Advanced search
Showing result 1 - 5 of 204 swedish dissertations matching the above criteria.
-
1. Tailoring information security policies : a computerized tool and a design theory
Abstract : Protecting information assets in organizations is a must and one way for doing it is developing information security policy (ISP) to direct employees’ behavior and define acceptable procedures that employees have to comply with on a daily basis. However, compliance with the ISP is a perennial problem. READ MORE
-
2. A Systems Tool for Prescriptive Policy Analysis : Labelled Causal Mapping Method for Policy-oriented Modelling, Simulation and Decision analysis
Abstract : The elicitation and processing of relevant information is the core of any policy decision-making process. Modelling is about making sense of the available information. Models are able to incorporate the contextual influences on policy making (e.g. READ MORE
-
3. Essays on Interest Groups and Trade Policy
Abstract : This thesis explores the relationship between domestic political processes and interindustry variations in unilateral and multilateral trade policies. The literature on endogenous protection is extended to account for the potential importance of information flows, to explore the consequences of adapting the analyses to political systems which differ from the American kind, and to build a framework suitable for empirical examination. READ MORE
-
4. Demand and Supply of Information on Intangibles: The Case of Knowledge-Intense Companies
Abstract : This doctoral thesis has its theoretical origin in the notion that the information flow between management teams, financial analysts and investors is especially exposed to information asymmetry when knowledge-intense companies are concerned. Information asymmetry may aggravate agency problems and risk causing an impairment of the efficient allocation of capital on the stock market. READ MORE
-
5. A method for analyzing value-based compliance in systems security
Abstract : Aim: The aim of this thesis is to design a method that supports analysis of different values that come into play in compliance and non compliance situations within information systems security (ISS). The thesis addresses the problem of lack of ISS compliance methods that support systematic analysis of compliant and non-compliant behaviours as well as the reasons for these behaviours. READ MORE