek\u00e4 jatkuvaa kehitt\u00e4mist\u00e4. On t\u00e4rke\u00e4\u00e4 ymm\u00e4rt\u00e4\u00e4 teknologian monimutkaiset haasteet, jotta voidaan luoda\r\nvahvoja strategioita, jotka suojelevat sek\u00e4 kansallista turvallisuutta ett\u00e4 yksitt\u00e4isten kansalaisten turvallisuutta. T\u00e4m\u00e4 tutkimus toteutettiin kirjallisuuskatsauksena. Kirjallisuus ker\u00e4ttiin vertaisarvioiduista tutkimusartikkeleista, aikakauslehdist\u00e4 ja muusta kirjallisuudesta. Tutkimus auttaa ymm\u00e4rt\u00e4m\u00e4\u00e4n, mink\u00e4laisia tietoturva- ja kyberuhkia erilaiset kriisitilanteet voivat aiheuttaa ja miten ne vaikuttavat edelleen valtioihin ja kansalliseen turvallisuuteen. Tietoturvauhat voivat vaikuttaa valtioihin monilla eri tavoilla ja t\u00e4ss\u00e4 tutkimuksessa ehdotetaankin my\u00f6s toimenpiteit\u00e4 paremman tietoturvan saavuttamiseksi tulevaisuudessa.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "In the 2020s, cybersecurity threats have significantly increased, making the topic very relevant and important. This study examines various cybersecurity threats faced by states, particularly the Nordic countries, Sweden, Norway, Denmark, Iceland, and primarily Finland, during this period. The study explores how these threats and crises are prepared for and responded to both within states and through international cooperation. The focus is on crises that began or had an impact during and after 2020, such as the COVID-19 pandemic and the war in Ukraine. The study emphasizes the role of emerging technologies in crisis situations, as well as the challenges and opportunities they present for information security management and crisis response. The results show that the Nordic countries have emphasized the importance of cooperation, technology, and continuous development of international cooperation in particular. It is crucial to understand the complex challenges posed by technology to develop strong strategies that protect both national security and individual citizens' safety. This study was conducted as a literature\r\nreview. Literature was collected from peer-reviewed research articles, journals, and other sources. The research helps understand the types of cybersecurity threats that various crisis situations can cause and how they continue to affect states and national security. Cybersecurity threats can impact states in various ways which is why this study also proposes measures to achieve better cybersecurity in the future.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2025-01-02T06:30:04Z\r\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2025-01-02T06:30:04Z (GMT). No. of bitstreams: 0\r\n Previous issue date: 2024", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "46", "language": null, "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "tietoturvajohtaminen", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Tietoturvan johtaminen kriisitilanteissa pohjoismaissa", "language": null, "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202501021002", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": null, "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": null, "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kansallinen turvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "turvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "Pohjoismaat", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kriisit", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kriisinhallinta", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|