Essays about: "how security in business can be applied"

Showing result 1 - 5 of 9 essays containing the words how security in business can be applied.

  1. 1. WHAT YOU CAN’T MEASURE - YOU CAN’T IMPROVE - The role of maturity models to improve data governance

    University essay from Göteborgs universitet/Graduate School

    Author : Elsa Källström; Elin Vieglins; [2021-07-08]
    Keywords : data governance; maturity model; maturity assessment; maturity levels; improvement areas;

    Abstract : Background and purpose: As a consequence of the growing power of data, there is a needfor companies to maximise the value derived from it. However, to maximise the value derivedfrom data, it needs to be available, secure, relevant, and of high quality, which can be assuredby data governance. READ MORE

  2. 2. Digitala skogsbruksplanen i den operativa verksamheten : en fallstudie på den digitala skogsplanens roll i den operativa verksamheten samt attityden gentemot verktyget

    University essay from SLU/Dept. of Forest Economics

    Author : Per Eriksson; [2020]
    Keywords : skogsekonomisk förening; transformering; effektivisering; delprocesser; resurs- och flödeseffektivitet; forest owners association; digital transformation; efficency; subprocesses; resource and flow efficiency;

    Abstract : I de flesta branscher sker idag ett intensivt arbete med att digitalisera sina verksamheter för att undvika att bli omsprungna av konkurrenter. Inom skogsbranschen sker en rad utvecklingsinsatser som drivs av den starka och historiska effektiviseringskulturen som branschen präglas av. READ MORE

  3. 3. Security for Cloud Based Services

    University essay from KTH/Radio Systems Laboratory (RS Lab); KTH/Radio Systems Laboratory (RS Lab)

    Author : Sabrina Ali Tandra; S.M. Sarwarul Islam Rizvi; [2014]
    Keywords : cloud computing; security; risk; vulnerability; performance; Molntjänster; säkerhet; risk; sårbarhet; utförande;

    Abstract : Cloud computing is a new buzzword in the modern information technology world. Today cloud computing can be considered as a service, similar to the way that electricity is considered a service in urban areas. A cloud user can utilize different computing resources (e.g. READ MORE

  4. 4. EVALUATION OF MOBILE DEVICE MANAGEMENT TOOLS AND ANALYSING INTEGRATION MODELS FOR MOBILITY ENTERPRISE

    University essay from Umeå universitet/Institutionen för datavetenskap

    Author : Elmira Bagheri Majdi; [2013]
    Keywords : ;

    Abstract : The mobile market is growing. More and more business units, (BUs) at the multinational company ABB start considering utilizing mobility to create business value, by offering product/system enhancement and by offering new services. READ MORE

  5. 5. Security in Smart Object Networks

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Mohit Sethi; [2012]
    Keywords : IoT; smart objects; security; CoAP; asymmetric cryptography; integrity; authenticity; mirroring mechanism; IoT; smarta objekt; säkerhet; CoAP; asymmetrisk kryptografi; integritet; autenticitet; återspeglingsmekanism;

    Abstract : Internet of Things (IoT) refers to an inter-connected world where physical devices are seamlessly integrated into the Internet and become active participants of business, information and social processes. This involves the inter-connection of a large number of heterogeneous networked entities and networks. READ MORE