Essays about: "Cybersecurity management"

Showing result 1 - 5 of 50 essays containing the words Cybersecurity management.

  1. 1. Unlocking complementary assets in digital security

    University essay from Handelshögskolan i Stockholm/Institutionen för företagande och ledning

    Author : Kavya Shukla; [2024]
    Keywords : digital security; cybersecurity; complementary assets; dynamic capabilities;

    Abstract : Due to increased risk of cyberattacks, digital security (DS, hereinafter) is one of the leading challenges facing organizations today. New ways of working and technologies such as agile and the cloud have accelerated security risks with profound implications. READ MORE

  2. 2. A Comparative Analysis of SecurityServices Using Identity and AccessManagement (IAM)

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Nithya Sree Muddychetty; [2024]
    Keywords : Access Control Lists; Identity Access Management; Multi-Factor Authentication; One time password; Single sign on; System Usability Scale; Virtual private network;

    Abstract : Background: Identity and Access Management (IAM) is a critical IT securityframework for managing digital identities and resource access. With roots datingback to ancient civilizations, IAM has evolved from basic authentication to sophisticated methods. READ MORE

  3. 3. Examining Bounded Rationality Influences on Decisions Concerning Information Security : A Study That Connects Bounded Rationality and Information Security

    University essay from Stockholms universitet/Företagsekonomiska institutionen

    Author : Oskar Malm Wiklund; Caroline Larsson; [2024]
    Keywords : Decision-making; Rationality; Bounded Rationality; Information Security; Public Authority; Organizational Culture; Information Systems;

    Abstract : This study investigates the impact of bounded rationality on information security decisions in public Swedish authorities. The research addresses how cognitive limitations and organizational dynamics shape decisions in this area. READ MORE

  4. 4. Streamlining the Process of Surveying Cybersecurity Vulnerabilities in OT

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : Willem Brahmstaedt; Eira Höglund; Caspian Kullgren; Simon Larsson; Hanna Schaff; Johanna Thall; [2023-03-03]
    Keywords : operational technology; cybersecurity standards; containerization; computer aided process optimization; software development; application; web server;

    Abstract : Operational Technology, OT, is the backbone of the 21st-century society since it eases access for managing critical infrastructure like water, transportation, and energy supply. Therefore, the security of such systems is of utmost importance. READ MORE

  5. 5. Digitizing the Document Management Process : Challenges and Opportunities

    University essay from Mälardalens universitet/Akademin för innovation, design och teknik

    Author : Pascal Nahayo; Sora Al-Azawi; [2023]
    Keywords : ;

    Abstract : Date: 2023-06-04 Level: Master Thesis in Industrial Engineering & Management and Master Thesis in Product- & Process Development, 30 ECTS Institution: School of Innovation, Design and Engineering & School of Innovation, Design and Technology, Mälardalen University Authors: Sora Al-Azawi Pascal Nahayo 1999-12-16 1991-04-03 Title: Digitizing the Document Management Process: Challenges and Opportunities Supervisor (University): Catarina Bojesson, Mälardalen University Supervisor (Company): Sofia Lillback, Stora Enso Fors AB Keywords: BPM, Value, Value Creation, Digitalization, Sustainability, Security, Cybersecurity Research Question: What potential challenges and opportunities should be considered to optimize the value when adopting digital alternatives to the Bill of Lading (B/L) in the manufacturing sector? Purpose: The purpose of this study is to explore the potential value of digitizing the document management process in the manufacturing sector while enhancing sustainability and ensuring security and privacy. Specifically, the study aims to evaluate the value of adopting digital alternatives to the B/L. READ MORE