Essays about: "Info security"

Found 5 essays containing the words Info security.

  1. 1. How is it possible to calculate IT security effectiveness?

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Kristjan Kivimaa; [2022]
    Keywords : Security effectiveness; IT security;

    Abstract : In IT Security world, there is lack of available, reliable systems for measuring securitylevels/posture. They lack the range of quantitative measurements and easy and fast deployment,and potentially affects companies of all sizes. READ MORE

  2. 2. Compliance & Standards - The Journey To Security

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Boström Johan; [2021]
    Keywords : NIST SP800-53; ISO27000; Info security; IT security;

    Abstract : We are in the age of Information Technology (IT) and amazinginnovations are developed. Management systems are now completelydigitalized and it has enabled people to continue working remotely inthe midst of a pandemic. With great innovations there are those thatseek to misuse or destroy systems for personal gain. READ MORE

  3. 3. A tool for visual analysis of permission-based data access on Android phones

    University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)

    Author : Ulf Magnusson; [2019]
    Keywords : Privacy; Database; Stored procedure; MySQL; Visualization; Java; ORM; Hibernate; JFreeChart;

    Abstract : Privacy is a topic of ever-increasing interest in the modern, connected world. With the advent of smart phones, the boundary between internet and the personal sphere has become less distinct. Most users of smart phones have very vague ideas of how various apps intrude on their privacy. READ MORE

  4. 4. Networks and Weaponless Wars. Information Operations Content Dissemination via the Blogosphere

    University essay from Lunds universitet/Medie- och kommunikationsvetenskap

    Author : Gustav Béen; [2011]
    Keywords : network theory; media strata; operations security; electronic warfare; PSYOPS; Info Ops; information operations; cyber war; psychological warfare; BlogTrackers; WWW; Internet; public opinion; mass media; influence; communications; influential bloggers; blog influence; blogosphere; bloggers; Blogs; social networks.; media readiness; participatory journalism; citizen journalism; Social Sciences;

    Abstract : This study advances a broad analytical perspective intended to critically evaluate the predominant definitions of information operations (IO). The prevalent concepts of IO are challenged due to their reliance on unidirectional communication flow models that cannot account for the characteristics of produsage media, nor the culturally specific, interpersonally contextualized sense making processes of reception. READ MORE

  5. 5. Using Value Chain Analysis to Manage Consumer Confidence in IT Knowledge Services

    University essay from Blekinge Tekniska Högskola/Sektionen för management

    Author : Syed Salar Hussain Naqvi; [2008]
    Keywords : IT knowledge services; value chain analysis; consumer confidence;

    Abstract : Recent years have seen enormous growth of internet-based utility services. Such infrastructural support provides fertile ground for the cultivation of knowledge-based practices, driving the development of low-cost, mass-market tools for knowledge sharing. READ MORE