Search results for "kyber"

showing 10 items of 188 documents

Assessment of Cybersecurity Risks: Maritime Automated Piloting Process

2022

A modern society is a combination of several critical infrastructures, of which international and national maritime transportation systems are essential parts. Digitalization makes it possible to increase levels of autonomy in maritime systems. It also means fully existing cyberenvironments in maritime processes. In cyberenvironments, it is crucial there is trustable information communication between system elements of the process, alongside the usability, reliability, and integrity of systems data in the operating environment. In order to develop maritime autonomy in Finland the Sea4Value / Fairway (S4VF) research program has been developed. At the first stage of the program, the main goal…

maritime digitalizationrisks assessmentcybersecuritymeriliikenneprobabilityautomated pilotingluotsausmerenkulkuinfrastruktuuritriskinarviointidigitalisaatiokyberturvallisuusautomaattiohjaus
researchProduct

Assessment of Cyber Security risks : A Smart Terminal Process

2023

In Finland, the connections to global maritime transportation logistics systems are an essential part of the national critical infrastructure. As a part of maritime logistics systems, the port's operations are important elements for global maritime traffic and the transportation supply chain. Digitalization of seaport services makes it possible to increase the efficiency of terminal systems in the logistic processes. At the same time, port logistic processes can notably reduce its CO2 emissions by optimizing port operations. The improvement of port processes relies very much on the development of Information and Communication Technology (ICT) and Industrial Control Systems (ICS) or Operatio…

merikuljetusmaritime logisticsmart terminal processcyber security managementmeriliikennelogistiikkaälytekniikkamerenkulkusatamatriskinarviointikyberturvallisuusrisk assessments
researchProduct

Kriittisten käyttökokemusten vaikutus F-Securen Freedome-mobiilisovelluksen omaksumiseen ja jatkuvaan käyttöön

2015

Tässä tutkimuksessa pyritään selvittämään miten kriittiset käyttökokemukset vaikuttavat F-Securen Freedome-mobiilisovelluksen omaksumiseen ja jatkuvaan käyttöön. Tutkimus jakautuu kahteen osaan: kirjallisuuskatsaukseen ja empiriaan. Aluksi käydään läpi mitä mobiililaitteiden kyberturvallisuus on sekä mitkä kyberuhkat uhkaavat mobiililaitteita ja miten uhkia voidaan hallita. Kirjallisuuskatsauksen loppuosassa käydään läpi aihepiirin aikaisempia tutkimuksia ja käsitellään teknologian omaksumista selittäviä teorioita. Empiriaosuus sisältää tutkimuksen taustat ja tutkimuksen kulun sekä käy läpi tutkimustulokset ja niiden analysoinnin. Empiirinen tutkimusaineisto kerättiin puolistrukturoidulla p…

mobiililaitteetKyberturvallisuusmobiilisovelluksettietoturvakäyttöönottoomaksuminenKvalitatiivinen tutkimus
researchProduct

Kyber on kaikkialla

2017

monitieteisyystutkimuskyberturvallisuusdigitalisaatio
researchProduct

Non-Kinetic Warfare : The New Game Changer in the Battle Space

2020

Cyber warfare, information warfare, electronic warfare, command and control warfare, spectrum warfare. Those are only some of the names by which researchers and military experts describe their offensive and defensive non-kinetic actions. The reason for the diversity of the non-kinetic environment is the evolution of the military Electromagnetic Spectrum (EMS) and digital environment over 100 years. With the arrival of radio in the early 20th century, the militarization of the electronic operating environment began. The latest expansion is the formation of the cyber space. Also, the definitions vary significantly. There are differences between USA, Russia, China and NATO. Western countries t…

non-kinetic warfarekybersodankäyntielektroninen sodankäyntiinformaatiosodankäynticyber warfare
researchProduct

Standardit, ohjeet ja suositukset osana teollisuusorganisaatioiden kyberturvallisuuden hallintaa : CIRP-raportti 2017

2018

Standardisointi mahdollistaa organisaatiossa yhteisten toimintatapojen hakemisen. Se helpottaa myös organisaation toimintaa sen keskeisten sidosryhmien, kuten viranomaisten, muun elinkeinoelämän ja kuluttajien kanssa. Lisäksi standardisoinnilla edistetään tuotteiden yhteensopivuutta ja turvallisuutta, suojellaan kuluttajaa ja ympäristöä sekä helpotetaan kotimaista ja kansainväistä kauppaa. Tämä raportti on katsaus standardeihin, ohjeisiin ja suosituksiin, joiden koetaan olevan hyödyllisiä teollisuusyrityksen toiminnassa sen automaatiojärjestelmien (ICS-järjestelmä) kyberturvallisuuden näkökulmasta katsottuna. Katsauksessa pääpaino on dokumenteissa, jotka hyödyntävät teollisuusyrityksen toim…

ohjeetautomaatiojärjestelmätsuosituksetstandarditkyberturvallisuusteollisuusyritykset
researchProduct

Organizational Learning from Cybersecurity Performance: Effects on Cybersecurity Investment Decisions

2023

AbstractIS literature has identified various economic, performance, and environmental factors affecting cybersecurity investment decisions. However, economic modeling approaches dominate, and research on cybersecurity performance as an antecedent to investments has taken a backseat. Neglecting the role of performance indicators ignores real-world concerns driving actual cybersecurity investment decision-making. We investigate two critical aspects of cybersecurity performance: breach costs and breach identification source, as antecedents to cybersecurity investment decisions. We use organizational learning to theorize how performance feedback from these two aspects of cybersecurity breaches …

oppiva organisaatioComputer Networks and Communicationsbreach costTheoretical Computer Sciencecybersecurity investmentorganizational learningcybersecurity breachbreach identifcationcybersecurity performancetietoturvakyberturvallisuusSoftwaretieto- ja viestintärikoksetInformation SystemsInformation Systems Frontiers
researchProduct

Cyber security exercise : Literature review to pedagogical methodology

2019

This paper is a literature review, where we try to find out pedagogical principles has used in different virtual or simulated industry learning environments. The purpose is to use these findings to create in the future a new model for teaching in cyber security exercises. Cyber security exercises are the major service at JYVSECTEC - Jyväskylä Security Technology, cyber security research, training and development center in Finland [1]. JYVSECTEC Cyber security exercises are executed in real life simulation environment, RGCE (Realistic Global Cyber Environment) [1]. It provides the same functionality as the real Internet, but it is isolated from the real Internet and fully controlled by JYVSE…

pelillistäminensimulation pedagogyexercisegame based learningsimulaatioharjoitteluharjoituksetSociologyyhteisöllinen oppiminenComputer securitycomputer.software_genrekyberturvallisuuscomputer
researchProduct

Cyber security training in Finnish basic and general upper secondary education

2023

Cyber security in Finland is part of other areas of comprehensive security, as digital solutions multiply in society and technologies advance. Cyber security is one of the primary national security and nationaldefense concerns. Cyber security has quickly evolved from a technical discipline to a strategic concept. Cyber security capacity building can be measured based on the existence and number of research and developments, education and training programs, and certified professionals and public sector agencies.Cybersecurity awareness and the related civic skills play an increasingly important role as our societies become more digitalized. Improving citizens' cyber skills through education i…

perusopetuskoulutusosaaminenbasic educationkansalaistaitolukiogeneral upper secondary educationkyberturvallisuuscyber security educationInternational Conference on Cyber Warfare and Security
researchProduct

“This Is the Future of Advertising!” Or Is It? New Insights into the Justifiability of Deceptive Crowdwork in Cyberspace

2022

Unlike classical forms of deception where the deceiver deceives their victims directly, the crowdsourcing of cyber deception provides a powerful and cost-effective mechanism for deceivers to create and spread falsehood from the shadows. But for a mass deception campaign to be effective, the crowdworkers must rationalize (and willingly accept) their role in the deceptive act. What, then, could justify participation in a mass-deception campaign? To answer this question, we adopt the qualitative vignette approach and utilize neutralization theory as our guiding lens. Our results point to several neutralization techniques that crowdworkers could invoke to convincingly rationalize involvement in…

petososallistaminenkyberrikollisuusjoukkoistaminenkyberavaruusProceedings of the Annual Hawaii International Conference on System Sciences
researchProduct