Essays about: "information security policies"
Showing result 1 - 5 of 83 essays containing the words information security policies.
-
1. The Advent of ChatGPT and its Technological Integration in Education
University essay from Malmö universitet/Institutionen för kultur, språk och medier (KSM)Abstract : Our study investigates the possibility of integrating ChatGPT, an AI text generative tool, as a didactic supporting tool within the Swedish upper-secondary school curricula. Particularly, it takes interest in the English foreign language teaching context and examines eight peer reviewed articles on the matter. READ MORE
-
2. Visual Communication in Driving Social Innovation for Disadvantaged groups in Nami
University essay from Linköpings universitet/Medie- och Informationsteknik; Linköpings universitet/Tekniska fakultetenAbstract : This master’s thesis aims to explore the potential of visual communication as a powerful tool for promoting change and impact in Namibia with a focus on sustainable agriculture and food security. The study analyzes how graphic design and visual communication may effectively explain best practices for sustainable farming and inspire young adults in rural communities to engage with agriculture through empirical research. READ MORE
-
3. Investigating the Impact of User Behavior in the Security of Smart Home IoT Devices
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : As technology is growing at a fast pace, IoT-based smart home services are increasingly adopted by people. IoT-based smart homes offer numerous unimaginable benefits, including efficiency, safety, effectiveness, scalability of services, devices, and data, among many others. However, there is another side to this technology: security threats. READ MORE
-
4. A SYSTEMATIC REVIEW OF ATTRIBUTE-BASED ENCRYPTION FOR SECURE DATA SHARING IN IoT ENVIRONMENT.
University essay from Stockholms universitet/Institutionen för data- och systemvetenskapAbstract : Internet of Things (IoT) refers to a network of global and interrelated computing devices that connects humans and machines. It connects anything that has access to the internet and creates an avenue for data and information exchange. READ MORE
-
5. Gap Analysis of Information Security Management Systems in Sri Lankan Higher Education Institutes
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : This work presents an overview of preliminary stages taken towards proper establishment ofan Information Security Management System (ISMS) for Sri Lankan Higher EducationInstitutes (HEIs) based on ISO/IEC 27001:2013 standard. This study consists with a gapanalysis conducted on selected HEIs within Sri Lanka to evaluate their compliance withISO/IEC 27001:2013 standards. READ MORE