Suggested Topics within your search.
- 601 462
- Tietojärjestelmätiede 406
- Information Systems Science 397
- 502 249
- Liikuntapedagogiikka 249
- Physical Education Teacher Education 249
- asenteet 211
- liikunta 186
- urheilijat 186
- Tietotekniikka 165
- nuoret 164
- Mathematical Information Technology 163
- urheilu 157
- Psykologia 148
- 202 147
- Psychology 147
- 602 146
- opetus 133
- motivaatio 125
- 5032 121
- fyysinen aktiivisuus 121
- Liikunnan yhteiskuntatieteet 120
- Social Sciences of Sport 120
- tietoturva 113
- kyberturvallisuus 99
- sosiaalinen media 97
- English 96
- Englannin kieli 95
- englannin kieli 91
- Health Education 88
-
2281
Un-polarizing news in social media platform
Published 2019“…The first approach: the "Sentiment-based" solution achieves a satisfactory benchmark level by finding articles with similar topic/subject to the comparing article as well as suggesting ones with different sentiments/attitudes (negative, positive, neutral) using Sentiment Analysis and NER. …”
Get full text Get full textMaster's thesis -
2282
Evidence in cloud security compliance : towards a meta-evaluation framework
Published 2019“…The standards provide a set of controls, requirements that must be met to receive an official certification or a third-party attestation. The compliance against the controls must be verified by providing evidence to an auditor. …”
Get full text Get full textMaster's thesis -
2283
Opettajien ja huoltajien kokemuksia Wilmasta palautteenannon välineenä
Published 2020“…Both teachers and parents consider realism and encouragement to be the most important attributes of feedback. The decency, which becomes one of the most important attributes in the answers of the parents, does not become one of the most important in the answers of the teachers. …”
Get full text Get full textMaster's thesis -
2284
Äänipalautetyökalun suunnittelu, toteutus ja evaluointi
Published 2020“…On the other hand, the attitudes towards giving audio feedback were not affected since the test subjects initially had a positive attitude towards it. …”
Get full text Get full textMaster's thesis -
2285
Discovering Business Processes from Unstructured Text
Published 2020“…This workload can be familiar to Business Process Management professionals who may have to go through multiple process descriptions in their work. This thesis attempts to find a way to mitigate the workload of the knowledge worker by proposing a natural language processing solution for discovering Business Processes from Business Process description documents. …”
Get full text Get full textMaster's thesis -
2286
Kyberturvallisuuskulttuuri : ohjelmistoyritys Reaktorin ratkaisuja henkilöstön kautta kohdistuvien kyberuhkien vähentämiseksi
Published 2020“…Information security policies fail to respond to the pace of new attack methods and tools as well as to human errors in general. …”
Get full text Get full textMaster's thesis -
2287
Verkkotopologioiden muutokset puolustuksellisena elementtinä
Published 2020“…Acute configuration changes caused by network incidents, that could be used to restrict the spreading of an attack could be delivered remarkably fast to their targets without entirely crippling the network. …”
Get full text Get full textMaster's thesis -
2288
Discouraging factors in knowledge sharing in software development teams
Published 2020“…The main recommendations are to pay more attention to knowledge sharing, lower its perceived difficulty, and integrate it into the existing processes and practices in a concrete executable form. …”
Get full text Get full textMaster's thesis -
2289
GDPR-asetuksen ja PSD2-direktiivin vaikutukset digitaalisiin pankkipalveluihin ja asiakaskokemukseen
Published 2020“…Based on the analysis and utilizing previous studies, the material can be connected to customer experience through five customer experience touch point elements: communication, process, technology, atmosphere, and product interaction. Based on the analysis, the effects on a service are connected to the actions a customer has to make in order to proceed with completing a task and information security of the service. …”
Get full text Get full textMaster's thesis -
2290
Tietoturvastrategian ja -politiikan merkitys kyberhyökkäyksen torjunnassa kunnissa
Published 2021“…This thesis examined these two successful cyber-attacks and examined how urban security policies affected the prevention, containment, and recovery from these attacks. …”
Get full text Get full textMaster's thesis -
2291
Lainsäädäntö tieto- ja kyberturvallisuuden perustana : valtionhallinnon viranomaisen näkökulma
Published 2021“…A sub question was "What is the difference between information and cyber security by legislation?" Special attention was given to legislation of jurisdiction and cooperation between different authorities. …”
Get full text Get full textMaster's thesis -
2292
Yli 75-vuotiaat ja kyberturvallisuus
Published 2021“…Based on the earlier surveys the results suggest, contrary to assumptions, that seniors are well versed in cybersecurity and protection against various attacks. They take care of their own safety and know whom to notify if they are the target of a cyber-attack. …”
Get full text Get full textMaster's thesis -
2293
Tietojärjestelmien mallintaminen : tarpeet ja haasteet
Published 2021“…The opinions and experiences of IS professionals suggest that the challenges may stem from code-centric attitudes. These challenges can cause professionals to resort to informal modeling or to disregard modeling altogether which in turn may lead to communicative problems resulting in productivity and quality issues. …”
Get full text Get full textMaster's thesis -
2294
It-alan ammattilaisten asenteita tietojenkäsittelyn eettisiä kysymyksiä kohtaan
Published 2021“…In addition, the study examines whether demographic factors influence the attitudes of IT professionals. The research results showed that Finnish IT professionals generally have a good ethical attitude to ethical issues in information technology, and demographic factors have little effect. …”
Get full text Get full textMaster's thesis -
2295
Itsensä mittaaminen osana arkea
Published 2021“…The research goes through step by step how the subjects have domesticated self-tracking into their everyday life, while attempting to understand the motivations behind it. …”
Get full text Get full textMaster's thesis -
2296
Machine learning based ISA detection for short shellcodes
Published 2021“…Code injection is still a viable attack method because software vulnerabilities have not ceased to exist. …”
Get full text Get full textMaster's thesis -
2297
Lapin yliopiston taiteiden tiedekunta 2020 : poikkeusvuoden vaikutus akateemiseen opintomenestykseen ja opiskelijavalintaan
Published 2021“…In addition, it was investigated whether the distance selection exam could be used to attract applicants from a wider geographical area to the Faculty of Arts. …”
Get full text Get full textMaster's thesis -
2298
Luovuus luontoympäristössä : ympäristökokemuksen, ympäristön ominaisuuksien ja affektin suhde luovuuteen
Published 2022“…Where research has focused on attention retention and stress recovery in nature, there only exists a limited amount of research on the relationship between nature and creativity. …”
Get full text Get full textMaster's thesis -
2299
Konnektiivinen toiminta ja digitaalinen (sl)aktivismi : tapaus r/wallstreetbets
Published 2022“…On a more abstract level, retail traders and humans attacked against algorithmic dominance of the investing world. …”
Get full text Get full textMaster's thesis -
2300
Lokien lajittelu koneoppivien menetelmien avulla
Published 2022“…This study analyzes the log use cases and attempts to find ways to utilize machine learning in log indexing using the design study method. …”
Get full text Get full textMaster's thesis