Suggested Topics within your search.
- Tietojärjestelmätiede 296
- Information Systems Science 292
- 601 274
- sosiaalinen media 81
- tietojärjestelmät 24
- markkinointi 23
- teknologia 23
- kyberturvallisuus 21
- tietoturva 20
- omaksuminen 18
- verkkoyhteisöt 18
- Internet 17
- digitalisaatio 17
- 206 15
- käyttäjäkokemus 15
- terveydenhuolto 15
- tekoäly 13
- yksityisyys 13
- käytettävyys 12
- social media 12
- yritykset 12
- 5032 11
- Liikunnan yhteiskuntatieteet 11
- Social Sciences of Sport 11
- stressi 11
- Cognitive Science 10
- Facebook 10
- Kognitiotiede 10
- kuluttajakäyttäytyminen 10
- teknostressi 10
-
361
Onni-järjestelmän käytettävyysongelmat, kiertotavat ja niiden oppiminen
Published 2019“…The case for this research was Kela’s information system for basic social assistance, which is part of Kela’s reformed benefit platform (Onni). …”
Get full text Get full textMaster's thesis -
362
Kyberturvallisuuden nykyiset ja tulevat osaamistarpeet ohjelmistoyrityksessä : tapaustutkimus
Published 2020“…Along with the interviews also quality system, security policies and security guidance of the research target were examined. …”
Get full text Get full textMaster's thesis -
363
Julkisen hallinnon tietoturvallisuuden arviointikriteeristö tietoturva-arviointien välineenä
Published 2023“…The research was carried out as a literature review of previous research related to information security management systems and information security regulation. …”
Get full text Get full textMaster's thesis -
364
Kognitiivisen prosessoinnin sujuvuuden vaikutus uupumukseen ja ylikuormitukseen Facebookissa
Published 2021“…Antecedents of fatigue such as information, communication and system feature overload have been studied in the literature but it was unknown how users evaluate situations where fatigue and overload are present. …”
Get full text Get full textMaster's thesis -
365
Lainsäädäntö tieto- ja kyberturvallisuuden perustana : valtionhallinnon viranomaisen näkökulma
Published 2021“…No act obligates audit of the infor-mation systems containing only national information. There are also no clear information security requirements for government's common ICT-services, which gives the service provider a remarkable responsibility. …”
Get full text Get full textMaster's thesis -
366
Oppimisenhallintajärjestelmiin TIM ja Moodle liittyvät asenteet TAM-mallin avulla tarkasteltuna
Published 2024“…The theoretical background, or earlier research literature, contains more detailed information about the TAM model: it consists of four basic pillars related to, among other things, the user attitude and the user experience of the system. …”
Get full text Get full textMaster's thesis -
367
Tekoälyn haavoittuvuudet kybertoimintaympäristön näkökulmasta
Published 2020“…In our daily life several different sectors of society and services utilize artificial intelligence systems. In the social sectors and services, such as telecommunications, banking, health and commerce, as well as telephone, television, radio, social media and the Internet, artificial intelligence plays a key role. …”
Get full text Get full textMaster's thesis -
368
Strategisen tiedustelun tukeminen tiedonlouhinnalla : uutisdatasta tiedustelutiedoksi
Published 2021“…In addition, this thesis shows that information systems science is well suited for intelligence studies. …”
Get full text Get full textMaster's thesis -
369
Ukrainan sodan vaikutukset äärioikeiston väkivaltakykyyn Suomessa
Published 2023“…The research confirmed previous research results. It also added information about the effects of the war in Ukraine on the extreme right's capacity for violence, while taking into account national peculiarities. …”
Get full text Get full textMaster's thesis -
370
Keski-Suomen digitaalisen sosiaali- ja terveyskeskus Omaks:n sähköisen asioinnin käytettävyystutkimus
Published 2023Get full text Get full textMaster's thesis -
371
-
372
Jäsenneltyjen tiedusteluanalyysimenetelmien käyttö jatkuvuuden hallinnan suunnittelussa
Published 2023“…According to the research findings, structured intelligence analysis methods can be employed in operating environment analysis, impact analysis, and risk assessment when an organization's information system environment is a complex entity of intertwined social and technological aspects. …”
Get full text Get full textMaster's thesis -
373
Kevyttä keskustelua vai tiivistä tietojen vaihtoa? : tietoverkkorikollisuuden tilannetietoisuuden jakaminen luottamusverkostossa
Published 2018“…Members of the forum were given an opportunity to express their wishes for the cooperation in semi-structured interviews as well as to call out identified challenges in the information sharing. Based on the interview results, a formal development process for the cooperation was formed by leveraging soft system methodology. …”
Get full text Get full textMaster's thesis -
374
Managing the embodied mind : a study on the cognition and recognition of agentic valuation and restraint
Published 2019“…This model of control is also known as the emotional economy, which can be understood as a system of governance that utilizes human emotionality. …”
Get full text Get full textMaster's thesis -
375
Heikkonäköisten ohjelmoijien kohtaamat ongelmat ohjelmoinnissa ja ohjelmakoodin esittäminen
Published 2023“…Five categories of problems were developed based on the answers of the participants: reading searched information, reading programming code, usability and accessibility of programming tools, interpreting the results of the program, and social effects. …”
Get full text Get full textMaster's thesis -
376
Kyberturvallisuusstandardit NIS2-direktiivin riskienhallintavelvoitteen tukena
Published 2024“…The construction presents the standard references corresponding to the national cybersecurity law from information security management systems to the ISO/IEC 27001:2022 standard and the NIST CSF 2.0 reference framework, to the cybersecurity risk management ISO/IEC 27005:2022, NIST SP 800-30 and NIST SP 800-37 standards, supply chain security to the ISO 28000:2022 and NIST SP 800-161 standards, and to the ISO/IEC 27035-1:2023, ISO/IEC 27035-2:2023 and NIST SP 800-61 standards, which deal with deviation management. …”
Get full text Get full textMaster's thesis -
377
-
378
Strategic Overview of Applying Artificial Intelligence on the Future Battlefield
Published 2024“…The future applications of AI in the battlespace are categorized into various domains consisting of 1) enhanced intelligence, decision-making, and predictive capabilities; 2) operational efficiency and supply chain optimization; 3) advanced human-machine interaction and performance enhancement; 4) cyber and information warfare enhancement; and 5) autonomous systems and robotics. …”
Get full text Get full textMaster's thesis -
379
Tiedustelusta sanottua - Sisällönanalyysi Eduskunnan lähetekeskusteluista
Published 2025“…Intelligence is expected to prevent security threats while providing crucial information for decision-making, establishing itself as a key component of Finnish society and enhancing national security. …”
Get full text Get full textMaster's thesis -
380
GPS-vastaanottimien harhauttaminen Helsingin Länsisataman syväväylän alueella ja sen vaikutukset merenkulkuun
Published 2017“…This system compiles information from several radars, cameras and coordinates received by the vessel’s GPS. …”
Get full text Get full textMaster's thesis