Essays about: "government risk compliance"

Showing result 1 - 5 of 15 essays containing the words government risk compliance.

  1. 1. Bringing human rights due diligence into law: Addressing modern slavery or business as usual? : A postcolonial assessment of the UK Modern Slavery Act’s compliance with the UN Guiding Principles on Business and Human Rights

    University essay from Uppsala universitet/Teologiska institutionen

    Author : Isabelle Kämpe; [2023]
    Keywords : UK Modern Slavery Act; MSA; UN Guiding Principles on Business and Human Rights; UNGP; modern slavery; human rights due diligence; HRDD; supply chain; transparency; postcolonialism; neo-colonialism; dependency theory;

    Abstract : Operating through complex supply chains and multiple jurisdictions, today’s business enterprises can outsource manufacturing to different parts of the world where they can take advantage of low labour- and production costs. In the global quest for businesses to maximise their profits, deteriorating working conditions for offshore labour workers are increasing the risks of human rights abuses. READ MORE

  2. 2. The human connection to information security : A qualitative study on policy development, communication and compliance in government agencies

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Osama Abdulhadi; [2023]
    Keywords : Communication; compliance; development; effectiveness; government agencies; human factor; information security; information security awareness; information security culture; information security management system; information security policy; insider threat;

    Abstract : The human factor and insider threats play a crucial role in information security. In today’s digital age, protecting organizational data requires a deep understanding of human behaviour and its impact on information security. READ MORE

  3. 3. Faculty Reflections on University Information Security Policy

    University essay from Institutionen för tillämpad informationsteknologi

    Author : Sofia Dyrendahl; [2021-11-30]
    Keywords : Cybersecurity; employee compliance; information security policy; protection motivation theory; deterrence theory; neutralization theory; university;

    Abstract : Employee noncompliance of information security policy (ISP) is causing organizations more and more money in the battle against cybersecurity threats. Three popular theories within employee compliance and ISP research were used to create a conceptual framework to help explain the employees’ reflections, namely: protection motivation theory, deterrence theory and neutralization theory. READ MORE

  4. 4. Registered nurses' experience of caring for patients suffering from MRSA in the Philippines : A qualitative empirical thesis

    University essay from Högskolan i Borås/Akademin för vård, arbetsliv och välfärd

    Author : Malin Eklund; Elin Wannberg; [2019]
    Keywords : MRSA; health education; nursing role; nursing; antibiotic resistance; life-world; caring relationship;

    Abstract : Background: Methicillin Resistant Staphylococcus Aureus (MRSA) has developed to be a global problem and inflicts a challenge for health care. Increased traveling leads to heightened transmission worldwide where the Philippines is one of the top five countries that contributes to the spread back home to Sweden. READ MORE

  5. 5. Security Management : Fulfillment of the Government Requirements for a component assurance process

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Naida Kukuruzovic; [2016]
    Keywords : Security management; information security; authentication; authorization; governance; risk management; compliance; user management; Säkerhetshantering; informationssäkerhet; autentisering; auktorisering; styrning; riskhantering; följsamhet; användaradministration;

    Abstract : Protecting organization’s assets from various security threats is a necessity for every organization. Efficient security management is vital to effectively protect the organization’s assets. However, the process of implementing efficient security management is complex and needs to address many requirements. READ MORE