- Selaus nimekkeen mukaan Jyväskylän ammattikorkeakoulu
Viitteet 1743-1762 / 15670
-
Customer-Oriented Services in Mental Health Rehabilitation: The perspective of mental health rehabilitation professionals
(2019)Alueellisesti Etelä-Savossa mielenterveyshäiriöiden esiintyvyys on korkeampi kuin kansallisella tasolla. Perus- ja terveydenhuollon peruspalvelujen parantaminen on tärkeää, koska mielenterveyspalvelujen kysyntä keskittyy ... -
Customers' Buying Behavior : Case IKEA Tampere
(Jyväskylän ammattikorkeakoulu, 2015)Consumers' buying behavior consists of the decision of purchase place, product search, purchase decision and consumption. Buying behavior varies between different consumer types. This broad concept is one of the most ... -
Customers' Perception of Corporate Social Responsibility in Finnish Tourism Industry
(2022)Corporate Social Responsibility nowadays is perceived as a unique concept that might have a posi- tive impact not only on any businesses’ performance, but on the society as a whole. Even though Corporate Social Responsibility ... -
Customers' values and attitudes regarding environmental sustainability in rural tourism
(Jyväskylän ammattikorkeakoulu, 2014)The objective of the research was to examine customers’ values and attitudes regarding environmental sustainability in rural tourism. The thesis is part of the KESMA II project the purpose of which is to develop the ... -
Customizing social media marketing to different social media platforms
(2021)In the ever-changing world of social media and social media marketing, the practices of it appear to be still lacking, especially on part of Finnish brands. This resulted in hypotheses being formed, aren’t there more ... -
Cyber Incident Response in Public Cloud: implications of modern cloud computing characteristics for cyber incident response
(2023)Modern cloud computing has fundamentally changed how IT-resources are consumed by organizations and end-users. The cloud is also defined by some of its key characteristics: on-demand self-service, broad network access, ... -
Cyber Range Technical Federation: Case Flagship 1 Exercise
Advanced Sciences and Technologies for Security Applications (Springer, 2023)Modern cyber domain is an extremely complex field to master. There are numerous capricious dependencies between networked systems and data. In cyber security, technology has a major role, but the knowledge and skills of ... -
Cyber range: preparing for crisis or something just for technical people?
(Academic conferences international, 2021)Digitalization has increased the significance of cybersecurity within the current highly interconnected society. The number and complexity of different cyber-attacks as well as other malicious activities has increased ... -
Cyber Readiness in Finnish Contract Fire Brigades
(2021)Sopimuspalokunnilla on merkittävä rooli pelastustoimen järjestämisessä Suomessa. Harvaan asutulla seudulla sopimuspalokunta on kohteen ensimmäisenä saavuttava pelastustoimen yksikkö, usein myös ainoa. Taajama-alueella ... -
Cyber Security Exercise Modeling & Tracking : Building RESTful Service and MVC Web Application for Visualization and Tracking of Cyber Security Exercise Execution using Modern Web Techniques and Standards
(Jyväskylän ammattikorkeakoulu, 2016)JYVSECTEC has a cyber range where cyber defense exercises are held. Presently there was no graphical interface for participating teams to visualize CDX networks for tagging threats to them in the exercises. This visualization ... -
Cyber security exercise – literature review to pedagogical methodology
(International Association of Technology Education and Development, 2019) -
Cyber Security in Modern Agriculture. Case Study: IoT-based Insect Pest Trap System
(2021)A simple traditional insect pest trap system is transformed by Internet of Things (IoT for short) into an advanced connected device. The benefits are immense but cyber security imposes a great threat. The goal is to develop ... -
Cyber Security in the Space Domain : Can Traditional Cyber Methods be Applied in the Ground Segment of Space Projects?
(2021)Stronger cyber security is needed in the space domain, since the attack surfaces are widening as the number of new space projects are growing and new use cases emerge for satellites, related to 5G and IoT. Author proposed ... -
Cyber Security Incident Management Process in NOC/SOC Integration
(2020)Kybertapahtumanhallintaprosessin kuvaus ja jalkautus Erilliverkot Oy:n NOC/SOC valvomossa. -
Cyber Security Management in Energy Supply : Cyber Security Roadmap for Elenia
(2021)Sähkönjakeluyhtiö Elenia on toteuttamassa kyberturvallisuuden tiekarttaa vuosille 2023–2025. Tavoitteena oli tutkia kyberturvallisuuden merkitystä tulevaisuudessa tunnistamalla sähkönjakeluun keskeisesti vaikuttavat ... -
Cyber Security of Highly Automated Connected Machines
(2021)Tietojärjestelmien nopea integrointi ja yhteenliittyminen luo uusia kyberturvallisuuteen liittyviä uhkia tietojärjestelmille ympäri maailmaa. Nykyään nämä uhkaskenaariot ovat läsnä myös eri toimialojen liikkuvissa ... -
Cyber security risk management method for hospital pharmacy: pharmaceutical service operations
(2023)Sosiaali- ja terveysala on kokenut Suomessa suuria muutoksia sosiaali-, terveys- ja pelastuspalveluiden uudelleen järjestelyjen seurauksena ja uudet hyvinvointialueet ovat aloittaneet toimintansa vuonna 2023. Uusia ... -
Cyber Security studies at JAMK and RUAS : Designing cyber security exercises for S.A.R.E.N. Cyber Range
(2019)JAMK University of Applied Sciences offers cyber security students the opportunity to go to Rotterdam University of Applied Sciences as an exchange student. During this exchange period an opportunity arose for writing a ... -
Cyber Threats in Modern Finland
(2021)Maailmassa rakennetaan yhä kehittyneempiä ja toisiinsa yhteydessä olevia tietoliikennetekniikkajärjestelmiä, on huolehdittava niiden pitkän tähtäimen kestävyydestä. Kyberturvallisuus on kilpailua puolustajien ja haitallisten ... -
Cyber Warfare: A Part of the Russo-Ukrainian War in 2022
(2022)On 24th of February, 2022, the Russian Federation launched an invasion of Ukraine. This is the first-time cyber warfare capabilities are used as part of modern warfare. During this war around 800 cyber-attacks have been ...