Search for dissertations about: "information security management"
Showing result 16 - 20 of 130 swedish dissertations containing the words information security management.
-
16. Tool Support for Enterprise Architecture Analysis : with application in cyber security
Abstract : In today’s companies, business processes and information technology areinterwoven. Old and new systems as well as off-the-shelf products and tailoredsolutions are used. This results in heterogeneous, often complex ITlandscapes. The impact of changes and the affected systems are difficult toidentify. READ MORE
-
17. Understanding, Implementing, and Supporting Security Assurance Cases in Safety-Critical Domains
Abstract : The increasing demand for connectivity in safety-critical domains has made security assurance a crucial consideration. In safety-critical industry, software, and connectivity have become integral to meeting market expectations. READ MORE
-
18. Bringing Visibility in the Clouds : using Security, Transparency and Assurance Services
Abstract : The evolution of cloud computing allows the provisioning of IT resources over the Internet and promises many benefits for both - the service users and providers. Despite various benefits offered by cloud based services, many users hesitate in moving their IT systems to the cloud mainly due to many new security problems introduced by cloud environments. READ MORE
-
19. New Forms of Collaboration in Emergency Response Systems : A framework for participatory design of information systems
Abstract : An emergency response systems (ERS) is usually responsible for delivering essential services to save lives and minimise environmental damage in case of small, frequent or large-scale emergencies. The ongoing global financial crisis, lack of professional resources, public sector cuts and rising public expectations are some of the challenges ERSs currently are facing. READ MORE
-
20. Secure Service Provisioning in a Public Cloud
Abstract : The evolution of cloud technologies which allows the provisioning of IT resources over the Internet promises many benefits for the individuals and enterprises alike. However, this new resource provisioning model comes with the security challenges which did not exist in the traditional resource procurement mechanisms. READ MORE