Essays about: "information security policies"

Showing result 1 - 5 of 83 essays containing the words information security policies.

  1. 1. The Advent of ChatGPT and its Technological Integration in Education

    University essay from Malmö universitet/Institutionen för kultur, språk och medier (KSM)

    Author : Denial Brkic; Ioana-Raluca Johansson; [2024]
    Keywords : ChatGPT; didactic tool; EFL; GenAI; supporting tool; Swedish upper-secondary school;

    Abstract : Our study investigates the possibility of integrating ChatGPT, an AI text generative tool, as a didactic supporting tool within the Swedish upper-secondary school curricula. Particularly, it takes interest in the English foreign language teaching context and examines eight peer reviewed articles on the matter. READ MORE

  2. 2. Visual Communication in Driving Social Innovation for Disadvantaged groups in Nami

    University essay from Linköpings universitet/Medie- och Informationsteknik; Linköpings universitet/Tekniska fakulteten

    Author : Mufaro Nhundu; [2023]
    Keywords : Social Innovation; Food Security; Visual Communication; Human Centered Design.;

    Abstract : This master’s thesis aims to explore the potential of visual communication as a powerful tool for promoting change and impact in Namibia with a focus on sustainable agriculture and food security. The study analyzes how graphic design and visual communication may effectively explain best practices for sustainable farming and inspire young adults in rural communities to engage with agriculture through empirical research. READ MORE

  3. 3. Investigating the Impact of User Behavior in the Security of Smart Home IoT Devices

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Maha Ghunaim; [2023]
    Keywords : Smart Homes; Smart Home Devices; Home Automation; User Behavior; Internet of Things IoT ; Smarta hem; smarta hemenheter; hemautomation; användarbeteende; internet av Saker IoT ; المنازل الذكية ، أجهزة المنزل الذكي ، أتمتة المنزل ، سلوك المستخدم ، إنترنت أشياء إنترنت الأشياء ;

    Abstract : As technology is growing at a fast pace, IoT-based smart home services are increasingly adopted by people. IoT-based smart homes offer numerous unimaginable benefits, including efficiency, safety, effectiveness, scalability of services, devices, and data, among many others. However, there is another side to this technology: security threats. READ MORE

  4. 4. A SYSTEMATIC REVIEW OF ATTRIBUTE-BASED ENCRYPTION FOR SECURE DATA SHARING IN IoT ENVIRONMENT.

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Faith Nnenna Onwumere; [2023]
    Keywords : IoT; ABE; Attribute-based Encryption; CP-ABE; KP-ABE; Internet of Things; Cryptography; Smart Devices;

    Abstract : Internet of Things (IoT) refers to a network of global and interrelated computing devices that connects humans and machines. It connects anything that has access to the internet and creates an avenue for data and information exchange. READ MORE

  5. 5. Gap Analysis of Information Security Management Systems in Sri Lankan Higher Education Institutes

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Suneth Piumal Don Appuhamilage; Rathnayake Mudiyanselage Dineth Udyan Rathnayake; [2023]
    Keywords : Compliance; Gap analysis; Maturity model; Maturity level; MTO model; ISO IEC 27001:2013;

    Abstract : This work presents an overview of preliminary stages taken towards proper establishment ofan Information Security Management System (ISMS) for Sri Lankan Higher EducationInstitutes (HEIs) based on ISO/IEC 27001:2013 standard. This study consists with a gapanalysis conducted on selected HEIs within Sri Lanka to evaluate their compliance withISO/IEC 27001:2013 standards. READ MORE