Search for dissertations about: "Information Security management policies"
Showing result 1 - 5 of 16 swedish dissertations containing the words Information Security management policies.
-
1. Supporting Information Security Management : Developing a Method for Information Classification
Abstract : In the highly digitalised world in which we live today, information and information systems have become critical assets to organisations, and hence need to be safeguarded accordingly. In order to implement and work with information security in a structured way, an Information Security Management System (ISMS) can be implemented. READ MORE
-
2. Managing information security for mobile devices in small and medium-sized enterprises : Information management, Information security management, mobile device
Abstract : The rapid proliferation of mobile devices makes mobile security a weak point in many organisations’ security management. Though there are a number of frameworks and methods available for improving security management, few of these target mobile devices, and most are designed for large organisations. READ MORE
-
3. Tailoring information security policies : a computerized tool and a design theory
Abstract : Protecting information assets in organizations is a must and one way for doing it is developing information security policy (ISP) to direct employees’ behavior and define acceptable procedures that employees have to comply with on a daily basis. However, compliance with the ISP is a perennial problem. READ MORE
-
4. Usable privacy for digital transactions : Exploring the usability aspects of three privacy enhancing mechanisms
Abstract : The amount of personal identifiable information that people distribute over different online services has grown rapidly and considerably over the last decades. This has led to increased probabilities for identity theft, profiling and linkability attacks, which can in turn not only result in a threat to people’s personal dignity, finances, and many other aspects of their lives, but also to societies in general. READ MORE
-
5. Towards Automated Context-aware Vulnerability Risk Management
Abstract : The information security landscape continually evolves with increasing publicly known vulnerabilities (e.g., 25064 new vulnerabilities in 2022). Vulnerabilities play a prominent role in all types of security related attacks, including ransomware and data breaches. READ MORE