Essays about: "information security policies"

Showing result 6 - 10 of 83 essays containing the words information security policies.

  1. 6. Exploring the Food Security and Dietary Diversity Situation: A Comparative Analysis between Bangladeshi Immigrants Currently Residing in Lund, Sweden and Their Previous Residence in Bangladesh.

    University essay from Lunds universitet/Graduate School

    Author : Anta Ishmam Chowdhury; [2023]
    Keywords : Social Sciences;

    Abstract : The purpose of this study was to compare the food security and dietary diversity status of Bangladeshi immigrants living in Sweden to their position in Bangladesh. Structured surveys were used to collect data from 15 Bangladeshi immigrants, which included demographic information as well as indices of food security and dietary diversity. READ MORE

  2. 7. Consumers Data: When the Private Goes Public : An exploratory study on consumers’ concerns in the public and private spheres of e-commerce.

    University essay from Linnéuniversitetet/Institutionen för marknadsföring och turismvetenskap (MTS)

    Author : Ray Nablsi; Ouras Al-Bardan; [2023]
    Keywords : Consumers’ concerns; e-privacy; e-security; e-commerce; personal data; private sphere; public sphere.;

    Abstract : In the digital era, e-commerce has gained significant traction, displacing traditional brick-and-mortar stores. However, this transition has raised concerns among consumers regarding e-privacy and e-security. Disclosing personal information on public e-commerce platforms exposes individuals to potential risks, such as data breaches. READ MORE

  3. 8. Integration of Attribute-Based Encryption and IoT: An IoT Security Architecture

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Ziyad Elbanna; [2023]
    Keywords : Internet of things; Attribute based encryption; Fine-grained access control; Key revocation; Proxy re-encryption;

    Abstract : Services relying on internet of things (IoTs) are increasing day by day. IoT makes use of internet services like network connectivity and computing capability to transform everyday objects into smart things that can interact with users, and the environment to achieve a purpose they are designed for. READ MORE

  4. 9. How are Cybersecurity Threats, in the Form of Disinformation Campaigns, Reflected on the Security Measures They Inspire? : A Case Study of the Responses to Russian Election Meddling in Mexico, Brazil and Spain

    University essay from Malmö universitet/Institutionen för globala politiska studier (GPS)

    Author : Ailyn Christiansen; [2023]
    Keywords : disinformation campaigns; Russian election meddling; electoral security;

    Abstract : The contemporary topic and fear of information attacks making their way and altering the course of democratic elections is a common one for many nations at current times. New technologies, cyberspace, and the increasing risk of hybrid warfare, as well as the little and vague regulation present to manage these, pose an intimidating threat to nations trying to uphold their liberal democratic values; and the nations taking advantage of this new-found form of influence are well aware of this. READ MORE

  5. 10. Security awareness training : Impact of security awareness training on employee attitudes, behaviors, and organizational cybersecurity: A study in medium-sized companies

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Carl-Adam Spanlang; [2023]
    Keywords : Information security; cybersecurity; security awareness training; nanolearning;

    Abstract : This research study investigates the efficacy of security awareness training programs in managing information security threats. Through a systematic literature review (SLR) and multiple interviews, the research explains the interplay between employees' security knowledge, attitudes, and behaviors in the context of these training programs. READ MORE