Essays about: "data security"

Showing result 1 - 5 of 1808 essays containing the words data security.

  1. 1. Unraveling Paradoxical Tensions in Digital Servitization Ecosystems : A case study in the mining industry

    University essay from Luleå tekniska universitet/Institutionen för ekonomi, teknik, konst och samhälle

    Author : Johannes Åström; Jakob Karlelid; [2024]
    Keywords : Digital servitization; Ecosystem; Paradoxes; Tensions; Digital tjänstefiering; Ekosystem; Paradoxer; Spänningar;

    Abstract : Purpose - This study aims to understand what paradoxical tensions arise within an ecosystem when companies collectively pursue digital servitization and how these tensions impact value co-creation. Method -  The study is an explorative single-case study based on the mining industry in Sweden and involves respondents from industry-leading organizations. READ MORE

  2. 2. Evaluation of Open-source Threat Intelligence Platforms Considering Developments in Cyber Security

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Love Andrén; [2024]
    Keywords : Threat Intelligence; Open-source; Information Sharing; Cyber Security;

    Abstract : Background. With the increase in cyberattacks and cyber related threats, it is of great concern that the area still lacks the needed amount of practitioners. Open-source threat intelligence platforms are free platforms hosting related information to cyber threats. READ MORE

  3. 3. Israel, Russia and the US: A Strange Triangular Relationship : An analysis of an unexpected alliance and its rationality

    University essay from Linnéuniversitetet/Institutionen för samhällsstudier (SS)

    Author : Alfred Lovnér; [2024]
    Keywords : International Relations; Political Influence; Security; Peace; Development;

    Abstract : The relationship between Israel and the US, as well as Israel and Russia are well documented, as it serves as a key aspect within the struggle for power and influence within the Middle East. However much research has been made on the topic, few have analysed how the relationship between Israel and the two others have affected the three, creating what could only be viewed as a blindspot within scholarship on the topic, as the relationships did not start in, nor are maintained within a vacuum. READ MORE

  4. 4. A Comparative Analysis of SecurityServices Using Identity and AccessManagement (IAM)

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Nithya Sree Muddychetty; [2024]
    Keywords : Access Control Lists; Identity Access Management; Multi-Factor Authentication; One time password; Single sign on; System Usability Scale; Virtual private network;

    Abstract : Background: Identity and Access Management (IAM) is a critical IT securityframework for managing digital identities and resource access. With roots datingback to ancient civilizations, IAM has evolved from basic authentication to sophisticated methods. READ MORE

  5. 5. Risky Business: Quantitative Risk Assessments as Enabling Devices in Cybersecurity

    University essay from Lunds universitet/Avdelningen för Riskhantering och Samhällssäkerhet

    Author : Colette Alexander; [2024]
    Keywords : Quantitative risk assessment; cybersecurity; enabling device; Technology and Engineering;

    Abstract : Quantitative risk assessment (QRA) is a growing practice in the cybersecurity field. This paper examines QRA the use in various industries and the problems with its use. The focus of the qualitative research is to understand why cybersecurity organizations might want to use QRA even if it produces untrue and potentially problematic results. READ MORE