Search alternatives:
information system » information systems (Expand Search)
Showing 341 - 360 results of 392 for search '(( national information system ) OR ( social information system ))', query time: 0.10s Refine Results
  1. 341

    Liikennejärjestelmän verkko- ja tietojärjestelmien turvallisuuden sääntely by Lahti, Ville

    Published 2022
    “…Using legal dogmatic research method, the national network and information security legislation is interpreted and systematized de lege lata in transportation system (rail, road and maritime). …”
    Get full text Get full text
    Master's thesis
  2. 342

    Onni-järjestelmän käytettävyysongelmat, kiertotavat ja niiden oppiminen by Petäistö, Tuija

    Published 2019
    “…The case for this research was Kela’s information system for basic social assistance, which is part of Kela’s reformed benefit platform (Onni). …”
    Get full text Get full text
    Master's thesis
  3. 343

    Kyberturvallisuuden nykyiset ja tulevat osaamistarpeet ohjelmistoyrityksessä : tapaustutkimus by Järvinen, Heikki

    Published 2020
    “…Along with the interviews also quality system, security policies and security guidance of the research target were examined. …”
    Get full text Get full text
    Master's thesis
  4. 344

    Julkisen hallinnon tietoturvallisuuden arviointikriteeristö tietoturva-arviointien välineenä by Laitila, Rami

    Published 2023
    “…The research was carried out as a literature review of previous research related to information security management systems and information security regulation. …”
    Get full text Get full text
    Master's thesis
  5. 345

    Kognitiivisen prosessoinnin sujuvuuden vaikutus uupumukseen ja ylikuormitukseen Facebookissa by Luodes, Piia

    Published 2021
    “…Antecedents of fatigue such as information, communication and system feature overload have been studied in the literature but it was unknown how users evaluate situations where fatigue and overload are present. …”
    Get full text Get full text
    Master's thesis
  6. 346

    Lainsäädäntö tieto- ja kyberturvallisuuden perustana : valtionhallinnon viranomaisen näkökulma by Soikkeli, Mikko

    Published 2021
    “…No act obligates audit of the infor-mation systems containing only national information. There are also no clear information security requirements for government's common ICT-services, which gives the service provider a remarkable responsibility. …”
    Get full text Get full text
    Master's thesis
  7. 347

    Oppimisenhallintajärjestelmiin TIM ja Moodle liittyvät asenteet TAM-mallin avulla tarkasteltuna by Liedes, Juho

    Published 2024
    “…The theoretical background, or earlier research literature, contains more detailed information about the TAM model: it consists of four basic pillars related to, among other things, the user attitude and the user experience of the system. …”
    Get full text Get full text
    Master's thesis
  8. 348

    Tekoälyn haavoittuvuudet kybertoimintaympäristön näkökulmasta by Kilpiäinen, Juha

    Published 2020
    “…In our daily life several different sectors of society and services utilize artificial intelligence systems. In the social sectors and services, such as telecommunications, banking, health and commerce, as well as telephone, television, radio, social media and the Internet, artificial intelligence plays a key role. …”
    Get full text Get full text
    Master's thesis
  9. 349

    Strategisen tiedustelun tukeminen tiedonlouhinnalla : uutisdatasta tiedustelutiedoksi by Niemelä, Tuomas

    Published 2021
    “…In addition, this thesis shows that information systems science is well suited for intelligence studies. …”
    Get full text Get full text
    Master's thesis
  10. 350

    Ukrainan sodan vaikutukset äärioikeiston väkivaltakykyyn Suomessa by Heikkilä, Ville

    Published 2023
    “…The research confirmed previous research results. It also added information about the effects of the war in Ukraine on the extreme right's capacity for violence, while taking into account national peculiarities. …”
    Get full text Get full text
    Master's thesis
  11. 351
  12. 352
  13. 353

    Jäsenneltyjen tiedusteluanalyysimenetelmien käyttö jatkuvuuden hallinnan suunnittelussa by Heikkilä, Miika

    Published 2023
    “…According to the research findings, structured intelligence analysis methods can be employed in operating environment analysis, impact analysis, and risk assessment when an organization's information system environment is a complex entity of intertwined social and technological aspects. …”
    Get full text Get full text
    Master's thesis
  14. 354

    Kevyttä keskustelua vai tiivistä tietojen vaihtoa? : tietoverkkorikollisuuden tilannetietoisuuden jakaminen luottamusverkostossa by Herranen, Tuomas

    Published 2018
    “…Members of the forum were given an opportunity to express their wishes for the cooperation in semi-structured interviews as well as to call out identified challenges in the information sharing. Based on the interview results, a formal development process for the cooperation was formed by leveraging soft system methodology. …”
    Get full text Get full text
    Master's thesis
  15. 355

    Managing the embodied mind : a study on the cognition and recognition of agentic valuation and restraint by Saarikoski, Annika

    Published 2019
    “…This model of control is also known as the emotional economy, which can be understood as a system of governance that utilizes human emotionality. …”
    Get full text Get full text
    Master's thesis
  16. 356

    Heikkonäköisten ohjelmoijien kohtaamat ongelmat ohjelmoinnissa ja ohjelmakoodin esittäminen by Järvinen, Valtteri

    Published 2023
    “…Five categories of problems were developed based on the answers of the participants: reading searched information, reading programming code, usability and accessibility of programming tools, interpreting the results of the program, and social effects. …”
    Get full text Get full text
    Master's thesis
  17. 357

    Kyberturvallisuusstandardit NIS2-direktiivin riskienhallintavelvoitteen tukena by Timlin, Päivi

    Published 2024
    “…The construction presents the standard references corresponding to the national cybersecurity law from information security management systems to the ISO/IEC 27001:2022 standard and the NIST CSF 2.0 reference framework, to the cybersecurity risk management ISO/IEC 27005:2022, NIST SP 800-30 and NIST SP 800-37 standards, supply chain security to the ISO 28000:2022 and NIST SP 800-161 standards, and to the ISO/IEC 27035-1:2023, ISO/IEC 27035-2:2023 and NIST SP 800-61 standards, which deal with deviation management. …”
    Get full text Get full text
    Master's thesis
  18. 358
  19. 359

    Strategic Overview of Applying Artificial Intelligence on the Future Battlefield by Heng, Leo

    Published 2024
    “…The future applications of AI in the battlespace are categorized into various domains consisting of 1) enhanced intelligence, decision-making, and predictive capabilities; 2) operational efficiency and supply chain optimization; 3) advanced human-machine interaction and performance enhancement; 4) cyber and information warfare enhancement; and 5) autonomous systems and robotics. …”
    Get full text Get full text
    Master's thesis
  20. 360

    Tiedustelusta sanottua - Sisällönanalyysi Eduskunnan lähetekeskusteluista by Välivaara, Ville

    Published 2025
    “…Intelligence is expected to prevent security threats while providing crucial information for decision-making, establishing itself as a key component of Finnish society and enhancing national security. …”
    Get full text Get full text
    Master's thesis
Search Tools: RSS Feed