Suggested Topics within your search.
- Tietojärjestelmätiede 2,555
- Information Systems Science 2,548
- 601 2,016
- tietojärjestelmät 254
- tietoturva 206
- Mathematical Information Technology 191
- Tietotekniikka 191
- 602 166
- tekoäly 152
- käytettävyys 136
- teknologia 132
- Master's Degree Programme in Information Systems 125
- kyberturvallisuus 124
- ohjelmistokehitys 124
- digitalisaatio 121
- sosiaalinen media 121
- Tietojärjestelmätieteen maisteriohjelma 115
- koneoppiminen 114
- yritykset 98
- tietotekniikka 97
- ketterät menetelmät 95
- käyttäjäkokemus 94
- pilvipalvelut 92
- käyttöönotto 88
- organisaatiot 79
- esineiden internet 78
- liiketoiminta 77
- verkkokauppa 77
- toiminnanohjausjärjestelmät 73
- markkinointi 72
-
3061
Oppimisenhallintajärjestelmiin TIM ja Moodle liittyvät asenteet TAM-mallin avulla tarkasteltuna
Published 2024“…The theoretical background, or earlier research literature, contains more detailed information about the TAM model: it consists of four basic pillars related to, among other things, the user attitude and the user experience of the system. …”
Get full text Get full textMaster's thesis -
3062
Oppimisanalytiikan ilmentymistä ja haasteista
Published 2023“…Explored manifestations include various methods of learning analytics, the roles of different stakeholders, roles of information systems, and the technological foundation. …”
Get full text Get full textBachelor's thesis -
3063
Onni-järjestelmän käytettävyysongelmat, kiertotavat ja niiden oppiminen
Published 2019“…In some cases, certain properties of information systems may hinder, hamper or slow down the human-technology interaction. …”
Get full text Get full textMaster's thesis -
3064
Translitterointi japanin kielen syötemetodina
Published 2022Get full text Get full textBachelor's thesis -
3065
Verkkoliikennetallenteiden analysointi Snort-järjestelmällä
Published 2020Get full text Get full textMaster's thesis -
3066
Evaluation tool for assessing an organization’s OT security policy
Published 2024“…The evolution of OT systems has made them more vulnerable against cyberthreats. …”
Get full text Get full textMaster's thesis -
3067
Kompleksisen turvallisuuden hallinta ja ennakointi systeemiteoreettisen lähestymistavan avulla
Published 2023“…The explanatory power of the systems theoretical approach enables the observation and clarification of the characteristics and dynamics of complex security. …”
Get full text Get full textMaster's thesis -
3068
IoT-tietoturvaoppimisympäristön kehittäminen
Published 2022“…The best option was to teach the security of the IoT system by following the penetration testing methods. …”
Get full text Get full textMaster's thesis -
3069
Tiedonhallintamalli ja tietoturvallisuudenhallintamalli IT-ulkoistuksissa
Published 2020“…A metamodel of Information Security Management System (ISMS) in IT outsourcing was formed according to the results of the content analysis. …”
Get full text Get full textMaster's thesis -
3070
Julkisen hallinnon tietoturvallisuuden arviointikriteeristö tietoturva-arviointien välineenä
Published 2023“…The research was carried out as a literature review of previous research related to information security management systems and information security regulation. …”
Get full text Get full textMaster's thesis -
3071
Strategisen tiedustelun tukeminen tiedonlouhinnalla : uutisdatasta tiedustelutiedoksi
Published 2021“…In addition, this thesis shows that information systems science is well suited for intelligence studies. …”
Get full text Get full textMaster's thesis -
3072
Phishing susceptibility rate for multinational organizations
Published 2023“…Phishing attacks can aim to gather information or inject malware into computer systems, and common tactics include impersonating trusted entities and creating fake login pages. …”
Get full text Get full textMaster's thesis -
3073
Uhka-alttiuden ja hyökkäyspinnan hallinta osana yritysten tietoturvaa
Published 2024“…The companies felt that their own attack surface had increased, but mostly did not feel the need to update their current processes with new systems or services. Based on the results, it can be concluded that companies do not find it necessary to integrate increasingly dynamic or automated systems into their own information security management processes. …”
Get full text Get full textMaster's thesis -
3074
Tekoälyn haavoittuvuudet kybertoimintaympäristön näkökulmasta
Published 2020“…There are also vulnerabilities in respect of codes, software, and hardware. as well as information networks. Moreover, the increasingly complex artificial intelligence system assemblies highlight the vulnerability of the solutions composed. …”
Get full text Get full textMaster's thesis -
3075
Liikennejärjestelmän verkko- ja tietojärjestelmien turvallisuuden sääntely
Published 2022“…Using legal dogmatic research method, the national network and information security legislation is interpreted and systematized de lege lata in transportation system (rail, road and maritime). …”
Get full text Get full textMaster's thesis -
3076
Naisten hakeutuminen IT-alan koulutukseen
Published 2024Get full text Get full textBachelor's thesis -
3077
Kyberturvallisuuden nykyiset ja tulevat osaamistarpeet ohjelmistoyrityksessä : tapaustutkimus
Published 2020“…Along with the interviews also quality system, security policies and security guidance of the research target were examined. …”
Get full text Get full textMaster's thesis -
3078
-
3079
Kohti uutta verkko-opetusta : kuinka kehitetään verkko-opetusta Etelä-Savon ammattiopistossa
Published 2021Get full text Get full textMaster's thesis -
3080
Tietomurtojen juurisyyt ja vaikutusten minimointi
Published 2022“…The root causes of data breaches are under annual research, which can be used to, i.e., stay informed about the yearly trends of different kinds of cyberattacks. …”
Get full text Get full textBachelor's thesis