Showing 3,061 - 3,080 results of 3,317 for search 'systems information', query time: 0.08s Refine Results
  1. 3061

    Oppimisenhallintajärjestelmiin TIM ja Moodle liittyvät asenteet TAM-mallin avulla tarkasteltuna by Liedes, Juho

    Published 2024
    “…The theoretical background, or earlier research literature, contains more detailed information about the TAM model: it consists of four basic pillars related to, among other things, the user attitude and the user experience of the system. …”
    Get full text Get full text
    Master's thesis
  2. 3062

    Oppimisanalytiikan ilmentymistä ja haasteista by Torniainen, Konsta

    Published 2023
    “…Explored manifestations include various methods of learning analytics, the roles of different stakeholders, roles of information systems, and the technological foundation. …”
    Get full text Get full text
    Bachelor's thesis
  3. 3063

    Onni-järjestelmän käytettävyysongelmat, kiertotavat ja niiden oppiminen by Petäistö, Tuija

    Published 2019
    “…In some cases, certain properties of information systems may hinder, hamper or slow down the human-technology interaction. …”
    Get full text Get full text
    Master's thesis
  4. 3064
  5. 3065
  6. 3066

    Evaluation tool for assessing an organization’s OT security policy by Eho, Onni

    Published 2024
    “…The evolution of OT systems has made them more vulnerable against cyberthreats. …”
    Get full text Get full text
    Master's thesis
  7. 3067

    Kompleksisen turvallisuuden hallinta ja ennakointi systeemiteoreettisen lähestymistavan avulla by Verhe, Titus

    Published 2023
    “…The explanatory power of the systems theoretical approach enables the observation and clarification of the characteristics and dynamics of complex security. …”
    Get full text Get full text
    Master's thesis
  8. 3068

    IoT-tietoturvaoppimisympäristön kehittäminen by Huusko, Eero

    Published 2022
    “…The best option was to teach the security of the IoT system by following the penetration testing methods. …”
    Get full text Get full text
    Master's thesis
  9. 3069

    Tiedonhallintamalli ja tietoturvallisuudenhallintamalli IT-ulkoistuksissa by Ferreira, Janne

    Published 2020
    “…A metamodel of Information Security Management System (ISMS) in IT outsourcing was formed according to the results of the content analysis. …”
    Get full text Get full text
    Master's thesis
  10. 3070

    Julkisen hallinnon tietoturvallisuuden arviointikriteeristö tietoturva-arviointien välineenä by Laitila, Rami

    Published 2023
    “…The research was carried out as a literature review of previous research related to information security management systems and information security regulation. …”
    Get full text Get full text
    Master's thesis
  11. 3071

    Strategisen tiedustelun tukeminen tiedonlouhinnalla : uutisdatasta tiedustelutiedoksi by Niemelä, Tuomas

    Published 2021
    “…In addition, this thesis shows that information systems science is well suited for intelligence studies. …”
    Get full text Get full text
    Master's thesis
  12. 3072

    Phishing susceptibility rate for multinational organizations by Purhonen, Teemu

    Published 2023
    “…Phishing attacks can aim to gather information or inject malware into computer systems, and common tactics include impersonating trusted entities and creating fake login pages. …”
    Get full text Get full text
    Master's thesis
  13. 3073

    Uhka-alttiuden ja hyökkäyspinnan hallinta osana yritysten tietoturvaa by Voutilainen, Jouko

    Published 2024
    “…The companies felt that their own attack surface had increased, but mostly did not feel the need to update their current processes with new systems or services. Based on the results, it can be concluded that companies do not find it necessary to integrate increasingly dynamic or automated systems into their own information security management processes. …”
    Get full text Get full text
    Master's thesis
  14. 3074

    Tekoälyn haavoittuvuudet kybertoimintaympäristön näkökulmasta by Kilpiäinen, Juha

    Published 2020
    “…There are also vulnerabilities in respect of codes, software, and hardware. as well as information networks. Moreover, the increasingly complex artificial intelligence system assemblies highlight the vulnerability of the solutions composed. …”
    Get full text Get full text
    Master's thesis
  15. 3075

    Liikennejärjestelmän verkko- ja tietojärjestelmien turvallisuuden sääntely by Lahti, Ville

    Published 2022
    “…Using legal dogmatic research method, the national network and information security legislation is interpreted and systematized de lege lata in transportation system (rail, road and maritime). …”
    Get full text Get full text
    Master's thesis
  16. 3076
  17. 3077

    Kyberturvallisuuden nykyiset ja tulevat osaamistarpeet ohjelmistoyrityksessä : tapaustutkimus by Järvinen, Heikki

    Published 2020
    “…Along with the interviews also quality system, security policies and security guidance of the research target were examined. …”
    Get full text Get full text
    Master's thesis
  18. 3078
  19. 3079
  20. 3080

    Tietomurtojen juurisyyt ja vaikutusten minimointi by Rihu, Miro

    Published 2022
    “…The root causes of data breaches are under annual research, which can be used to, i.e., stay informed about the yearly trends of different kinds of cyberattacks. …”
    Get full text Get full text
    Bachelor's thesis
Search Tools: RSS Feed