• Adopting cloud computing and hosted services in pharmaceuticals industry 

      Harjulampi, Ville (Jyväskylän ammattikorkeakoulu, 2013)
      Cloud computing has become popular among consumers and within bigger corporations as well. Information technology services that used to be internal only can be now taken into cloud using various combinations of cloud ...
    • Analyzing Java EE application security with SonarQube 

      Paananen, Timo (Jyväskylän ammattikorkeakoulu, 2016)
      The master's thesis studied SonarQube's capabilities to find security weaknesses in a Java EE application. Firstly, the master's thesis aims to recognize possible points where a developer could cause security weakness to ...
    • Assessing maturity of disaster recovery planning : Case study 

      Ylikangas, Mika (Jyväskylän ammattikorkeakoulu, 2017)
      The idea for this study came from an interest to research disaster recovery planning as a process and how the maturity of the planning process can be measured. Maturity of a process can be described in terms of predictability ...
    • Assisting Software Quality Assurance by Change Impact Analysis : A tool-driven Approach 

      Hietala, Iiro (Jyväskylän ammattikorkeakoulu, 2014)
      The primary goal of this thesis was to research the previous software change impact analysis research and the availability of impact analysis tools targeted for quality assurance, i.e. tools that analyse the Actual Impact ...
    • Automated ISMS control auditability 

      Suomu, Mikko (Jyväskylän ammattikorkeakoulu, 2015)
      This thesis focuses on researching a possible reference model for automated ISMS’s (Information Security Management System) technical control auditability. The main objective was to develop a generic framework for automated ...
    • Automated Testing Performed by Developers 

      Turto, Tuukka (Jyväskylän ammattikorkeakoulu, 2013)
      The commissioner of the thesis was Digia Plc and the target of the thesis was to research and improve automated testing performed by the software developers. The main topics of the thesis were research, development and ...
    • CI System Relocation 

      Tuovila, Jani (Jyväskylän ammattikorkeakoulu, 2016)
      A network of partner companies has established a Virtual Enterprise in order to develop a complex telecommunication device for the customer. The project has been ongoing already for several years and during that time a ...
    • CREATING RESPONSIVE UI FOR WEB STORE USING CSS 

      Wiciak, Magdalena (Jyväskylän ammattikorkeakoulu, 2014)
      Nowadays people spend most of their days using mobiles and tablets to access web sites. It is really important to ensure that all customers are able to access a web site no matter where they are and which devices they use. ...
    • Decomposition of monolithic web application to microservices 

      Zaymus, Mikulas (Jyväskylän ammattikorkeakoulu, 2017)
      Solteq Oyj has an internal Wellbeing project for massage reservations. The task of this thesis was to transform the monolithic architecture of this application to microservices. The thesis starts with a detailed comparison ...
    • Development of Secure IoT Based on Modern Microcontrollers 

      Haluška, Juraj (Jyväskylän ammattikorkeakoulu, 2017)
      This paper describes the development process of a secured Internet of Things (IoT) system. Firstly, it analyses the available technologies and methods for development of secure IoT. It also describes the most suitable ...
    • ENDPOINT PROTECTION SECURITY SYSTEM FOR AN ENTERPRISE 

      Ruotsalainen, Petri (Jyväskylän ammattikorkeakoulu, 2013)
      The thesis subscriber was Metso Shared Services Ltd. The objective was to find out if Microsoft Forefront Endpoint Protection 2010 (FEP) would be secure and cost-effective enough system to fulfill the requirements of the ...
    • Enhancing Cyber Security for SME organizations through self-assessments : How self-assessment raises awareness 

      Hassinen, Tarmo (Jyväskylän ammattikorkeakoulu, 2017)
      This thesis primarily studied the importance of self-assessment in increasing business organizations’ cyber security awareness of their ICT environment. The secondary studied item was the relevance of self-assessment in ...
    • Evaluating Usability in Video Conferencing Service in Metso 

      Suominen, Mia (Jyväskylän ammattikorkeakoulu, 2013)
      The main target of the thesis was trying to evaluate the usability of video conferencing service in Metso. It was known that normally usability evaluations are conducted at the early phase of designing and developing a ...
    • Functional Testing of BYOD Features with Next-Generation Firewall : PAN-OS Version 5.0.x 

      Laine, Pauli (Jyväskylän ammattikorkeakoulu, 2013)
      The objective of the thesis was to test different kind of remote access methods with different mo-bile devices and platforms leveraging Next-Generation FireWall features. The most essential objec-tive was to enable several ...
    • HIP Mobile Client 

      Myry, Perttu (Jyväskylän ammattikorkeakoulu, 2013)
      HIP is an acronym that stands for Humap Inspiration Platform. It is a web-based service developed and provided by Humap software Ltd. It can be used to build various products, services and concepts for numerous purposes. In ...
    • Human behavior from Cyber Security perspective 

      Tikkanen, Tommi (Jyväskylän ammattikorkeakoulu, 2017)
      The purpose of the thesis was to consider issues affecting human behavior and to assess if they could be better considered in the implementation of security practices. The study focuses on human behavior when an employee ...
    • ICT CONTINGENCY ON FINNISH ORGANIZATIONS : SURVEY FOR ICT CONTINGENCY PLANNING 

      Tarvainen, Pasi (Jyväskylän ammattikorkeakoulu, 2013)
      The importance of ICT contingency and resiliency planning has significantly increased during the last years. The threats for ICT systems have expanded and changed due to rapid technological develop-ment. For the public ...
    • Implementing Information Security Management System as a part of business processes : Where to gain competitive advantage for ISMS? 

      Flyktman, Jari (Jyväskylän ammattikorkeakoulu, 2016)
      The Idea and background to the study subject lies in the interest in security, leadership and organizational development. The research question was how to provide best practices to fit these all together in harmony. The ...
    • Implementing security controls in existing system 

      Savonen, Henri (Jyväskylän ammattikorkeakoulu, 2016)
      The main objective is the investigation of possibilities of elevating existing and old information system to comply with the current information security criteria. The elevation process of one system security is included, ...
    • Implementing situational awareness 

      Hulkkonen, Timo (Jyväskylän ammattikorkeakoulu, 2016)
      Implementation of situational awareness system became an objective when Finnish national regulations for A-class systems, in the context of healthcare systems were updated. The updated criteria require IT service providers ...