Essays about: "literature review information security"
Showing result 1 - 5 of 100 essays containing the words literature review information security.
-
1. Human Security And The European Economy : Review of the sociological and economic situation in the EU sphere
University essay from Uppsala universitet/Teologiska institutionenAbstract : This thesis forms a report including human security and economic aspect experienced by three groups that are Radical right, Radical left, and the refugees. The examined theory is based on the securitisation of the EU sphere since the 2014/2015 refugee crisis and the Eurozone crisis. READ MORE
-
2. Market Intelligence within Software Procurement
University essay from Lunds universitet/InnovationsteknikAbstract : With the dawn of the digital era, software solutions are becoming of increasingly strategic importance for corporations, and due to the complexity of the products and the huge lock-in effects which they often give rise to, software-procurement is growing into a critical activity. However, due to the phenomena of information overload, finding and making use of the right information when making strategic decisions is becoming increasingly difficult, resulting in the need for organizations to overlook their information processing capacities in order to ensure the quality of such selections. READ MORE
-
3. ISMS and privacy challenges related to PeHS : A Qualitative study
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : The future of healthcare is increasingly digital, which includes a shift towards more personalised services that allow for more patient-centred and transparent patient care. These services are defined as PeHS and although there are great potential benefits of these services, there are also challenges regarding infor[1]mation security and privacy related to providing this type of services. READ MORE
-
4. Security and performance impact of client-side token storage methods
University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknikAbstract : Applications store more data than ever before, including sensitive information such as user data, credit card information, and company secrets. Due to the value of this data, malicious actors have a financial incentive to employ a variety of attacks against applications in order to gain access to it. READ MORE
-
5. Ransomware and phishing cyberattacks: analyzing the public’s perception of these attacks in Sweden
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : Digitization of activities has had a lot of positive effects on efficiency. But it also has caused several types of security issues and opened the door for diverse types of cyberattacks. Some of those attacks are based on luring people and therefor they are categorized as social engineering attacks, such as Phishing and Ransomware attack. READ MORE
