Search for dissertations about: "Security Concepts"

Showing result 1 - 5 of 78 swedish dissertations containing the words Security Concepts.

  1. 1. Smartphone security : The smartphone as a security device and the public/private production of security

    Author : Håvard Rustad Markussen; Charlotte Wagnsson; Stefan Borg; Niklas Bremberg; Försvarshögskolan; []
    Keywords : SAMHÄLLSVETENSKAP; SOCIAL SCIENCES; Smartphone; security devices; appropriation; public private security; Critical Security Studies; Science and Technology Studies; Political Science; Statsvetenskap;

    Abstract : This thesis examines the smartphone as a security device through a comprehensive summary and four independent papers. The thesis starts from the observation that a central and yet underexplored characteristic of contemporary security politics is that the smartphone, as one especially important piece of consumer technology, is increasingly being transformed into a security device. READ MORE

  2. 2. Rethinking Ontological Security Theory : Conceptual Investigations into 'Self' and 'Anxiety'

    Author : Nina C. Krickel-Choi; Karl Gustafsson; Sebastian Larsson; Brent J. Steele; Stockholms universitet; []
    Keywords : SAMHÄLLSVETENSKAP; SOCIAL SCIENCES; anxiety; body; concepts; embodiment; existentialism; Giddens; identity; IR theory; Japan; Laing; North Korea; ontological security; phenomenology; psychological constructivism; recovering meaning; security studies; self; sovereignty; states; Taiwan; internationella relationer; International Relations;

    Abstract : The growing literature on ontological security has generated important insights about the behaviour of individuals, groups, and states in international politics. It has thereby greatly contributed to the discipline of International Relations (IR), especially to IR theory and the sub-field of Security Studies. READ MORE

  3. 3. Actual and Perceived Information Systems Security

    Author : Per Oscarson; Karin Axelsson; Göran Goldkuhl; Rune Gustafsson; Linköpings universitet; []
    Keywords : SAMHÄLLSVETENSKAP; SOCIAL SCIENCES; Information systems security; IS security; IT security; Information security; Actual and perceived; Information science; Informationslära;

    Abstract : As the Internet becomes the major information infrastructure in most sectors, the importance of Information Systems (IS) security steadily increases. While reaching a certain level of actual IS security is vital for most businesses, this level must also be perceived as acceptable by stakeholders. READ MORE

  4. 4. Smart connected homes : concepts, risks, and challenges

    Author : Joseph Bugeja; Jan Persson; Malmö universitet; []
    Keywords : Smart Connected Homes; Internet of Things; Smart Home Devices; Data Lifecycle; Security Risks; Privacy Management; Vulnerability Assessment; Security Mitigations; Threat Agents; Smart Home Services; System Architecture;

    Abstract : The growth and presence of heterogeneous connected devices inside the home have the potential to provide increased efficiency and quality of life to the residents. Simultaneously, these devices tend to be Internet-connected and continuously monitor, collect, and transmit data about the residents and their daily lifestyle activities. READ MORE

  5. 5. Supporting Information Security Management : Developing a Method for Information Classification

    Author : Erik Bergström; Rose-Mharie Åhlfeldt; Fredrik Karlsson; Eva Söderström; Steven Furnell; Högskolan i Skövde; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; information classification; Information security management; Information security management systems; Information classification method; INF303 Informationssäkerhet; INF303 Information Security; Information Systems; Informationssystem IS ;

    Abstract : In the highly digitalised world in which we live today, information and information systems have become critical assets to organisations, and hence need to be safeguarded accordingly. In order to implement and work with information security in a structured way, an Information Security Management System (ISMS) can be implemented. READ MORE