Suggested Topics within your search.
- Tietojärjestelmätiede 296
- Information Systems Science 292
- 601 269
- sosiaalinen media 81
- tietojärjestelmät 24
- markkinointi 23
- teknologia 23
- kyberturvallisuus 20
- tietoturva 19
- omaksuminen 18
- verkkoyhteisöt 18
- digitalisaatio 17
- Internet 15
- terveydenhuolto 15
- käyttäjäkokemus 14
- tekoäly 13
- käytettävyys 12
- social media 12
- yksityisyys 12
- yritykset 12
- 5032 11
- Liikunnan yhteiskuntatieteet 11
- Social Sciences of Sport 11
- stressi 11
- Facebook 10
- kuluttajakäyttäytyminen 10
- teknostressi 10
- ikääntyneet 9
- koneoppiminen 9
- motivaatio 9
-
341
Liikennejärjestelmän verkko- ja tietojärjestelmien turvallisuuden sääntely
Published 2022“…Using legal dogmatic research method, the national network and information security legislation is interpreted and systematized de lege lata in transportation system (rail, road and maritime). …”
Get full text Get full textMaster's thesis -
342
Onni-järjestelmän käytettävyysongelmat, kiertotavat ja niiden oppiminen
Published 2019“…The case for this research was Kela’s information system for basic social assistance, which is part of Kela’s reformed benefit platform (Onni). …”
Get full text Get full textMaster's thesis -
343
Kyberturvallisuuden nykyiset ja tulevat osaamistarpeet ohjelmistoyrityksessä : tapaustutkimus
Published 2020“…Along with the interviews also quality system, security policies and security guidance of the research target were examined. …”
Get full text Get full textMaster's thesis -
344
Julkisen hallinnon tietoturvallisuuden arviointikriteeristö tietoturva-arviointien välineenä
Published 2023“…The research was carried out as a literature review of previous research related to information security management systems and information security regulation. …”
Get full text Get full textMaster's thesis -
345
Kognitiivisen prosessoinnin sujuvuuden vaikutus uupumukseen ja ylikuormitukseen Facebookissa
Published 2021“…Antecedents of fatigue such as information, communication and system feature overload have been studied in the literature but it was unknown how users evaluate situations where fatigue and overload are present. …”
Get full text Get full textMaster's thesis -
346
Lainsäädäntö tieto- ja kyberturvallisuuden perustana : valtionhallinnon viranomaisen näkökulma
Published 2021“…No act obligates audit of the infor-mation systems containing only national information. There are also no clear information security requirements for government's common ICT-services, which gives the service provider a remarkable responsibility. …”
Get full text Get full textMaster's thesis -
347
Oppimisenhallintajärjestelmiin TIM ja Moodle liittyvät asenteet TAM-mallin avulla tarkasteltuna
Published 2024“…The theoretical background, or earlier research literature, contains more detailed information about the TAM model: it consists of four basic pillars related to, among other things, the user attitude and the user experience of the system. …”
Get full text Get full textMaster's thesis -
348
Tekoälyn haavoittuvuudet kybertoimintaympäristön näkökulmasta
Published 2020“…In our daily life several different sectors of society and services utilize artificial intelligence systems. In the social sectors and services, such as telecommunications, banking, health and commerce, as well as telephone, television, radio, social media and the Internet, artificial intelligence plays a key role. …”
Get full text Get full textMaster's thesis -
349
Strategisen tiedustelun tukeminen tiedonlouhinnalla : uutisdatasta tiedustelutiedoksi
Published 2021“…In addition, this thesis shows that information systems science is well suited for intelligence studies. …”
Get full text Get full textMaster's thesis -
350
Ukrainan sodan vaikutukset äärioikeiston väkivaltakykyyn Suomessa
Published 2023“…The research confirmed previous research results. It also added information about the effects of the war in Ukraine on the extreme right's capacity for violence, while taking into account national peculiarities. …”
Get full text Get full textMaster's thesis -
351
Keski-Suomen digitaalisen sosiaali- ja terveyskeskus Omaks:n sähköisen asioinnin käytettävyystutkimus
Published 2023Get full text Get full textMaster's thesis -
352
-
353
Jäsenneltyjen tiedusteluanalyysimenetelmien käyttö jatkuvuuden hallinnan suunnittelussa
Published 2023“…According to the research findings, structured intelligence analysis methods can be employed in operating environment analysis, impact analysis, and risk assessment when an organization's information system environment is a complex entity of intertwined social and technological aspects. …”
Get full text Get full textMaster's thesis -
354
Kevyttä keskustelua vai tiivistä tietojen vaihtoa? : tietoverkkorikollisuuden tilannetietoisuuden jakaminen luottamusverkostossa
Published 2018“…Members of the forum were given an opportunity to express their wishes for the cooperation in semi-structured interviews as well as to call out identified challenges in the information sharing. Based on the interview results, a formal development process for the cooperation was formed by leveraging soft system methodology. …”
Get full text Get full textMaster's thesis -
355
Managing the embodied mind : a study on the cognition and recognition of agentic valuation and restraint
Published 2019“…This model of control is also known as the emotional economy, which can be understood as a system of governance that utilizes human emotionality. …”
Get full text Get full textMaster's thesis -
356
Heikkonäköisten ohjelmoijien kohtaamat ongelmat ohjelmoinnissa ja ohjelmakoodin esittäminen
Published 2023“…Five categories of problems were developed based on the answers of the participants: reading searched information, reading programming code, usability and accessibility of programming tools, interpreting the results of the program, and social effects. …”
Get full text Get full textMaster's thesis -
357
Kyberturvallisuusstandardit NIS2-direktiivin riskienhallintavelvoitteen tukena
Published 2024“…The construction presents the standard references corresponding to the national cybersecurity law from information security management systems to the ISO/IEC 27001:2022 standard and the NIST CSF 2.0 reference framework, to the cybersecurity risk management ISO/IEC 27005:2022, NIST SP 800-30 and NIST SP 800-37 standards, supply chain security to the ISO 28000:2022 and NIST SP 800-161 standards, and to the ISO/IEC 27035-1:2023, ISO/IEC 27035-2:2023 and NIST SP 800-61 standards, which deal with deviation management. …”
Get full text Get full textMaster's thesis -
358
-
359
Strategic Overview of Applying Artificial Intelligence on the Future Battlefield
Published 2024“…The future applications of AI in the battlespace are categorized into various domains consisting of 1) enhanced intelligence, decision-making, and predictive capabilities; 2) operational efficiency and supply chain optimization; 3) advanced human-machine interaction and performance enhancement; 4) cyber and information warfare enhancement; and 5) autonomous systems and robotics. …”
Get full text Get full textMaster's thesis -
360
Tiedustelusta sanottua - Sisällönanalyysi Eduskunnan lähetekeskusteluista
Published 2025“…Intelligence is expected to prevent security threats while providing crucial information for decision-making, establishing itself as a key component of Finnish society and enhancing national security. …”
Get full text Get full textMaster's thesis