To see the other types of publications on this topic, follow the link: Organizational information security.

Dissertations / Theses on the topic 'Organizational information security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Organizational information security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Gutta, Ramamohan. "Managing Security Objectives for Effective Organizational Performance Information Security Management." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7147.

Full text
Abstract:
Information is a significant asset to organizations, and a data breach from a cyberattack harms reputations and may result in a massive financial loss. Many senior managers lack the competencies to implement an enterprise risk management system and align organizational resources such as people, processes, and technology to prevent cyberattacks on enterprise assets. The purpose of this Delphi study was to explore how the managerial competencies for information security and risk management senior managers help in managing security objectives and practices to mitigate security risks. The National
APA, Harvard, Vancouver, ISO, and other styles
2

Lebek, Benedikt [Verfasser]. "Contributions to organizational information security / Benedikt Lebek." Hannover : Technische Informationsbibliothek und Universitätsbibliothek Hannover (TIB), 2015. http://d-nb.info/1074966856/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Shropshire, Jordan Douglas. "Predicting compliance with prescribed organizational information security protocols." Diss., Mississippi State : Mississippi State University, 2008. http://library.msstate.edu/etd/show.asp?etd=etd-10202008-120221.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Thomsson, Johan. "Organizational effects and management of information security : A cross-sectoral case study of three different organizations." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-66020.

Full text
Abstract:
Information technology (IT) can be used to empower an organization to enable it to continue evolving. One aspect in which an organization can evolve is in the form of information security. Previously, information security has been seen as a concern only for the IT-department. However, as the number of threats towards information has rapidly grown over the years, the concern for information security has also increased. The issue on how to keep information safe from unauthorized people has become more important as well as questioned over the years. During the last decades, the concept of informa
APA, Harvard, Vancouver, ISO, and other styles
5

Dunkerley, Kimberley. "Developing an Information Systems Security Success Model for Organizational Context." NSUWorks, 2011. http://nsuworks.nova.edu/gscis_etd/141.

Full text
Abstract:
In spite of the wealth of research in IS security, there is very little understanding of what actually makes an IS security program successful within an organization. Success has been treated generally as a separate entity from IS security altogether; a great deal of research has been conducted on the "means to the end", while limited research has been focused on truly understanding what the end actually is. The problem compelling this research is that previous studies within the IS security domain do not adequately consider what factors contribute towards IS security success within the organi
APA, Harvard, Vancouver, ISO, and other styles
6

Rydefelt, Calatayud Leonor. "A holistic model to create organizational information security awareness programs – iSAP." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-48050.

Full text
Abstract:
There is a large number of information security awareness programs (iSAP) found in the literature with multiple approaches. Considering that the number of security breaches performed by insiders is as high as 48%, the effectiveness of such programs is questionable. This leaves a considerable space for external, but also internal criminals, to perform and succeed in their attacks, something that can cause heavy losses (both economical and less tangible as reputation) to organizations. This thesis decided to study some of those iSAP to see their strengths and weaknesses. After studying the appro
APA, Harvard, Vancouver, ISO, and other styles
7

Zhang, Jie. "A model of human factors that affect organizational information security effectiveness /." Full text available from ProQuest UM Digital Dissertations, 2006. http://0-proquest.umi.com.umiss.lib.olemiss.edu/pqdweb?index=3&did=1331395881&SrchMode=1&sid=2&Fmt=2&VInst=PROD&VType=PQD&RQT=309&VName=PQD&TS=1218821137&clientId=22256.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Al, Abbasi Hawazin. "Organizational Information Security: Strategies to Minimize Workplace Cyberloafing for Increased Productivity." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/4773.

Full text
Abstract:
Productivity loss occurs in organizations that experience high levels of personal Internet use by employees on company time, which includes employees using smartphones to surf without needing the firm's Internet connection. The purpose of this qualitative phenomenological study was to explore reliable ways for organizational leaders to monitor or limit their employees' use of smartphone technology for personal use (cyberloafing) while on the job to minimize wasted work time. Social cognitive theory, which includes an emphasis on human behavioral changes based upon the environment, people, and
APA, Harvard, Vancouver, ISO, and other styles
9

Box, Debra. "Business process security maturity: a paradigm convergence." Thesis, Nelson Mandela Metropolitan University, 2008. http://hdl.handle.net/10948/722.

Full text
Abstract:
Information technology developments in software and hardware have enabled radical changes in information systems, culminating in the paradigm Business Process Management. There has been a concomitant rise in the importance of information security and security engineering due to the increased reliance by society on information. Information is seen as a critical success factor which needs protection. Information security is the response to increased hazards created through recent innovations in Web technology and the advent of intra and inter enterprise-wide systems. Security engineering is base
APA, Harvard, Vancouver, ISO, and other styles
10

Lapke, Michael Stephen. "Power Relationships in Information Systems Security Policy Formulation and Implementation." VCU Scholars Compass, 2008. http://scholarscompass.vcu.edu/etd/1239.

Full text
Abstract:
This thesis argues that organizational power impacts the development and implementation of Information Systems (IS) Security policy. The motivation for this research stems from the continuing concern of ineffective security in organizations, leading to significant monetary losses. IS researchers have contended that ineffective IS Security policy is a precursor to ineffective IS Security (Loch et al. 1992; Whitman et al. 2001; David 2002; Solms and Solms 2004). Beyond this pragmatic aspect, there is a gap in the literature concerning power relationships and IS Security policy. This research
APA, Harvard, Vancouver, ISO, and other styles
11

Edwards, Madhuri M. "Identifying Factors Contributing Towards Information Security Maturity in an Organization." NSUWorks, 2018. http://nsuworks.nova.edu/gscis_etd/1027.

Full text
Abstract:
Information security capability maturity (ISCM) is a journey towards accurate alignment of business and security objectives, security systems, processes, and tasks integrated with business-enabled IT systems, security enabled organizational culture and decision making, and measurements and continuous improvements of controls and governance comprising security policies, processes, operating procedures, tasks, monitoring, and reporting. Information security capability maturity may be achieved in five levels: performing but ad-hoc, managed, defined, quantitatively governed, and optimized. These f
APA, Harvard, Vancouver, ISO, and other styles
12

Maijanen, K. (Karri). "Building inter-organizational trust by implementing information security management system:a review from trust building perspective." Master's thesis, University of Oulu, 2016. http://urn.fi/URN:NBN:fi:oulu-201612033197.

Full text
Abstract:
Inter-organisational trust is increasingly important among supply chain participants, where threats are building up from sources out of organisational control. The same problem is faced in the cyber security field, where threat level increases from the changes outside organisational boundaries. Each value chain participating in the supply chain must be secured. Trust building is mandated among all trust network members. The business interaction between supply chain participants is enabled by building inter-organisational trust first. This study provided ways to build this inter-organisational
APA, Harvard, Vancouver, ISO, and other styles
13

Curran, Theresa. "Standardizing Instructional Definition and Content Supporting Information Security Compliance Requirements." Diss., NSUWorks, 2018. https://nsuworks.nova.edu/gscis_etd/1038.

Full text
Abstract:
Information security (IS)-related risks affect global public and private organizations on a daily basis. These risks may be introduced through technical or human-based activities, and can include fraud, hacking, malware, insider abuse, physical loss, mobile device misconfiguration or unintended disclosure. Numerous and diverse regulatory and contractual compliance requirements have been mandated to assist organizations proactively prevent these types of risks. Two constants are noted in these requirements. The first constant is requiring organizations to disseminate security policies addressi
APA, Harvard, Vancouver, ISO, and other styles
14

Caldwell, Russell J. "Information operations (IO) organizational design and procedures." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Mar%5FCaldwell.pdf.

Full text
Abstract:
Thesis (M.S. in Information Systems and Operations)--Naval Postgraduate School, March 2004.<br>Thesis advisor(s): Raymond Buettner, Thomas Moore. Includes bibliographical references (p. 156-161). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
15

Koskosas, Ioannis Vasileios. "A socio-organizational approach to information systems security management in the context of internet banking." Thesis, Brunel University, 2004. http://bura.brunel.ac.uk/handle/2438/5207.

Full text
Abstract:
This thesis takes a social and organizational point of view for studying information systems security in the context of internet banking. While the internet provides opportunities for businesses to extend their public network infrastructure, reduce transaction costs, and sell a wide range of products and services worldwide, security threats impede the business. Although, a number of valuable information systems security approaches have been developed through the years they tend to offer narrow, technically oriented solutions and they ignore the social aspects of risks and the informal structur
APA, Harvard, Vancouver, ISO, and other styles
16

McIntosh, Barry Ben. "An Ethnographic Investigation of the Assimilation of New Organizational Members into an Information Security Culture." NSUWorks, 2011. http://nsuworks.nova.edu/gscis_etd/240.

Full text
Abstract:
Research on information security culture evolved because technical security controls and policies have failed to eliminate information security incidents. Although existing research has addressed the measurement and cultivation of an information security culture, it has not addressed how to maintain that culture. This study focused on that gap by exploring the values and assumptions that inhibit assimilation of new members into an information security culture. Contract employees represent a distinct set of new organizational members with additional challenges assimilating into an organization'
APA, Harvard, Vancouver, ISO, and other styles
17

Sumner, Jennifer. "HEALTHCARE COMMUNICATION NETWORKS: THE DISSEMINATION OF EMPLOYEE INFORMATION FOR HOSPITAL SECURITY." Doctoral diss., University of Central Florida, 2008. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/3183.

Full text
Abstract:
ABSTRACT: Healthcare in the United States is a system that, organizationally speaking, is fragmented. Each hospital facility is independently operated and is responsible for the hiring of its own employees. However, corrupt individuals can take advantage of this fragmentation and move from hospital to hospital, gaining employment while hiding previous employment history. Traditionally, hospitals have been reluctant to share information on their previous employees, even with other hospitals, for fear of issues surrounding defamation, negligent hiring, and violation of the employee's privacy. Ho
APA, Harvard, Vancouver, ISO, and other styles
18

Raymond, Benoit. "Investigating the Relationship between IT and Organizations: A Research Trilogy." Digital Archive @ GSU, 2010. http://digitalarchive.gsu.edu/cis_diss/43.

Full text
Abstract:
The overall objective of this dissertation is to contribute to knowledge and theory about the influence of information technology (IT) on organizations and their members. This dissertation is composed of three related studies, each examining different aspects of the relationship between IT and organizations. The objective of the first study is to provide an overview of the dominant theoretical perspectives that IS researchers have used in the last five decades to study the influence of technology on organizations and their members. Without being exhaustive, this study seeks more specifically t
APA, Harvard, Vancouver, ISO, and other styles
19

Johansson, Elin, and Gabriella Elvin. "The impact of organizational culture on information security during development and management of IT systems : A comparative study between Japanese and Swedish banking industry." Thesis, Uppsala universitet, Avdelningen för datalogi, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-324923.

Full text
Abstract:
The objective of this study is to investigate how banks are working with information security by performing a comparative study between banks in Japan and Sweden. Special focus is given to the impact of organizational culture when developing IT-systems. The material analyzed is collected through semi-structured interviews with banks in Japan and Sweden, and additional interviews with professionals within the field of information security. The findings show that banks in both Japan and Sweden take information security seriously, both from a technical and an organizational culture point of view.
APA, Harvard, Vancouver, ISO, and other styles
20

Tell, Markus. "Insiderhot : En systematisk litteraturöversikt av insiderhot som utvärderar administrativa säkerhetsåtgärder." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-19764.

Full text
Abstract:
Inom en organisation finns det insiders med direkt tillgång till konfidentiell och känslig information. Insiderhot kan antingen vara avsiktliga eller oavsiktliga och båda typerna kan utgöra förödande konsekvenser. Frågan är egentligen hur organisationer ska säkerställa informationssäkerhet när anställda har en daglig tillgång till information. Det som organisationer behöver implementera är särskilda säkerhetsåtgärder. Förebyggande säkerhetsåtgärder kan delas upp som tekniska och administrativa. Denna uppsats har genomfört en systematisk litteraturöversikt med en tematisk analys för att undersö
APA, Harvard, Vancouver, ISO, and other styles
21

Kuusinen, Sara, and Kirsi Jokipii. "Utilizing Market Knowledge to Create Competitive Advantage in the Interface of Inter- and Intra-Organizational Coopetition : Case Study: An SME in the Information Security Industry." Thesis, Umeå universitet, Företagsekonomi, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-84251.

Full text
Abstract:
It has been widely acknowledged that today’s business world is characterized by severe competition. To remain competitive, firms have to employ alternative strategies to keep up with the fast paced development. One such strategy is coopetition; firms collaborate in some areas to combine their resources while competing in other areas. Thus, instead of trying to master everything within a company’s own walls, emphasis is towards gaining access to external resources and coordinating the wide array of expertise in the best possible way to achieve competitive advantage. In addition, growing require
APA, Harvard, Vancouver, ISO, and other styles
22

Coffey, Andrew Francis. "Measuring Effectiveness in the Domestic Intelligence Community: Taking a Configurational Approach to Explain Organizational Outcomes in the National Network of Fusion Centers." Diss., Virginia Tech, 2015. http://hdl.handle.net/10919/52930.

Full text
Abstract:
This dissertation examines organizational level outcomes within a whole network--the national network of fusion centers. Fusion centers are state and local organizations that fuse threat-related intelligence and information by working with federal, state, and local law enforcement as well as other security partners in the public and private sectors. This research will ask why outcomes at the fusion center level vary within the network by exploring unique configurations of conditions at multiple levels of analysis. The results of the research will present evidence that suggests whole network ef
APA, Harvard, Vancouver, ISO, and other styles
23

Tejay, Gurvirender. "Shaping Strategic Information Systems Security Initiatives in Organizations." VCU Scholars Compass, 2008. http://scholarscompass.vcu.edu/etd/1576.

Full text
Abstract:
Strategic information systems security initiatives have seldom been successful. The increasing complexity of the business environment in which organizational security must be operationalized presents challenges. There has also been a problem with understanding the patterns of interactions among stakeholders that lead to instituting such an initiative. The overall aim of this research is to enhance understanding of the issues and concerns in shaping strategic information systems security initiative. To be successful, a proper undertaking of the content, context and process of the formulation an
APA, Harvard, Vancouver, ISO, and other styles
24

Shao, X. (Xiuyan). "Understanding information systems (IS) security investments in organizations." Doctoral thesis, Oulun yliopisto, 2015. http://urn.fi/urn:isbn:9789526208930.

Full text
Abstract:
Abstract Increasing information systems (IS) security breaches require investments in terms of IS security techniques/practices or personnel. Prior research on IS security investment has provided economic models based on neoclassical economics to assess how much to invest in IS security. These models assume that the goal of IS security investment is only benefit maximization, and that all of the actors involved are unbiased rational actors with complete information. It is argued in this thesis that these prior models for IS security investment are flawed for two reasons. First, benefit maximiz
APA, Harvard, Vancouver, ISO, and other styles
25

Otero, Angel Rafael. "An Information Security Control Assessment Methodology for Organizations." NSUWorks, 2014. http://nsuworks.nova.edu/gscis_etd/266.

Full text
Abstract:
In an era where use and dependence of information systems is significantly high, the threat of incidents related to information security that could jeopardize the information held by organizations is more and more serious. Alarming facts within the literature point to inadequacies in information security practices, particularly the evaluation of information security controls in organizations. Research efforts have resulted in various methodologies developed to deal with the information security controls assessment problem. A closer look at these traditional methodologies highlights various wea
APA, Harvard, Vancouver, ISO, and other styles
26

Annamalai, Neelambari. "Information Security Guidelines for Organizations Intending to Adopt Cloudsourcing." Thesis, KTH, Data- och systemvetenskap, DSV, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-155453.

Full text
Abstract:
Change is constant and computing paradigm is no exception. It has witnessed major shifts right from centralized client server systems to widely distributed systems. This time the locus of change in the computing paradigm is moving towards virtualization, paving way to cloud computing. Cloud computing aims at providing computing services to its users as an utility. It allows its authenticated users to access a wide range of highly scalable computing capabilities and services via the internet on a pay-per-usage basis. Organisations not only view these benefits as cost-saving strategies, but also
APA, Harvard, Vancouver, ISO, and other styles
27

Alkahtani, Hend K. "Raising the information security awareness level in Saudi Arabian organizations through an effective, culturally aware information security framework." Thesis, Loughborough University, 2018. https://dspace.lboro.ac.uk/2134/28120.

Full text
Abstract:
The focus of the research is to improve the security of information systems in Saudi Arabian knowledge-intensive organisations by raising the awareness level among all types of information system users. This is achieved by developing a culturally aware information security framework that requires the involvement of all types of information system user. Saudi Arabia has a unique culture that affects the security of information systems and, hence, the development of this information security framework. The research uses Princess Nora bint Abdul Rahman University (PNU), the largest all female uni
APA, Harvard, Vancouver, ISO, and other styles
28

Abdul, Talib Yurita Yakimin. "Intrinsic Motivation and Information Systems Security Policy Compliance in Organizations." VCU Scholars Compass, 2015. http://scholarscompass.vcu.edu/etd/3710.

Full text
Abstract:
Incidents of computer abuse, proprietary information leaks and other security lapses have been on the increase. Most often, such security lapses are attributed to internal employees in organizations subverting established organizational IS security policy. As employee compliance with IS security policy is the key to escalating IS security breaches, understanding employee motivation for following IS security policy is critical. In addition to several types of extrinsic motives noted in prior studies, including sanctions, rewards, and social pressures, this study adds that an important contribut
APA, Harvard, Vancouver, ISO, and other styles
29

Aliti, Admirim, and Deniz Akkaya. "Employees' Role in Improving Information Systems Security." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-13769.

Full text
Abstract:
Information security is one of the most essential concerns in today’s organizations. IT departments in larger organizations are tasked to implement security, by both ensuring to have pertinent hardware and software, and likewise enlighten, teach and educate organization’s employees about security issues. The aim of this research is to focus on the human factor of the organization, which impacts the security of the information, since technological solutions of technical problems become incomprehensible without human recognition about security. If the security is not addressed in firms, this mig
APA, Harvard, Vancouver, ISO, and other styles
30

SANTOS, JULIANA GRACIELA DOS. "ANTECEDENTES DOS BENEFÍCIOS PERCEBIDOS DE COMPLIANCE ÀS POLÍTICAS DE PROTEÇÃO DE DADOS PESSOAIS NAS ORGANIZAÇÕES." Universidade Metodista de Sao Paulo, 2016. http://tede.metodista.br/jspui/handle/tede/1612.

Full text
Abstract:
Submitted by Noeme Timbo (noeme.timbo@metodista.br) on 2017-01-27T14:19:22Z No. of bitstreams: 1 JulianaG.Santos.pdf: 965373 bytes, checksum: e9ac2dac85934fdcd07c615473464973 (MD5)<br>Made available in DSpace on 2017-01-27T14:19:22Z (GMT). No. of bitstreams: 1 JulianaG.Santos.pdf: 965373 bytes, checksum: e9ac2dac85934fdcd07c615473464973 (MD5) Previous issue date: 2016-11-23<br>Personal data protect procedures are organizational tools that properly used by the employee help in the prevention and personal data protect within a safety and transparency organizational limit. This study analyzed t
APA, Harvard, Vancouver, ISO, and other styles
31

Sedlack, Derek J. "Reducing Incongruity of Perceptions Related to Information Risk: Dialogical Action Research in Organizations." NSUWorks, 2012. http://nsuworks.nova.edu/gscis_etd/299.

Full text
Abstract:
A critical overreliance on the technical dimension of information security has recently shifted toward more robust, organizationally focused information security methods to countermand $54 billion lost from computer security incidents. Developing a more balanced approach is required since protecting information is not an all or nothing proposition. Inaccurate tradeoffs resulting from misidentified risk severity based on organizational group perceptions related to information risk form information security gaps. This dissertation applies dialogical action research to study the information secur
APA, Harvard, Vancouver, ISO, and other styles
32

Mohialdeen, Haneen, та Johannes Draaijer. "Security Culture in Sweden with Focus on Digital Certificate Culture in Organizations". Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-97573.

Full text
Abstract:
Digital certificates lie at the heart of security where effective security culture enables digital certificates to be widely and properly deployed in organizations. Digital certificates provide a way to secure websites and bank transactions, digitally sign documents and emails, enable secure access to remote locations on the internet through VPNs by providing a means for authentication, authorization, confidentiality, integrity, and non-repudiation. In this thesis, the barriers to an effective digital certificate security culture and the possibilities of misuse or misconception of certificates on bo
APA, Harvard, Vancouver, ISO, and other styles
33

Hassebroek, Pamela Burns. "Institutionalized Environments and Information Security Management: Learning from Y2K." Diss., Available online, Georgia Institute of Technology, 2007, 2007. http://etd.gatech.edu/theses/available/etd-06192007-111256/.

Full text
Abstract:
Thesis (Ph. D.)--Public Policy, Georgia Institute of Technology, 2008.<br>Rogers, Juan D., Committee Chair ; Klein, Hans K., Committee Member ; Bolter, Jay David, Committee Member ; Nelson-Palmer, Mike, Committee Member ; Kingsley, Gordon, Committee Member.
APA, Harvard, Vancouver, ISO, and other styles
34

Kamariza, Yvette. "Implementation of information security policies in public organizations : Top management as a success factor." Thesis, Internationella Handelshögskolan, Högskolan i Jönköping, IHH, Informatik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-37823.

Full text
Abstract:
The purpose of this thesis is to investigate potential success factors related to the implementation of an information security in organizations, with a specific focus on the role of top management in implementing information security policies in organizations. The following are the research questions: What are the factors related to the implementation of an information security in organization according to the literature and what is the organization’s view of these factors? What is the role of the top management in implementing an information security policy in an organization according to th
APA, Harvard, Vancouver, ISO, and other styles
35

Mehmood, Furhan, and Rajia Rafique. "Management of operational risks related to information security in financial organizations." Thesis, Mälardalen University, School of Sustainable Development of Society and Technology, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-9823.

Full text
Abstract:
<p><strong>Date</strong>: 30<sup>th</sup> May 2010</p><p><strong>Authors</strong>: Rajia Rafique, Furhan Mehmood</p><p><strong>Tutor:</strong> Dr. Michael Le Duc, Dr. Deepak Gupta</p><p><strong>Title:</strong> Management of Operational Risks related to Information Security in Financial Organizations</p><p><strong>Introduction: </strong>Information security is very significant for organizations, especially for financial organizations where customer information and their satisfaction are considered the most important assets for financial organizations. Therefore customer information must be sust
APA, Harvard, Vancouver, ISO, and other styles
36

Bess, Donald Arlo. "Understanding Information Security Culture in an Organization: An Interpretive Case Study." NSUWorks, 2012. http://nsuworks.nova.edu/gscis_etd/88.

Full text
Abstract:
Information systems are considered to be a critical and strategic part of most organizations today. Because of this it has become increasingly important to ensure that there is an effective information security program in place protecting those information systems. It has been well established by researchers that the success of an information security program is heavily dependent upon the actions of the organizational members that interact with the information security program. Because of the interaction between people and the information security program an appropriate information security cu
APA, Harvard, Vancouver, ISO, and other styles
37

Martinez, Antonio. "Information management and the biological warfare threat." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://sirsi.nps.navy.mil/uhtbin/hyperion-image/02Mar%5FMartinez.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Van, Niekerk Johannes Frederick. "Establishing an information security culture in organizations : an outcomes based education approach." Thesis, Nelson Mandela Metropolitan University, 2005. http://hdl.handle.net/10948/164.

Full text
Abstract:
Information security is crucial to the continuous well-being of modern orga- nizations. Humans play a signfiicant role in the processes needed to secure an organization's information resources. Without an adequate level of user co-operation and knowledge, many security techniques are liable to be misused or misinterpreted by users. This may result in an adequate security measure becoming inadequate. It is therefor necessary to educate the orga- nization's employees regarding information security and also to establish a corporate sub-culture of information security in the organization, which wi
APA, Harvard, Vancouver, ISO, and other styles
39

Muñoz, Ruiz Yhoanna Zulimar, and Tello Rogger Ubaldo Fernández. "Plan de comunicación sobre seguridad de la información en una institución educativa de San Juan de Lurigancho: Caso CICA." Master's thesis, Universidad Peruana de Ciencias Aplicadas (UPC), 2020. http://hdl.handle.net/10757/653240.

Full text
Abstract:
En el primer capítulo desarrollamos la importancia de la información en las organizaciones ya que es considerado un recurso fundamental. Luego el valor de la seguridad y su gestión para la vigencia y éxito de las organizaciones. Un tema importante es la concientización en seguridad que prioriza el rol crucial de las personas. También definimos la gestión de los intangibles dentro del enfoque Dircom, considerando a la comunicación para la presentación de nuestra propuesta y su repercusión en la cultura y reputación corporativa. En el segundo capítulo planteamos la problemática que es la fal
APA, Harvard, Vancouver, ISO, and other styles
40

Gustavsson, Simon, and Fredrik Årman. "Bring your own device - a concern for organizations? : A thesis about tech organizations awareness and management of smartwatches." Thesis, Linnéuniversitetet, Institutionen för informatik (IK), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-96411.

Full text
Abstract:
With 5G around the corner and an overall increase in a faster and more stable internet connection, the future of Internet of Things (IoT) looks bright. There is a steady increase in the development of IoT devices, such as the smartwatch, and a high increase in usage of IoT, both by organizations and private citizens. Organizational managing of a smartwatch falls under the “Bring your own device” (BYOD) policy which allows employees to do work on their private devices. It appears to be a lack of knowledge in organizations on how to manage IoT devices both regarding policies and technical IT sec
APA, Harvard, Vancouver, ISO, and other styles
41

Marcos, Conca Alexandre. "A Solution to Selecting Cyber-Security Software Tools for an Organization Using Security Controls." Thesis, KTH, Elkraftteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-205272.

Full text
Abstract:
In the last decade, cyber-threats have evolved dramatically, forcing organizations yearafter year to use increasingly sophisticated security measures, security software amongothers. This has led to a huge increase in the number of security tools available in theindustry. The result of the increase is that that companies often do not know in whichsoftware to invest in order to meet their security needs. The purpose of this thesis isto address this problem by developing a solution that helps companies to choose theright security software based on their security needs and that allows to do the se
APA, Harvard, Vancouver, ISO, and other styles
42

Gustafsson, Julia, and Mariam Said. "Security Aspects of Cloud Computing – Perspectives within Organizations." Thesis, Högskolan i Borås, Akademin för bibliotek, information, pedagogik och IT, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-10458.

Full text
Abstract:
Cloud computing has become a significant and well-known term within a short period of time. Some parts of it might even be considered as unclear, including its vague definition. Cloud computing has rapidly and successfully come to perform an essential role within information technology and therefore in how organizations are managing their IT departments today. Its many advantages allure organizations to deploy a cloud solution. Despite the flourishing growth of cloud computing it still has its draw backs. One of its problems has come to be acknowledged as security issues, which has resulted in
APA, Harvard, Vancouver, ISO, and other styles
43

Koller, Teresa Marie, and Migle Ljung. "Strong Intents Against Weak Links : Towards a Holistic Integration of Behavioral Information Security in Organizations with Strategic Intent." Thesis, Linköpings universitet, Företagsekonomi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-177629.

Full text
Abstract:
The human factor has been detected as the weakest link in the information security of organizations. Methods like training and awareness programs and the implementation of security policies have been developed, but they still seem to be less effective than desired. Authors have suggested integrating information security more holistically in organizations. In this study we discuss how strategic intent can influence an information security culture and improve information security behavior, thereby strengthening the weakest link. This thesis aims to develop a conceptual framework for organization
APA, Harvard, Vancouver, ISO, and other styles
44

Ali, Mirza Maaz. "Adaptable Information and Data Security Process : A Secure Yet Employee Friendly Process Proposal of IT Security Implementation in Organizations." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-222380.

Full text
Abstract:
Organizations have been changing their IT structure due to several reasons such as merger of two companies, acquisition of one company by another or IT consolidation within a company. IT policies are one of the areas which get redefined during such changes. However the lack of test facilities, time, funds, or human resources and expertise for change assessment of reengineering IT infrastructure such as integration of independently working systems or switching from on premises IT resources to cloud based IT resources, can be left unassessed. The absence of forthcoming changes' assessment can ca
APA, Harvard, Vancouver, ISO, and other styles
45

Berthevas, Jean-François. "Management des réseaux personnels et de la sécurité de l'information dans une perspective d'innovation : le rôle de la culture organisationnelle." Thesis, Aix-Marseille, 2013. http://www.theses.fr/2013AIXM1132.

Full text
Abstract:
Les institutions françaises sont aujourd’hui "massivement" victimes de tentatives de vol d’information. Or, l’être humain est le maillon faible des dispositifs de sécurité de l’information (SI). Notamment, l’usage des réseaux personnels par les salariés est susceptible de soutenir l’activité d’innovation… tout en créant des failles potentielles pour la SI. Ce travail doctoral vise donc en particulier à progresser dans la connaissance des facteurs humains pour améliorer les mesures de SI. Nous focalisons nos travaux sur l’échange d’informations entre salariés de toutes organisations (services d
APA, Harvard, Vancouver, ISO, and other styles
46

Holmstedt, Malena. "Social Media Risk Management : and the impact on organization IT security." Thesis, Luleå tekniska universitet, Digitala tjänster och system, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-79296.

Full text
Abstract:
The purpose of this study was to investigate and try to describe how social media risk management is performed and what impact social media risk management could have on organizations IT security.  The outcome of this study is possible knowledge for researchers and for practitioners in the field, of how social media risk management was handled in some organizations in Sweden and what impact the chosen social media risk management could have on the IT security. This study looked at social media risk management and what impact it could have on organizations IT security through prior studies done
APA, Harvard, Vancouver, ISO, and other styles
47

Kanane, Aahd, and Casandra Grundstrom. "ISM: Irrelevant Soporific Measures - Giving Information Security Management back its groove using sociomateriality." Thesis, Umeå universitet, Institutionen för informatik, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-101978.

Full text
Abstract:
Information security management is now a major concern for any organization regardless of its type, size, or activity field. Having an information security system that ensures theavailability, the confidentiality, and the integrity of information is not an option anymorebut a necessity. Information security management identifies difficulties with user behaviourand compliance that is centralized around policies, perceptions, and practices. In order to address how they affect information security management, these three issues are holistically explored using a sociomaterial framework to engage t
APA, Harvard, Vancouver, ISO, and other styles
48

Antoniou, George S. "Designing an effective information security policy for exceptional situations in an organization: An experimental study." NSUWorks, 2015. http://nsuworks.nova.edu/gscis_etd/949.

Full text
Abstract:
An increasing number of researchers are recognizing the importance of the role played by employees in maintaining the effectiveness of an information security policy. Currently, little research exists to validate the relationship between the actions (behaviors) taken by employees in response to exceptional situations (antecedents) regarding an organization’s information security policy, the impact (consequences) those actions have on an organization, and the motives that prompt those actions. When these exceptional situations occur, employees may feel compelled to engage in behaviors that viol
APA, Harvard, Vancouver, ISO, and other styles
49

Asp, Sandin Agnes. "A simplified ISMS : Investigating how an ISMS for a smaller organization can be implemented." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-20238.

Full text
Abstract:
Over the past year, cyber threats have been growing tremendously, which has led to an essential need to strengthen the organization's security. One way of strengthening security is to implement an information security management system (ISMS). Although an ISMS will help improve the information security work within the business, organizations struggle with its implementation, and significantly smaller organizations. That results in smaller organization's information being potentially less protected.This thesis investigates how an ISMS based on MSB can be simplified to make it suitable for a sma
APA, Harvard, Vancouver, ISO, and other styles
50

May, Jeffrey Lee. "Developing a Multi-Objective Decision Model for Maximizing IS Security within an Organization." VCU Scholars Compass, 2008. http://scholarscompass.vcu.edu/etd/914.

Full text
Abstract:
Numerous IS researchers have argued that IS Security can be more effectively managed if the emphasis goes beyond the technical means of protecting information resources. In an effort to adopt a broader perspective that accounts for issues that transcend technical means alone, Dhillon and Torkzadeh (2006) present an array of 9 fundamental and 16 means objectives that are essential for maximizing IS security in an organization. These objectives were derived using a value-focused thinking approach and are organized into a conceptual framework. This conceptual framework provides a rigorous theo
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!