Search for dissertations about: "Information Security management policies"

Showing result 1 - 5 of 16 swedish dissertations containing the words Information Security management policies.

  1. 1. Supporting Information Security Management : Developing a Method for Information Classification

    Author : Erik Bergström; Rose-Mharie Åhlfeldt; Fredrik Karlsson; Eva Söderström; Steven Furnell; Högskolan i Skövde; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; information classification; Information security management; Information security management systems; Information classification method; INF303 Informationssäkerhet; INF303 Information Security; Information Systems; Informationssystem IS ;

    Abstract : In the highly digitalised world in which we live today, information and information systems have become critical assets to organisations, and hence need to be safeguarded accordingly. In order to implement and work with information security in a structured way, an Information Security Management System (ISMS) can be implemented. READ MORE

  2. 2. Managing information security for mobile devices in small and medium-sized enterprises : Information management, Information security management, mobile device

    Author : Martin Brodin; Jeremy Rose; Rose-Mharie Åhlfeldt; Stewart Kowalski; Miko Siponen; Högskolan i Skövde; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Information management; Information security management; mobile device; Information Systems; Informationssystem IS ;

    Abstract : The rapid proliferation of mobile devices makes mobile security a weak point in many organisations’ security management. Though there are a number of frameworks and methods available for improving security management, few of these target mobile devices, and most are designed for large organisations. READ MORE

  3. 3. Tailoring information security policies : a computerized tool and a design theory

    Author : Elham Rostami; Fredrik Karlsson; Ella Kolkowska; Shang Gao; Steven Furnell; Örebro universitet; []
    Keywords : SAMHÄLLSVETENSKAP; SOCIAL SCIENCES; Information security management software; tailorable information security policy; policy component; design science; POLCO;

    Abstract : Protecting information assets in organizations is a must and one way for doing it is developing information security policy (ISP) to direct employees’ behavior and define acceptable procedures that employees have to comply with on a daily basis. However, compliance with the ISP is a perennial problem. READ MORE

  4. 4. Usable privacy for digital transactions : Exploring the usability aspects of three privacy enhancing mechanisms

    Author : Julio Angulo; John Sören Pettersson; Simone Fischer-Hübner; Erik Wästlund; Karlstads universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; Privacy-Enhancing Technologies; usability; usable privacy; mental models; mobile devices; security; digital transactions; e-commerce; User Interfaces; Information Systems; Informatik;

    Abstract : The amount of personal identifiable information that people distribute over different online services has grown rapidly and considerably over the last decades. This has led to increased probabilities for identity theft, profiling and linkability attacks, which can in turn not only result in a threat to people’s personal dignity, finances, and many other aspects of their lives, but also to societies in general. READ MORE

  5. 5. Towards Automated Context-aware Vulnerability Risk Management

    Author : Vida Ahmadi Mehri; Emiliano Casalicchio; Patrik Arlos; Stefan Axelsson; Blekinge Tekniska Högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Vulnerability Risk Management; VRM; Automated Context-Aware Vulnerability Risk Management; ACVRM; Information security; Computer Science; Datavetenskap;

    Abstract : The information security landscape continually evolves with increasing publicly known vulnerabilities (e.g., 25064 new vulnerabilities in 2022). Vulnerabilities play a prominent role in all types of security related attacks, including ransomware and data breaches. READ MORE