Search for dissertations about: "IT security risk management"

Showing result 1 - 5 of 34 swedish dissertations containing the words IT security risk management.

  1. 1. Societal risk and safety management : Policy diffusion, management structures and perspectives at the municipal level in Sweden

    Author : Anna Johansson; Inge Svedung; Ragnar Andersson; Diana Stark-Ekman; Karlstads universitet; []
    Keywords : SAMHÄLLSVETENSKAP; SOCIAL SCIENCES; societal risk and safety management; risk management; safety management; safety work; risk governance; policy implementation; planning; injury; accident; risk; safety; security; health; public health; prevention; promotion.; Public Health Science; Folkhälsovetenskap;

    Abstract : This compilation thesis investigates risk and safety management at the Swedish local governmentallevel. It sets special focus on municipal implementation of overall international and nationalstrategies and objectives regarding holistic, cross-sectorial and multi-strategic risk and safetywork, and the prevention of accidents and injuries. READ MORE

  2. 2. Making the Dead Alive : Dynamic Routines in Risk Management

    Author : Martin Lundgren; Åsa Ericson; Johan Holmqvist; Stewart James Kowalski; Luleå tekniska universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; SAMHÄLLSVETENSKAP; SOCIAL SCIENCES; Risk management; information security; routine; practice; asset identification; risk analysis; risk treatment; organizational aspects; Information systems; Informationssystem; Centrumbildning - Centrum för säkerhet i samhälle och kritiska infrastrukturer CISS ; Centre - Centre for Critical Infrastructure and Societal Security CISS ;

    Abstract : Risk management in information security is relevant to most, if not all, organizations. It is perhaps even more relevant considering the opportunities offered by the digitalization era, where reliably sharing, creating, and consuming information has become a competitive advantage, and information has become an asset of strategic concern. READ MORE

  3. 3. Mobile Device Strategy : A management framework for securing company information assets on mobile devices

    Author : Martin Brodin; Jeremy Rose; Rose-Mharie Åhlfeldt; Anne Persson; Dan Harnesk; Högskolan i Skövde; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Strategic Management; Mobile device; Information security; information security management; information management; BYOD; CYOD; mobile strategy; mobile device strategy; management framework; Information Systems; Informationssystem IS ;

    Abstract : The problem addressed by this research is a demand for increased flexibility in access to organisational information, driven by the increasing popularity of mobile devices. Employees increasingly bring private devices to work (Bring Your Own Device, BYOD) or use work devices for private purposes (Choose Your Own Device, CYOD). READ MORE

  4. 4. Security in Physical Distribution Networks - A Survey Study of Swedish Transport Operators

    Author : Luca Urciuoli; Teknisk logistik; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; antagonistic threats.; supply chain security; cargo security; physical distribution security; transportation security; cargo theft; Quantitative Risk Assessment;

    Abstract : The objective of this study is to understand what factors influence the security of physical distribution networks. Thereafter it aims to bring to light what security measures exist today to enhance security and finally how to determine the profitability of security investments. READ MORE

  5. 5. Security in Physical Distribution - Causes, mitigation measures and an investment model

    Author : Luca Urciuoli; Teknisk logistik; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; security investments.; security measures in supply chains; causes of security vulnerability; antagonistic risks; security; physical distribution;

    Abstract : Recent statistics and terror events testify an increased vulnerability of distribution networks. Antagonistic threats as theft, counterfeiting, contamination and terror are burdening supply chains with unexpected costs in form of lost cargo, production downtimes, lower customer satisfaction, and higher transportation costs. READ MORE