Essays about: "literature review information security"
Showing result 1 - 5 of 64 essays containing the words literature review information security.
-
1. Development and Evaluation of an Artefact Model to Support Security Compliance for DevSecOps
University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknik; Blekinge Tekniska Högskola/Institutionen för programvaruteknikAbstract : Background. DevOps represents a set of principles and practices of the software development (Dev) and information technology operations (Ops) of the product lifecycle requirements. DevOps has become a buzzword in organizations because it is an agile software development offspring. READ MORE
-
2. Can humans be patched? A short current state review.
University essay from Malmö universitet/Fakulteten för kultur och samhälle (KS)Abstract : Informationssäkerhet är ett växande problem bland organisationer. Ett stort antal säkerhetsöverträdelser innefattar vårdslöshet bland anställda eftersom den mänskliga uppförande anses vara den viktigaste faktorn för informationssäkerhet. Därför är det avgörande för organisationer att utveckla en informationssäkerhetskultur. READ MORE
-
3. Trans-Boundary water conflict: a case study of South Indian River
University essay from Uppsala universitet/Institutionen för geovetenskaperAbstract : Water has long-standing history in terms of delivering adequate security to human well-being and the environment, however, a significant attention towards numerous waters related threats have been growing since the recent past years due to the increasing water crisis. Hence, a growing interest towards water security has become an essential concern to humankind as it critically supports health, economic transformation, political stability as well as environmental sustainability. READ MORE
-
4. Social media and business: balancing risks and opportunities : A literature review
University essay from Luleå tekniska universitet/Digitala tjänster och systemAbstract : Purpose This thesis analyses what are the current information security risks and opportunities of social media in a business context based on publications from 2015 to 2020. Design/methodology/approach This papers follows a qualitative method, particularly a Systematic Literature Review guided by Okoli and and Schabram (2010), the concept-centric approach described by Webster and Watson (2002) and thematic analysis described by Braun and Clarke (2006). READ MORE
-
5. Privacy and security of IoT : A smart home perspective
University essay from Linnéuniversitetet/Institutionen för informatik (IK)Abstract : In a world where technological progress is constant, understanding the views and experiences of users is essential. With the use of technology, there are many dangers. Issues with privacy and security are among them. This thesis deals with understanding the perception of privacy and security of smart home IoT devices. READ MORE
