Aihe-ehdotuksia
- Tietojärjestelmätiede 2 555
- Information Systems Science 2 548
- 601 2 016
- tietojärjestelmät 254
- tietoturva 206
- Mathematical Information Technology 191
- Tietotekniikka 191
- 602 166
- tekoäly 152
- käytettävyys 136
- teknologia 132
- Master's Degree Programme in Information Systems 125
- kyberturvallisuus 124
- ohjelmistokehitys 124
- digitalisaatio 121
- sosiaalinen media 121
- Tietojärjestelmätieteen maisteriohjelma 115
- koneoppiminen 114
- yritykset 98
- tietotekniikka 97
- ketterät menetelmät 95
- käyttäjäkokemus 94
- pilvipalvelut 92
- käyttöönotto 88
- organisaatiot 79
- esineiden internet 78
- liiketoiminta 77
- verkkokauppa 77
- toiminnanohjausjärjestelmät 73
- markkinointi 72
-
3101
Uhkatietojen mahdollisuudet korkeakoulujen tietoturvassa
Julkaistu 2023“…As a result, it was found that MISP is a viable tool for sharing threat information. Creating integrations with other systems, sharing events with another organization, and organizing threat information was simple and straightforward at best. …”
Hae kokoteksti Hae kokotekstiPro gradu -
3102
ISO 27000 -tietoturvastandardisarja osana nykypäivän yritysten tietoturvallisuuden hallintaa
Julkaistu 2023“…The literature review of the research consists of the information security management of organizations and the reference framework of the information security policy and information security management system. …”
Hae kokoteksti Hae kokotekstiPro gradu -
3103
Loppukäyttäjien osallistaminen pakettiohjelmistojen valinnassa
Julkaistu 2018“…The degree of user participation varies greatly from participating in an informal discussion of opinions to complete control of the process. …”
Hae kokoteksti Hae kokotekstiPro gradu -
3104
Visuaalisen tarkkaavaisuuden jakaminen salibandyssa
Julkaistu 2024Hae kokoteksti Hae kokotekstiPro gradu -
3105
ISO/IEC 27001 -sertifioinnin hankintaperusteet ja sertifiointielimen valintaperusteet
Julkaistu 2019“…ISO/IEC 27001 -certificate is a voluntary information security management system certificate which can be granted to an organization upon complying with the standard’s requirements. …”
Hae kokoteksti Hae kokotekstiPro gradu -
3106
Militarizing red teaming : agile and scalable process for cyber red teaming using adaptive planning and execution framework
Julkaistu 2019“…Solid knowledge base and environment description about red teaming and information security was completed in accordance with information systems research framework. …”
Hae kokoteksti Hae kokotekstiPro gradu -
3107
Ukrainan sodan vaikutukset äärioikeiston väkivaltakykyyn Suomessa
Julkaistu 2023“…The competition between the great powers has intensified and the rules-based international system has weakened. Russia's invasion of Ukraine in 2022 radically changed the security environment. …”
Hae kokoteksti Hae kokotekstiPro gradu -
3108
When Something Goes Right; Human as Recovery Barrier in Aviation
Julkaistu 2018“…Sheer attitude effect, especially when coming from the investigative authority, is expected to open new routes. New HF information with high value may become available when refining the executed workload experiment that indicated potential correlation to successful endings. …”
Hae kokoteksti Hae kokotekstiPro gradu -
3109
Kevyttä keskustelua vai tiivistä tietojen vaihtoa? : tietoverkkorikollisuuden tilannetietoisuuden jakaminen luottamusverkostossa
Julkaistu 2018“…Members of the forum were given an opportunity to express their wishes for the cooperation in semi-structured interviews as well as to call out identified challenges in the information sharing. Based on the interview results, a formal development process for the cooperation was formed by leveraging soft system methodology. …”
Hae kokoteksti Hae kokotekstiPro gradu -
3110
Heikkonäköisten ohjelmoijien kohtaamat ongelmat ohjelmoinnissa ja ohjelmakoodin esittäminen
Julkaistu 2023“…No difference was observed between normal, wrapped, or responsive style of presentation in SUS (System Usability Score), reading time or error rate. …”
Hae kokoteksti Hae kokotekstiPro gradu -
3111
-
3112
Kyberturvallisuuskulttuuri : ohjelmistoyritys Reaktorin ratkaisuja henkilöstön kautta kohdistuvien kyberuhkien vähentämiseksi
Julkaistu 2020“…Information security policies fail to respond to the pace of new attack methods and tools as well as to human errors in general. …”
Hae kokoteksti Hae kokotekstiPro gradu -
3113
Agents driven smart sensors
Julkaistu 2017“…Any physical area (like schools, home, hospitals etc.) that uses either mobile devices, sensors, embedded systems or computers to gather information from the users and the environment and eventually, adapt according to the new information gained. [1] Smart spaces compromises of heterogeneous hardware which often leads to the issues of interoperability. …”
Hae kokoteksti Hae kokotekstiPro gradu -
3114
Taistelualuksen ja siihen kohdistuvien kyberuhkien mallintaminen
Julkaistu 2023“…The analysis of the threat scenarios against the created model suggests that the common cyber threats among the maritime industry pose a risk to the combat system of a naval vessel. The most likely attack vector against the combat system is created by the other digital systems of the vessel. …”
Hae kokoteksti Hae kokotekstiPro gradu -
3115
LCA and added value creation : case: StickyX and the usage of SustainX tool
Julkaistu 2018Hae kokoteksti Hae kokotekstiPro gradu -
3116
Developing and testing sub-band spectral features in music genre and music mood machine learning
Julkaistu 2018“…In the field of artificial intelligence, supervised machine learning enables us to try to develop automatic recognition systems. In music information retrieval, training and testing such systems is possible with a variety of music datasets. …”
Hae kokoteksti Hae kokotekstiPro gradu -
3117
SaaS-based cloudservice’s monitoring: Case study
Julkaistu 2025Hae kokoteksti Hae kokotekstiPro gradu -
3118
Technical Cyber Threats in Undersea Infrastructure
Julkaistu 2025“…For the Vulnerability analysis, both Informational and Operational Technology concerns of system under consideration are considered, leveraging the MITRE ATT&CK classification, research done regarding SCADA vulnerabilities, and observations of recent trends. …”
Hae kokoteksti Hae kokotekstiPro gradu -
3119
-
3120