Suggested Topics within your search.
- 601 14
- Information Systems Science 13
- Tietojärjestelmätiede 13
- riskienhallinta 6
- kyberturvallisuus 5
- organisaatiot 4
- digitalisaatio 3
- tekoäly 3
- tietojärjestelmätiede 3
- tietoturva 3
- turvallisuus 3
- yritykset 3
- Cyber Security 2
- Kyberturvallisuus 2
- analyysi 2
- automaatio 2
- big data 2
- data 2
- johtaminen 2
- liiketoiminta 2
- tietoturvallisuus 2
- 2041 1
- 20423 1
- 3131 1
- 602 1
- Computer Science 1
- Cyber security 1
- EU:n verkko- ja tietoturvadirektiivi 1
- Economics 1
- GDPR 1
-
1
Artificial intelligence governance, management and risk management - A look into EU AIA, standards and other frameworks from practical level
Published 2024“…The study underscores the importance of selecting and calibrating governance frameworks appropriately, as inadequate frameworks render digital security efforts ineffective. Closer examination is also done in order to clarify structures of frameworks for effective governance and management of AI systems, risks and digital security aspects. …”
Get full text Get full textMaster's thesis -
2
Value co-creation and co-destruction in identity and access management service platform : case study
Published 2021“…These goals were contributing to the practical case by providing insights on the potential benefits and risks. Based on the main theoretical foundations on digital platforms and service-dominant logic, distinct frameworks for both value co-creation and co-destruction were used as a lens to study the phenomena. …”
Get full text Get full textMaster's thesis -
3
Best practices in controlling trade-based money laundering
Published 2020Get full text Get full textMaster's thesis -
4
Bringing AI into complex industrial Supply Chain Management: A Strategic and systematic approach
Published 2024“…Cyber Security, Master’s Thesis Supervisor(s): Tiihonen, Timo Keywords: supply chain management, industrial supply chain, digital transformation, business processes, artificial intelligence, cybersecurity, resilience, capability, design science research, data management Globalization and digitalization challenge supply chains with complex demands, such as a fragmented supplier base and increased economic profitability demands. …”
Get full text Get full textMaster's thesis -
5
The concept of growth hacking : case study on Finnish companies
Published 2023Get full text Get full textMaster's thesis -
6
NIS-direktiivin kahdet kasvot : riskit ja riskienhallinta
Published 2017“…The impacts are examined from the businesses point of view considering the two sides of the Directive: risks and risk management. Even though the directive aims to bring companies more effective risk management practices, it also brings risks to the company’s operations. …”
Get full text Get full textMaster's thesis -
7
Digitaalisten yrityslompakoiden potentiaalisimmat ansaintamallit asiakasorganisaatioiden näkökulmasta
Published 2024“…Self-sovereign identity is a new approach to digital identity management where individual's digital identity is stored in a digital wallet, allowing identity-related information to be managed and shared securely without a centralized third party. …”
Get full text Get full textMaster's thesis -
8
Oikeushallinnon tietotekniikkaympäristön uhkamallinnus
Published 2024“…Threat modeling is a key part of the target organization's risk management because some of the identified risks were transferred for further processing in the risk management process. …”
Get full text Get full textMaster's thesis -
9
Kyberturvallisuuden strateginen johtaminen yrityksissä
Published 2020“…This bachelor’s thesis explores cyber security and how it can be managed strategically. Strategic management of cyber security enable to manage challenging and complex entities so that many of the risks posed by cyber threats can be minimized. …”
Get full text Get full textBachelor's thesis -
10
Digitaalisen jalanjäljen vaikutus yksityisyyteen : poliisien käsitykset, kokemukset ja hallinnan keinot
Published 2021“…Police officers were aware of the issues surrounding the formation of the digital footprint. The potential impact of the digital footprint on privacy as well as the risks were recognized on both a general and personal level. …”
Get full text Get full textMaster's thesis -
11
Tuotannollisten IT-ympäristöjen haasteet kyberuhkien hallittavuuden näkökulmasta
Published 2022“…To secure the organization's critical infrastructure and IT environment and to prevent cyber threats, it is essential to identify potential risks and implement the necessary controls to reduce the risks. …”
Get full text Get full textMaster's thesis -
12
Jatkuvuuden hallinnan kehittäminen : pienten yritysten näkökulma ja pilvipalveluiden erityispiirteet
Published 2024“…Business continuity management in small businesses is focused on protecting physical assets and preparing for personnel risks. …”
Get full text Get full textMaster's thesis -
13
IEC 62443-4-2 standardin hyödyt ja haasteet yritykselle : systemaattinen kirjallisuuskatsaus
Published 2023“…Industry is becoming more digital as well as the rest of the world, but this digitalization also brings risks. …”
Get full text Get full textBachelor's thesis -
14
Massadatan hyödyntäminen tietoturvallisuuden näkökulmasta
Published 2021“…This is followed by a review of the information security risks involved. After that we will have a look at how organizations can manage some of these risks. …”
Get full text Get full textBachelor's thesis -
15
Digitalisaation vaikutukset taloushallintopalveluita tuottaviin yrityksiin
Published 2019“…As much as 94 to 98 percent of these jobs are at risk. The purpose of this study was to find out how digitalization, automation of routines, robotics, and artificial intelligence are expected to affect the business structure, organizations, tasks, and employees in Finland in the following years. …”
Get full text Get full textMaster's thesis -
16
Data-analytiikka rahoitusmarkkinoilla
Published 2021“…Examples include financial information management and reference data management, implementation and preparation, regulation, risk analysis, trading analysis, credit rating or proactive analysis, and monitoring and reporting. …”
Get full text Get full textBachelor's thesis -
17
Kybersietoisuuden tarkastustulosten hyödyntämismahdollisuudet : tapaustutkimus
Published 2021“…Cyber resilience and related methods should be used together with more traditional risk management processes. This thesis is a qualitative case study and was commissioned by the case organization to analyze the processes and activities related to cyber resilience. …”
Get full text Get full textMaster's thesis -
18
Tietoturvatietoisuusohjelman vaatimukset Kelan tietoturvayksikössä
Published 2024“…We live in a world where romance scammers exploit innocent people for financial gain, sensitive health information is sold on the dark web, and cyberattacks can disrupt access to bank accounts. Today, the digital dimension is an integral part of our lives. …”
Get full text Get full textMaster's thesis -
19
Lohkoketjuteknologian hyödyntäminen sähköisten potilaskertomusten datan hallinnassa
Published 2021“…In addition, many of these systems are centralized in a single location, which may pose risks, for example in the case of data breaches or natural disasters. …”
Get full text Get full textBachelor's thesis -
20
Vulnerabilities in the wild : detecting vulnerable web applications at scale
Published 2018“…Construction process of this information gathering method followed the six steps of the Design Science Research Methodology. Web content management system (WCMS) security literature has been reviewed within this study, to gain knowledge of vulnerabilities and risks that WCMS applications face. …”
Get full text Get full textMaster's thesis