Essays about: "data security"
Showing result 1 - 5 of 1808 essays containing the words data security.
-
1. Unraveling Paradoxical Tensions in Digital Servitization Ecosystems : A case study in the mining industry
University essay from Luleå tekniska universitet/Institutionen för ekonomi, teknik, konst och samhälleAbstract : Purpose - This study aims to understand what paradoxical tensions arise within an ecosystem when companies collectively pursue digital servitization and how these tensions impact value co-creation. Method - The study is an explorative single-case study based on the mining industry in Sweden and involves respondents from industry-leading organizations. READ MORE
-
2. Evaluation of Open-source Threat Intelligence Platforms Considering Developments in Cyber Security
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. With the increase in cyberattacks and cyber related threats, it is of great concern that the area still lacks the needed amount of practitioners. Open-source threat intelligence platforms are free platforms hosting related information to cyber threats. READ MORE
-
3. Israel, Russia and the US: A Strange Triangular Relationship : An analysis of an unexpected alliance and its rationality
University essay from Linnéuniversitetet/Institutionen för samhällsstudier (SS)Abstract : The relationship between Israel and the US, as well as Israel and Russia are well documented, as it serves as a key aspect within the struggle for power and influence within the Middle East. However much research has been made on the topic, few have analysed how the relationship between Israel and the two others have affected the three, creating what could only be viewed as a blindspot within scholarship on the topic, as the relationships did not start in, nor are maintained within a vacuum. READ MORE
-
4. A Comparative Analysis of SecurityServices Using Identity and AccessManagement (IAM)
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background: Identity and Access Management (IAM) is a critical IT securityframework for managing digital identities and resource access. With roots datingback to ancient civilizations, IAM has evolved from basic authentication to sophisticated methods. READ MORE
-
5. Risky Business: Quantitative Risk Assessments as Enabling Devices in Cybersecurity
University essay from Lunds universitet/Avdelningen för Riskhantering och SamhällssäkerhetAbstract : Quantitative risk assessment (QRA) is a growing practice in the cybersecurity field. This paper examines QRA the use in various industries and the problems with its use. The focus of the qualitative research is to understand why cybersecurity organizations might want to use QRA even if it produces untrue and potentially problematic results. READ MORE