To see the other types of publications on this topic, follow the link: Information security.

Dissertations / Theses on the topic 'Information security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Information security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Tyukala, Mkhululi. "Governing information security using organisational information security profiles." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/626.

Full text
Abstract:
The corporate scandals of the last few years have changed the face of information security and its governance. Information security has been elevated to the board of director level due to legislation and corporate governance regulations resulting from the scandals. Now boards of directors have corporate responsibility to ensure that the information assets of an organisation are secure. They are forced to embrace information security and make it part of business strategies. The new support from the board of directors gives information security weight and the voice from the top as well as the fi
APA, Harvard, Vancouver, ISO, and other styles
2

Åhlfeldt, Rose-Mharie. "Information Security in Home Healthcare." Thesis, Högskolan i Skövde, Institutionen för datavetenskap, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-618.

Full text
Abstract:
Healthcare is very information-intensive. Hence, it has become necessary to use the support of computers in order to efficiently improve such an information-intensive organisation. This thesis points out deficiencies in the area of information security in home healthcare regarding personal integrity and secrecy. Home healthcare is, in Sweden, performed by the municipalities. The work is based on the recommendations and common advice for processing of personal data compiled by the Data Inspection Board. Two municipalities in the Västra Götaland Region have been investigated. One of the municipa
APA, Harvard, Vancouver, ISO, and other styles
3

Yucel, Okan. "Information System Security." Master's thesis, METU, 2003. http://etd.lib.metu.edu.tr/upload/4/1260303/index.pdf.

Full text
Abstract:
This thesis analyzes the physical, communicational, and organizational dimensions of information system security process by taking the four-layer approach, which is composed of the policy, model, architecture, and mechanisms into account. Within this scope, according to the results of the security analysis of information systems in METU Informatics Institute, the policy, model, architecture, and mechanisms necessary to prepare a new security process were proposed. As a subcomponent of this proposed security process, the network security of the IS100 course was partially established, and the ge
APA, Harvard, Vancouver, ISO, and other styles
4

Saltysh, S. "Information security: passwords." Thesis, Sumy State University, 2014. http://essuir.sumdu.edu.ua/handle/123456789/45430.

Full text
Abstract:
Many people have accounts in different sites, and the problem is that hundreds of millions of passwords are being compromised by cybercriminals every year. People finally need to understand that the Internet is a very hostile place, while online service providers need to finally start taking network security seriously. One of the world’s leading password crackers just got better and is now able to crack passwords of up to 55 characters in length and algorithms such as TrueCrypt 5.0+, LastPass and Samsung Android Password/PIN.
APA, Harvard, Vancouver, ISO, and other styles
5

Burkhead, Randy L. "A phenomenological study of information security incidents experienced by information security professionals providing corporate information security incident management." Thesis, Capella University, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=3682325.

Full text
Abstract:
<p> The security of digital information is paramount to the success of private organizations. Violating that security is a multi-billion-dollar criminal business and exploiting these vulnerabilities creates a single point of failure for operations. Thus, understanding the detection, identification, and response to information security incidents is critical to protecting all levels of infrastructure. The lived experiences of current professionals indicate 10 unique themes in regards to how information security incidents are addressed in private organizations. These unique themes led the researc
APA, Harvard, Vancouver, ISO, and other styles
6

Alfawaz, Salahuddin M. "Information security management : a case study of an information security culture." Thesis, Queensland University of Technology, 2011. https://eprints.qut.edu.au/41777/1/Salahuddin_Alfawaz_Thesis.pdf.

Full text
Abstract:
This thesis argues that in order to establish a sound information security culture it is necessary to look at organisation's information security systems in a socio- technical context. The motivation for this research stems from the continuing concern of ineffective information security in organisations, leading to potentially significant monetary losses. It is important to address both technical and non- technical aspects when dealing with information security management. Culture has been identified as an underlying determinant of individuals' behaviour and this extends to information securit
APA, Harvard, Vancouver, ISO, and other styles
7

Lund, Per. "Information Security Awareness amongst students : A study about information security awareness at universities." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-70873.

Full text
Abstract:
In the era of information, it has become vital for companies to make sure that their information is properly protected. They are therefore, willing to spend large amounts of resources on protecting their information. This can usually be done in a large variety of ways. The root of information security is first and foremost, having policies that regulate how information security is upheld. And secondly, by teaching employees proper practice of information security. These are however procedures that are not all that common in a university environment, and even more so in relation to students.  
APA, Harvard, Vancouver, ISO, and other styles
8

Rastogi, Rahul. "Information security service management : a service management approach to information security management." Thesis, Nelson Mandela Metropolitan University, 2011. http://hdl.handle.net/10948/1389.

Full text
Abstract:
In today’s world, information and the associated Information Technology are critical assets for many organizations. Any information security breach, or compromise of these assets, can lead to serious implications for organizations that are heavily dependent on these assets. For such organizations, information security becomes vital. Organizations deploy an information security infrastructure for protecting their information assets. This infrastructure consists of policies and controls. Organizations also create an information security management system for managing information security in the
APA, Harvard, Vancouver, ISO, and other styles
9

Björck, Fredrik. "Discovering information security management /." Stockholm : Department of Computer and Systems Sciences, Stockholm University, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-718.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Talib, Shuhaili. "Personalising information security education." Thesis, University of Plymouth, 2014. http://hdl.handle.net/10026.1/2896.

Full text
Abstract:
Whilst technological solutions go a long way in providing protection for users online, it has been long understood that the individual also plays a pivotal role. Even with the best of protection, an ill-informed person can effectively remove any protection the control might provide. Information security awareness is therefore imperative to ensure a population is well educated with respect to the threats that exist to one’s electronic information, and how to better protect oneself. Current information security awareness strategies are arguably lacking in their ability to provide a robust and pe
APA, Harvard, Vancouver, ISO, and other styles
11

Wells, William Ward. "Information security program development." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2585.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Крапивний, Іван Васильович, Иван Васильевич Крапивный, Ivan Vasylovych Krapyvnyi, et al. "Information security economic systems in national security country." Thesis, Sumy State University, 2015. http://essuir.sumdu.edu.ua/handle/123456789/43592.

Full text
Abstract:
In today's world, information security becomes vital for ensuring the interests of man, society and the state and the most important, part of the whole system of national security. Doctrine considers all the work in the field of information based on the Concept of National Security of Ukraine. The doctrine identifies four main components of Ukraine's national interests in the information sphere.
APA, Harvard, Vancouver, ISO, and other styles
13

Spandonidis, Bladimiros. "Linking Information Security Awareness to Information Security Management Strategy.A Study in an IT Company." Thesis, Linnéuniversitetet, Institutionen för informatik (IK), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-45894.

Full text
Abstract:
There is a great concern when it comes to the investigation of the parameters that affect the formulation of an information security management strategy in an organization. Amongst others, information security awareness is of great interest, mainly because it links the implementation of the information security policies to the consciousness and the psychology of the employees of an organization. State it otherwise, the information security awareness positively beholds the role of a bridge so as to help the IS managers to evaluate the level that the critical information of the organization are
APA, Harvard, Vancouver, ISO, and other styles
14

Posthumus, Shaun Murray. "Corporate information risk : an information security governance framework." Thesis, Nelson Mandela Metropolitan University, 2006. http://hdl.handle.net/10948/814.

Full text
Abstract:
Information Security is currently viewed from a technical point of view only. Some authors believe that Information Security is a process that involves more than merely Risk Management at the department level, as it is also a strategic and potentially legal issue. Hence, there is a need to elevate the importance of Information Security to a governance level through Information Security Governance and propose a framework to help guide the Board of Directors in their Information Security Governance efforts. IT is a major facilitator of organizational business processes and these processes manipu
APA, Harvard, Vancouver, ISO, and other styles
15

Åhlfeldt, Rose-mharie. "Information Security in Home Healthcare." Thesis, University of Skövde, Department of Computer Science, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-618.

Full text
Abstract:
<p>Healthcare is very information-intensive. Hence, it has become necessary to use the support of computers in order to efficiently improve such an information-intensive organisation.</p><p>This thesis points out deficiencies in the area of information security in home healthcare regarding personal integrity and secrecy. Home healthcare is, in Sweden, performed by the municipalities. The work is based on the recommendations and common advice for processing of personal data compiled by the Data Inspection Board. Two municipalities in the Västra Götaland Region have been investigated. One of the
APA, Harvard, Vancouver, ISO, and other styles
16

Petrakakos, Nikolaos Harilaos. "Port security and information technology." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/33573.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Ocean Engineering, 2005.<br>Includes bibliographical references (p. 92).<br>The terrorist attacks of September 11th 2001 on New York and Washington DC shed light on the many security shortcomings that sea ports and the entire import and export process face. A primary source of these problems is the information sharing process which makes it hard to track the source of a problem in the import and export process due to lack of information and coordination. This thesis attempts to examine these data sharing problems by looking at what
APA, Harvard, Vancouver, ISO, and other styles
17

Beautement, A. "Optimising information security decision making." Thesis, University College London (University of London), 2013. http://discovery.ucl.ac.uk/1395123/.

Full text
Abstract:
The aim of the thesis is to investigate the relationship between human behaviour and effective security in order to develop tools and methods for supporting decision makers in the field of information security. A review of the literature of information security, Human Computer Interaction (HCI), and the economics of security reveals that role of users in delivering effective security has largely been neglected. Security designers working without an understanding of the limitations of human cognition implement systems that, by their nature, offer perverse incentives to the user. The result is t
APA, Harvard, Vancouver, ISO, and other styles
18

Flaaen, Stephen. "Information Security and the Cloud." Thesis, The University of Arizona, 2012. http://hdl.handle.net/10150/243939.

Full text
Abstract:
In today’s business environment companies are looking for ways to differentiate their services as well as maintain low costs to provide these services. Leveraging information technology has proved to be one of the most successful ways to accomplish this. One of the rapidly growing technologies that both small and large companies can utilize is cloud computing. A ubiquitous term for many IT managers and C-level executives, cloud computing is in fact a poorly understood term to many outside the realm of information technology. This paper develops a clear definition of cloud computing and also di
APA, Harvard, Vancouver, ISO, and other styles
19

Turesson, Michael, Vadim Koroliov, and Ola Brolin. "What is your password? : Assessing information security awareness among employees in an organisation." Thesis, Jönköping University, JIBS, Business Informatics, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-9655.

Full text
Abstract:
<p>The development of Information and Communication Technologies has opened up a large pool of possibilities for any and every business actor. These possibilities have brought up new vulnerabilities as well. Information security has become an inherent part of any organization. Companies and organizations invest significant amount of resources in IT security solutions, usually omitting the weakest link of the defense - the people.</p><p>The research intended to study and evaluate the information security awareness level of employees in a public organization which preferred to remain anonymous.
APA, Harvard, Vancouver, ISO, and other styles
20

Hellqvist, Fredrik. "Design of business information security policy : A case study on Orebro County Council´s work with information security." Thesis, Örebro universitet, Handelshögskolan vid Örebro Universitet, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-35527.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Hanus, Bartlomiej T. "The Impact of Information Security Awareness on Compliance with Information Security Policies: a Phishing Perspective." Thesis, University of North Texas, 2014. https://digital.library.unt.edu/ark:/67531/metadc699974/.

Full text
Abstract:
This research seeks to derive and examine a multidimensional definition of information security awareness, investigate its antecedents, and analyze its effects on compliance with organizational information security policies. The above research goals are tested through the theoretical lens of technology threat avoidance theory and protection motivation theory. Information security awareness is defined as a second-order construct composed of the elements of threat and coping appraisals supplemented by the responsibilities construct to account for organizational environment. The study is executed
APA, Harvard, Vancouver, ISO, and other styles
22

Toussaint, Gregory W. "Executive security awareness primer." Thesis, Utica College, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1586318.

Full text
Abstract:
<p> The purpose of this paper was to create a primer for a security awareness program to educate senior level executives on the key aspects of cyber security. This is due to the gap area that was discovered in the lack of both executive security awareness programs, and the lack of executives that fully abide by their company's security policies. This, coupled with research showing that executives are highly targeted by attackers, was the impetus behind this project. It was determined that the content of an executive security awareness program should be similar to that of a security awareness p
APA, Harvard, Vancouver, ISO, and other styles
23

Gutta, Ramamohan. "Managing Security Objectives for Effective Organizational Performance Information Security Management." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7147.

Full text
Abstract:
Information is a significant asset to organizations, and a data breach from a cyberattack harms reputations and may result in a massive financial loss. Many senior managers lack the competencies to implement an enterprise risk management system and align organizational resources such as people, processes, and technology to prevent cyberattacks on enterprise assets. The purpose of this Delphi study was to explore how the managerial competencies for information security and risk management senior managers help in managing security objectives and practices to mitigate security risks. The National
APA, Harvard, Vancouver, ISO, and other styles
24

He, Ying. "Generic security templates for information system security arguments : mapping security arguments within healthcare systems." Thesis, University of Glasgow, 2014. http://theses.gla.ac.uk/5773/.

Full text
Abstract:
Industry reports indicate that the number of security incidents happened in healthcare organisation is increasing. Lessons learned (i.e. the causes of a security incident and the recommendations intended to avoid any recurrence) from those security incidents should ideally inform information security management systems (ISMS). The sharing of the lessons learned is an essential activity in the “follow-up” phase of security incident response lifecycle, which has long been addressed but not given enough attention in academic and industry. This dissertation proposes a novel approach, the Generic S
APA, Harvard, Vancouver, ISO, and other styles
25

Aliti, Admirim, and Deniz Akkaya. "Employees' Role in Improving Information Systems Security." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-13769.

Full text
Abstract:
Information security is one of the most essential concerns in today’s organizations. IT departments in larger organizations are tasked to implement security, by both ensuring to have pertinent hardware and software, and likewise enlighten, teach and educate organization’s employees about security issues. The aim of this research is to focus on the human factor of the organization, which impacts the security of the information, since technological solutions of technical problems become incomprehensible without human recognition about security. If the security is not addressed in firms, this mig
APA, Harvard, Vancouver, ISO, and other styles
26

Thomson, Kerry-Lynn. "Integrating information security into corporate culture." Thesis, Port Elizabeth Technikon, 2003. http://hdl.handle.net/10948/132.

Full text
Abstract:
Introduction: There are many components that are required for an organisation to be successful in its chosen field. These components vary from corporate culture, to corporate leadership, to effective protection of important assets. These and many more contribute to the success of an organisation. One component that should be a definitive part in the strategy of any organisation is information security. Information security is one of the fastest growing sub-disciplines in the Information Technology industry, indicating the importance of this field (Zylt, 2001, online). Information security is c
APA, Harvard, Vancouver, ISO, and other styles
27

Mahmood, Ashrafullah Khalid. "Information Security Management of Healthcare System." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4353.

Full text
Abstract:
Information security has significant role in Healthcare organizations. The Electronic Health Record (EHR) with patient’s information is considered as very sensitive in Healthcare organization. Sensitive information of patients in healthcare has to be managed such that it is safe and secure from unauthorized access. The high-level quality care to patients is possible if healthcare management system is able to provide right information in right time to right place. Availability and accessibility are significant aspects of information security, where applicable information needs to be available a
APA, Harvard, Vancouver, ISO, and other styles
28

Jones, Malachi G. "Asymmetric information games and cyber security." Diss., Georgia Institute of Technology, 2013. http://hdl.handle.net/1853/50284.

Full text
Abstract:
A cyber-security problem is a conflict-resolution scenario that typically consists of a security system and at least two decision makers (e.g. attacker and defender) that can each have competing objectives. In this thesis, we are interested in cyber-security problems where one decision maker has superior or better information. Game theory is a well-established mathematical tool that can be used to analyze such problems and will be our tool of choice. In particular, we will formulate cyber-security problems as stochastic games with asymmetric information, where game-theoretic methods can then
APA, Harvard, Vancouver, ISO, and other styles
29

Sharma, Dhirendra S. M. Massachusetts Institute of Technology. "Enterprise Information Security Management Framework [EISMF]." Thesis, Massachusetts Institute of Technology, 2011. http://hdl.handle.net/1721.1/67568.

Full text
Abstract:
Thesis (S.M. in Engineering and Management)--Massachusetts Institute of Technology, Engineering Systems Division, System Design and Management Program, 2011.<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (p. 124-130).<br>There are several technological solutions available in the market to help organizations with information security breach detection and prevention such as intrusion detection and prevention systems, antivirus software, firewalls, and spam filters. There is no doubt in the fact that significant progress has been made in the technological side of
APA, Harvard, Vancouver, ISO, and other styles
30

Brown-Moorer, Charlotte A. "Traceable Enterprise Information Security Architecture Methodology." International Foundation for Telemetering, 2009. http://hdl.handle.net/10150/605972.

Full text
Abstract:
ITC/USA 2009 Conference Proceedings / The Forty-Fifth Annual International Telemetering Conference and Technical Exhibition / October 26-29, 2009 / Riviera Hotel & Convention Center, Las Vegas, Nevada<br>With the introduction of networking into telemetry applications, these systems have become increasingly complex. This imposes significant strain on information security for architecture designs. It has been recognized that an organized or structured approach to developing security architectures is needed. Several enterprise architecture frameworks are available today that address system comple
APA, Harvard, Vancouver, ISO, and other styles
31

Seeholzer, Roger V. "Investigating Roles of Information Security Strategy." NSUWorks, 2015. http://nsuworks.nova.edu/gscis_etd/49.

Full text
Abstract:
A fundamental understanding of the complexities comprising an information security strategy (ISS) in an organization is lacking. Most ISS implementations in government organizations equate anti-virus or installing a firewall to that of an ISS. While use of hardware and software forms a good defense; neither comprises the essence of an ISS. The ISS best integrates with business and information system strategies from the start, forming and shaping the direction of overall strategy synergistically within large government organizations. The researcher used grounded theory and investigated what a l
APA, Harvard, Vancouver, ISO, and other styles
32

Crémilleux, Damien. "Visualization for information system security monitoring." Thesis, CentraleSupélec, 2019. http://www.theses.fr/2019CSUP0013.

Full text
Abstract:
Le centre opérationnel de sécurité, SOC, est un élément central pour la sécurité des systèmes d’information. Danscette thèse, nous nous intéressons à ses limites et proposons un nouveau processus et deux outils visuels pour yrépondre. Nos contributions permettent à la fois une meilleure collaboration entre les analystes travaillant ausein des SOCs, ainsi que de faciliter visuellement le triage des événements de sécurité au sein des systèmesd’informations<br>A security operations center, SOC, is a key element for the security of information systems. In this thesis, weexhibited the limitations o
APA, Harvard, Vancouver, ISO, and other styles
33

Babiuk and Besnosyuk. "GOALS AND MEANS OF INFORMATION SECURITY." Thesis, Київ 2018, 2018. http://er.nau.edu.ua/handle/NAU/33663.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Agrianidis, Anastasios. "Information Security Training and Serious Games." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-85460.

Full text
Abstract:
The digital transformation of the 21st century has led to a series of new possibilities and challenges, where one major concern of many major organizations and enterprises is promoting Information Security Awareness and Training (ISAT) for their employees. This aspect of Information Security (IS) can promote cybersecurity in the work environment against threats related to the human factor. Apart from traditional methods as workshops and seminars, researchers study the effect of gamification on ISAT, by proposing customized digital games to train employees regardless their IT skills. This thesi
APA, Harvard, Vancouver, ISO, and other styles
35

Oscarson, Per. "Actual and Perceived Information Systems Security." Doctoral thesis, Linköping : Department of Management and Engineering, Linköping University, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-10215.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Da, Veiga Adéle. "Cultivating and assessing information security culture." Pretoria : [s.n.], 2009. http://upetd.up.ac.za/thesis/available/etd-04242009-165716/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Helms, J. (Janne). "Information systems security management:a literature review." Master's thesis, University of Oulu, 2019. http://jultika.oulu.fi/Record/nbnfioulu-201906212604.

Full text
Abstract:
Abstract. Information security has begun to receive an increasing amount of intention. The importance of information security has started to be recognized among organizations and the work to comply with the increased requirements has been started. One essential method of managing information security is an information security policy, that is created and managed to suit the needs of each organization. Managing information security policies can be viewed a tedious task and thus easily dismissed or done quickly. There are several aspects to cover and components to manage, including technical
APA, Harvard, Vancouver, ISO, and other styles
38

Faizi, Ana. "Information Security Risk Assessment in Cloud." Thesis, Luleå tekniska universitet, Datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-76120.

Full text
Abstract:
This research addresses the issue of information security risk assessment (ISRA) on cloud solutions implemented for large companies. Four companies were studied, of which three used cloud services and conducted ISRA, while one provided cloud services and consultancy to customers on ISRA. Data were gathered qualitatively to (1) analyze the cloud using companies’ practices and (2) to identify regularities observed by the cloud providing company. The COAT-hanger model, which focuses on theorizing the practices, was used to study the practices. The results showed that the companies aimed to follow
APA, Harvard, Vancouver, ISO, and other styles
39

Harris, Mark. "THE SHAPING OF MANAGERS’ SECURITY OBJECTIVES THROUGH INFORMATION SECURITY AWARENESS TRAINING." VCU Scholars Compass, 2010. http://scholarscompass.vcu.edu/etd/2208.

Full text
Abstract:
Information security research states that corporate security policy and information security training should be socio-technical in nature and that corporations should consider training as a primary method of protecting their information systems. However, information security policies and training are predominately technical in nature. In addition, managers creating security policies rely heavily on security guidelines, which are also technically oriented. This study created a series of information security training videos that were viewed by four groups of managers. One video discussed the
APA, Harvard, Vancouver, ISO, and other styles
40

Farnian, Adnan. "Assessing The Relative Importance of Information Security Governance Processes on Reducing Negative Impacts From Information Security Incidents." Thesis, KTH, Industriella informations- och styrsystem, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-81417.

Full text
Abstract:
Today the extent and value of electronic data is constantly growing. Dealing across the internet depends on how secure consumers believe their personal data are. And therefore, information security becomes essential to any business with any form of web strategy, from simple business-to-consumer, or business-to-business to the use of extranets, e-mail and instants messaging. It matters too any organization that depends on computers for its daily existence. This master thesis has its focus on Information Security Governance. The goal of this thesis was to study different Information Security pro
APA, Harvard, Vancouver, ISO, and other styles
41

Waddell, Stanie Adolphus. "A Study of the Effect of Information Security Policies on Information Security Breaches in Higher Education Institutions." NSUWorks, 2013. http://nsuworks.nova.edu/gscis_etd/331.

Full text
Abstract:
Many articles within the literature point to the information security policy as one of the most important elements of an effective information security program. Even though this belief is continually referred to in many information security scholarly articles, very few research studies have been performed to corroborate this sentiment. Doherty and Fulford undertook two studies in 2003 and in 2005 respectively that sought to catalogue the impact of the information security policy on breaches at businesses in the United Kingdom. The pair went on to call for additional studies in differing indust
APA, Harvard, Vancouver, ISO, and other styles
42

Soyref, Maxim. "The holistic management of information security processes." Thesis, The University of Sydney, 2014. http://hdl.handle.net/2123/13373.

Full text
Abstract:
Title: The holistic management of information security processes Keywords: cybersecurity, information security, strategy, security process, security governance, security management This research examines information security management and associated processes within a large Australian financial institution by providing a rich, in-depth view of organisational information security management within the specifics of its dynamic context. Using a single in-depth qualitative case study, this research examines the role of internal and external actors in relation to the information security managemen
APA, Harvard, Vancouver, ISO, and other styles
43

Tuyisenge, Marie Jeanne. "BLOCKCHAIN TECHNOLOGY SECURITY CONCERNS:LITERATURE REVIEW." Thesis, Uppsala universitet, Informationssystem, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-446799.

Full text
Abstract:
Blockchain is a technology that allows the decentralization of data stored in a way that there is no single central actor to control or modify the data. Bitcoin is the first successful blockchain application implemented with the concept known as cryptocurrency that allows a transaction flow without any bank or government to control it. Blockchain is associated with benefits including high level of transparency, integrity, trust and confidence for the participants. Blockchain is still at early stage but it is a promising technology that has the potential to impact many more areas in the future.
APA, Harvard, Vancouver, ISO, and other styles
44

Korovessis, Peter. "Establishing an information security awareness and culture." Thesis, University of Plymouth, 2015. http://hdl.handle.net/10026.1/3836.

Full text
Abstract:
In today’s business environment all business operations are enabled by technology. Its always on and connected nature has brought new business possibilities but at the same time has increased the number of potential threats. Information security has become an established discipline as more and more businesses realize its value. Many surveys have indicated the importance of protecting valuable information and an important aspect that must be addressed in this regard is information security awareness. The human component has been recognized to have an important role in information security since
APA, Harvard, Vancouver, ISO, and other styles
45

Edwards, Keith. "Examining the Security Awareness, Information Privacy, and the Security Behaviors of Home Computer Users." NSUWorks, 2015. http://nsuworks.nova.edu/gscis_etd/947.

Full text
Abstract:
Attacks on computer systems continue to be a problem. The majority of the attacks target home computer users. To help mitigate the attacks some companies provide security awareness training to their employees. However, not all people work for a company that provides security awareness training and typically, home computer users do not have the incentive to take security awareness training on their own. Research in security awareness and security behavior has produced conflicting results. Therefore, it is not clear, how security aware home computer users are or to what extent security awareness
APA, Harvard, Vancouver, ISO, and other styles
46

Alkahtani, Hend K. "Raising the information security awareness level in Saudi Arabian organizations through an effective, culturally aware information security framework." Thesis, Loughborough University, 2018. https://dspace.lboro.ac.uk/2134/28120.

Full text
Abstract:
The focus of the research is to improve the security of information systems in Saudi Arabian knowledge-intensive organisations by raising the awareness level among all types of information system users. This is achieved by developing a culturally aware information security framework that requires the involvement of all types of information system user. Saudi Arabia has a unique culture that affects the security of information systems and, hence, the development of this information security framework. The research uses Princess Nora bint Abdul Rahman University (PNU), the largest all female uni
APA, Harvard, Vancouver, ISO, and other styles
47

Hone, Karin. "The information security policy: an important information security management control." Thesis, 2008. http://hdl.handle.net/10210/274.

Full text
Abstract:
This study originated from the realisation that the information security industry has identified the information security policy as one of the most important information security management controls. Within the industry there are, however, differing views as to what constitutes an information security policy, what it should contain, how it should be developed and how it should best be disseminated and managed. Numerous organisations claim to have an information security policy, but admit that it is not an effective control. The principal aim of this study is to make a contribution to the infor
APA, Harvard, Vancouver, ISO, and other styles
48

Martins, Adele. "Information security culture." Thesis, 2008. http://hdl.handle.net/10210/292.

Full text
Abstract:
The current study originated from the realisation that information security is no longer solely dependent on technology. Information security breaches are often caused by users, most of the time internal to the organisation, who compromise the technology-driven solutions. This interaction between people and the information systems is seemingly the weakest link in information security. A people-oriented approach is needed to address this problem. Incorporating the human element into information security could be done by creating an information security culture. This culture can then focus on th
APA, Harvard, Vancouver, ISO, and other styles
49

Von, Solms Elmarie. "Institutionalizing information security." Thesis, 2008. http://hdl.handle.net/10210/523.

Full text
Abstract:
Information security has become a much discussed subject all over the world in the last few years. This is because information security is no longer a luxury, but a necessity in all organisations. The securing of information is not an easy task because information security is flexible and always seems to be in a state of development. This means that information security has undergone different development changes due to new technologies in the past few years. Information security became prominent around 50 years ago and had a very strict technical approach. In this approach, industries mainly
APA, Harvard, Vancouver, ISO, and other styles
50

Liou, Jia-Yin, and 劉家吟. "Information Security Policy Compliance:A View from Information Security Climate and Psychology." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/cq2u4h.

Full text
Abstract:
碩士<br>淡江大學<br>資訊管理學系碩士班<br>102<br>With the rapid development of information technology, information security management issues are more and more important. Currently, information security policy compliance research mainly investigates information security behaviors of employees from general deterrence theory and protection motivation theory lens. However, these studies focus on the discussions of security specifications of organization and the motivations of individual’s behavior but omit the influences of psychological factors on employee’s information security policy compliance. To fill this
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!