Aihe-ehdotuksia
- 601 14
- Information Systems Science 13
- Tietojärjestelmätiede 13
- riskienhallinta 6
- kyberturvallisuus 5
- organisaatiot 4
- digitalisaatio 3
- tekoäly 3
- tietojärjestelmätiede 3
- tietoturva 3
- turvallisuus 3
- yritykset 3
- Cyber Security 2
- Kyberturvallisuus 2
- analyysi 2
- automaatio 2
- big data 2
- data 2
- johtaminen 2
- liiketoiminta 2
- tietoturvallisuus 2
- 2041 1
- 20423 1
- 3131 1
- 602 1
- Computer Science 1
- Cyber security 1
- EU:n verkko- ja tietoturvadirektiivi 1
- Economics 1
- GDPR 1
-
1
Artificial intelligence governance, management and risk management - A look into EU AIA, standards and other frameworks from practical level
Julkaistu 2024“…The study underscores the importance of selecting and calibrating governance frameworks appropriately, as inadequate frameworks render digital security efforts ineffective. Closer examination is also done in order to clarify structures of frameworks for effective governance and management of AI systems, risks and digital security aspects. …”
Hae kokoteksti Hae kokotekstiPro gradu -
2
Value co-creation and co-destruction in identity and access management service platform : case study
Julkaistu 2021“…These goals were contributing to the practical case by providing insights on the potential benefits and risks. Based on the main theoretical foundations on digital platforms and service-dominant logic, distinct frameworks for both value co-creation and co-destruction were used as a lens to study the phenomena. …”
Hae kokoteksti Hae kokotekstiPro gradu -
3
Best practices in controlling trade-based money laundering
Julkaistu 2020Hae kokoteksti Hae kokotekstiPro gradu -
4
Bringing AI into complex industrial Supply Chain Management: A Strategic and systematic approach
Julkaistu 2024“…Cyber Security, Master’s Thesis Supervisor(s): Tiihonen, Timo Keywords: supply chain management, industrial supply chain, digital transformation, business processes, artificial intelligence, cybersecurity, resilience, capability, design science research, data management Globalization and digitalization challenge supply chains with complex demands, such as a fragmented supplier base and increased economic profitability demands. …”
Hae kokoteksti Hae kokotekstiPro gradu -
5
The concept of growth hacking : case study on Finnish companies
Julkaistu 2023Hae kokoteksti Hae kokotekstiPro gradu -
6
NIS-direktiivin kahdet kasvot : riskit ja riskienhallinta
Julkaistu 2017“…The impacts are examined from the businesses point of view considering the two sides of the Directive: risks and risk management. Even though the directive aims to bring companies more effective risk management practices, it also brings risks to the company’s operations. …”
Hae kokoteksti Hae kokotekstiPro gradu -
7
Digitaalisten yrityslompakoiden potentiaalisimmat ansaintamallit asiakasorganisaatioiden näkökulmasta
Julkaistu 2024“…Self-sovereign identity is a new approach to digital identity management where individual's digital identity is stored in a digital wallet, allowing identity-related information to be managed and shared securely without a centralized third party. …”
Hae kokoteksti Hae kokotekstiPro gradu -
8
Oikeushallinnon tietotekniikkaympäristön uhkamallinnus
Julkaistu 2024“…Threat modeling is a key part of the target organization's risk management because some of the identified risks were transferred for further processing in the risk management process. …”
Hae kokoteksti Hae kokotekstiPro gradu -
9
Kyberturvallisuuden strateginen johtaminen yrityksissä
Julkaistu 2020“…This bachelor’s thesis explores cyber security and how it can be managed strategically. Strategic management of cyber security enable to manage challenging and complex entities so that many of the risks posed by cyber threats can be minimized. …”
Hae kokoteksti Hae kokotekstiKandityö -
10
Digitaalisen jalanjäljen vaikutus yksityisyyteen : poliisien käsitykset, kokemukset ja hallinnan keinot
Julkaistu 2021“…Police officers were aware of the issues surrounding the formation of the digital footprint. The potential impact of the digital footprint on privacy as well as the risks were recognized on both a general and personal level. …”
Hae kokoteksti Hae kokotekstiPro gradu -
11
Tuotannollisten IT-ympäristöjen haasteet kyberuhkien hallittavuuden näkökulmasta
Julkaistu 2022“…To secure the organization's critical infrastructure and IT environment and to prevent cyber threats, it is essential to identify potential risks and implement the necessary controls to reduce the risks. …”
Hae kokoteksti Hae kokotekstiPro gradu -
12
Jatkuvuuden hallinnan kehittäminen : pienten yritysten näkökulma ja pilvipalveluiden erityispiirteet
Julkaistu 2024“…Business continuity management in small businesses is focused on protecting physical assets and preparing for personnel risks. …”
Hae kokoteksti Hae kokotekstiPro gradu -
13
IEC 62443-4-2 standardin hyödyt ja haasteet yritykselle : systemaattinen kirjallisuuskatsaus
Julkaistu 2023“…Industry is becoming more digital as well as the rest of the world, but this digitalization also brings risks. …”
Hae kokoteksti Hae kokotekstiKandityö -
14
Massadatan hyödyntäminen tietoturvallisuuden näkökulmasta
Julkaistu 2021“…This is followed by a review of the information security risks involved. After that we will have a look at how organizations can manage some of these risks. …”
Hae kokoteksti Hae kokotekstiKandityö -
15
Digitalisaation vaikutukset taloushallintopalveluita tuottaviin yrityksiin
Julkaistu 2019“…As much as 94 to 98 percent of these jobs are at risk. The purpose of this study was to find out how digitalization, automation of routines, robotics, and artificial intelligence are expected to affect the business structure, organizations, tasks, and employees in Finland in the following years. …”
Hae kokoteksti Hae kokotekstiPro gradu -
16
Data-analytiikka rahoitusmarkkinoilla
Julkaistu 2021“…Examples include financial information management and reference data management, implementation and preparation, regulation, risk analysis, trading analysis, credit rating or proactive analysis, and monitoring and reporting. …”
Hae kokoteksti Hae kokotekstiKandityö -
17
Kybersietoisuuden tarkastustulosten hyödyntämismahdollisuudet : tapaustutkimus
Julkaistu 2021“…Cyber resilience and related methods should be used together with more traditional risk management processes. This thesis is a qualitative case study and was commissioned by the case organization to analyze the processes and activities related to cyber resilience. …”
Hae kokoteksti Hae kokotekstiPro gradu -
18
Tietoturvatietoisuusohjelman vaatimukset Kelan tietoturvayksikössä
Julkaistu 2024“…We live in a world where romance scammers exploit innocent people for financial gain, sensitive health information is sold on the dark web, and cyberattacks can disrupt access to bank accounts. Today, the digital dimension is an integral part of our lives. …”
Hae kokoteksti Hae kokotekstiPro gradu -
19
Lohkoketjuteknologian hyödyntäminen sähköisten potilaskertomusten datan hallinnassa
Julkaistu 2021“…In addition, many of these systems are centralized in a single location, which may pose risks, for example in the case of data breaches or natural disasters. …”
Hae kokoteksti Hae kokotekstiKandityö -
20
Vulnerabilities in the wild : detecting vulnerable web applications at scale
Julkaistu 2018“…Construction process of this information gathering method followed the six steps of the Design Science Research Methodology. Web content management system (WCMS) security literature has been reviewed within this study, to gain knowledge of vulnerabilities and risks that WCMS applications face. …”
Hae kokoteksti Hae kokotekstiPro gradu