Search for dissertations about: "IT IS security"
Showing result 1 - 5 of 727 swedish dissertations containing the words IT IS security.
-
1. Smartphone security : The smartphone as a security device and the public/private production of security
Abstract : This thesis examines the smartphone as a security device through a comprehensive summary and four independent papers. The thesis starts from the observation that a central and yet underexplored characteristic of contemporary security politics is that the smartphone, as one especially important piece of consumer technology, is increasingly being transformed into a security device. READ MORE
-
2. Actual and Perceived Information Systems Security
Abstract : As the Internet becomes the major information infrastructure in most sectors, the importance of Information Systems (IS) security steadily increases. While reaching a certain level of actual IS security is vital for most businesses, this level must also be perceived as acceptable by stakeholders. READ MORE
-
3. Sensitising Urban Transport Security : Surveillance and Policing in Berlin, Stockholm, and Warsaw
Abstract : The city as a focal point of both domestic and international security policy is characteristic of the 21st century security landscape in Europe. Amidst the 'War on Terror' and the pan-European battle against organised crime, the city is the location where global processes are actually taking place. READ MORE
-
4. Web Application Content Security
Abstract : The web has become ubiquitous in modern lives. People go online to stay in contact with their friends or to manage their bank account. With lots of different sensitive information handled by web applications securing them naturally becomes important. READ MORE
-
5. Enhancing IT Systems Cyber Resilience through Threat Modeling : Cyber Security Analysis of Enterprise Systems and Connected Vehicles
Abstract : Information technology (IT) systems are growing in complexity and are becoming more and more connected. Such connected systems can increase flexibility and productivity while also introducing security threats. READ MORE
