Essays about: "Informations Säkerhet"
Showing result 1 - 5 of 40 essays containing the words Informations Säkerhet.
-
1. Factors Influencing Adoption of Information Security
University essay from Blekinge Tekniska Högskola/Institutionen för industriell ekonomiAbstract : Background: Over the past years, organisations have been facing an increasedthreat from cyber criminality. This amplifies the necessity for organisations to implement highly secure systems to protect sensitive information.Purpose: Explore and identify factors that influence organisations’ willingness toadopt information security. READ MORE
-
2. Exploring the Potential of an IT Capability in its Bootstrap Phase from a Task Driven Onboarding Perspective : Insights toward Information Infrastructure in Healthcare
University essay from Uppsala universitet/InformationssystemAbstract : Digitalization is changing most organizations and businesses in order to increase efficiency and improve safety. Within healthcare, different departments have specialized needs and therefore a myriad of different systems have been created, which has compromised interoperability. openEHR is a potential solution to this issue. READ MORE
-
3. Security Requirements and Practices for Smart Grids
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The electricity sector has a huge role in decarbonization of the energy system in order to meet climate targets and achieve net zero emission goals in different countries across the world. Present day electric power systems are increasingly dependent on less carbon intensive renewable energy sources for power generation. READ MORE
-
4. Clean Code : Investigating Data Integrity and Non-Repudiation in the DevOps Platform GitLab
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Recent supply chain attacks on a larger scale in combination with a growing adoption of the set of automated software development and deployment practices commonly referred to as ’DevOps’, made us interested in the security of the underlying infrastructure supporting these practices. If a malicious commit in a piece of software can expose internal systems and networks of all users of said software to vulnerabilities, questions regarding trust and repudiation becomes central, in the platforms themselves as much as in each digitally signed software update version. READ MORE
-
5. Cascading Effects of Floods – An evaluation of the flood risk maps and management plans produced by the County Administrative Boards
University essay from Lunds universitet/Riskhantering (CI)Abstract : Flood is the most common natural disaster globally, affecting human health and assets. The work with the Swedish ordinance of flood risk is connected to the sustainment of vital societal functions. READ MORE