Essays about: "cost of information security"

Showing result 1 - 5 of 132 essays containing the words cost of information security.

  1. 1. GDPR Compliance in EU-US Data Transfers - Examining the impact of the EU Commission’s 2023 adequacy decision on surveillance risks

    University essay from Lunds universitet/Institutionen för handelsrätt

    Author : Linda Kidwell; [2024]
    Keywords : General Data Protection Regulation; Adequacy Decision; EU Commission; Surveillance law; Third country data transfers; US intelligence agencies; Law and Political Science;

    Abstract : International data transfers serve to support the global economy, facilitating international collaboration and economic expansion. However this increased productivity comes at a cost, namely amplified personal data privacy and security risks. READ MORE

  2. 2. Why do people use public Wi-Fi? : An investigation of risk-taking behaviour and factors lead to decisions

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Mohamad Abdulkader; [2023]
    Keywords : Public Wi-Fi; hotspots; wireless networks; privacy; security; awareness; attitude; knowledge; risks; factor;

    Abstract : The usage of public Wi-Fi and hotspots has witnessed a substantial increase in recent times, providing convenient connectivity in various public areas. Public wireless networks are now widely accessible, especially in smart cities. However, utilising public Wi-Fi exposes individuals to potential threats to their privacy and security. READ MORE

  3. 3. Security Management in Cloud Computing for healthcare Data

    University essay from Luleå tekniska universitet

    Author : Malik Asad; [2023]
    Keywords : ;

    Abstract : "In today's research field interconnected world, preventing security issues and confidentiality breaches has become paramount to safeguarding sensitive information, and organizations must take proactive measures to ensure data security. Cloud computing enhances security management by reducing the likelihood of cyber-attacks. READ MORE

  4. 4. HackerGraph : Creating a knowledge graph for security assessment of AWS systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Alexios Stournaras; [2023]
    Keywords : Cloud security; Knowledge graph; Attack graph; Vulnerability ssessment; Attack paths; Vulnerable-by-design systems; Cloudgoat; Molnsäkerhet; Kunskapsgraf; Attackgraf; Sårbarhetsanalysis; Sårbara miljöer; Cloudgoat;

    Abstract : With the rapid adoption of cloud technologies, organizations have benefited from improved scalability, cost efficiency, and flexibility. However, this shift towards cloud computing has raised concerns about the safety and security of sensitive data and applications. READ MORE

  5. 5. Choices and Rules in Informality : A case study on public policy implementation and obstacles to formalizing the domestic work sector in Argentina

    University essay from Uppsala universitet/Statsvetenskapliga institutionen

    Author : Tilda Rådström; [2023]
    Keywords : Domestic workers; domestic work sector; informal work; public policy implementation; social policy; financial incentives; informal institutions; rational choice theory; Argentina; Trabajadoras domésticas; sector del trabajo doméstico; trabajo informal; implementación de políticas; política social; incentivos financieros; instituciones informales; teoría de la elección racional; Argentina;

    Abstract : This study reviews Rational Choice theory and Informal Institutions theory and uses new data to explain the persistence and scale of Argentina's informal domestic work sector. The domestic work sector in Argentina represents a typical case in Latin America: almost entirely dominated by women and high informality levels. READ MORE