Essays about: "informations security"
Showing result 1 - 5 of 157 essays containing the words informations security.
-
1. Factors Influencing Adoption of Information Security
University essay from Blekinge Tekniska Högskola/Institutionen för industriell ekonomiAbstract : Background: Over the past years, organisations have been facing an increasedthreat from cyber criminality. This amplifies the necessity for organisations to implement highly secure systems to protect sensitive information.Purpose: Explore and identify factors that influence organisations’ willingness toadopt information security. READ MORE
-
2. Market Intelligence within Software Procurement
University essay from Lunds universitet/InnovationsteknikAbstract : With the dawn of the digital era, software solutions are becoming of increasingly strategic importance for corporations, and due to the complexity of the products and the huge lock-in effects which they often give rise to, software-procurement is growing into a critical activity. However, due to the phenomena of information overload, finding and making use of the right information when making strategic decisions is becoming increasingly difficult, resulting in the need for organizations to overlook their information processing capacities in order to ensure the quality of such selections. READ MORE
-
3. Security Requirements and Practices for Smart Grids
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The electricity sector has a huge role in decarbonization of the energy system in order to meet climate targets and achieve net zero emission goals in different countries across the world. Present day electric power systems are increasingly dependent on less carbon intensive renewable energy sources for power generation. READ MORE
-
4. Clean Code : Investigating Data Integrity and Non-Repudiation in the DevOps Platform GitLab
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Recent supply chain attacks on a larger scale in combination with a growing adoption of the set of automated software development and deployment practices commonly referred to as ’DevOps’, made us interested in the security of the underlying infrastructure supporting these practices. If a malicious commit in a piece of software can expose internal systems and networks of all users of said software to vulnerabilities, questions regarding trust and repudiation becomes central, in the platforms themselves as much as in each digitally signed software update version. READ MORE
-
5. Cascading Effects of Floods – An evaluation of the flood risk maps and management plans produced by the County Administrative Boards
University essay from Lunds universitet/Riskhantering (CI)Abstract : Flood is the most common natural disaster globally, affecting human health and assets. The work with the Swedish ordinance of flood risk is connected to the sustainment of vital societal functions. READ MORE