Essays about: "security procedures"

Showing result 1 - 5 of 89 essays containing the words security procedures.

  1. 1. Information security cultures and challenges in higher education: A study from the university researchers’ perspective

    University essay from Lunds universitet/Institutionen för informatik

    Author : Fabrice Lindblom-Levy; Albin Westermark; [2023]
    Keywords : Information Security; Information Security Culture; Information Security Challenges; Researchers; Higher Education; Business and Economics;

    Abstract : This bachelor’s thesis research focuses on information security. With the growing use of technology in research, information security has become an increasingly important concern for academic institutions, which face, among other, challenges related to the protection of sensitive data from unauthorised access, theft, and misuse. READ MORE

  2. 2. Impact of C-ITS on Mobility and Society

    University essay from KTH/Transportplanering

    Author : Ninnie Tägtström; [2023]
    Keywords : C-ITS; ITS; Mobility; Digitization; Automation; Transportation System; Traffic Signals; Vensim;

    Abstract : This thesis investigates the important potential of Cooperative Intelligent Transport Systems (C-ITS) onmobility and society. C-ITS appears as a promising solution to reinvent transportation and become avital part of the ever-evolving environment as developments in technology continue to change the world. READ MORE

  3. 3. "The Whitewashing of Europe" : A Comparative Analysis of Migration Policytowards the Middle East and Ukraine, as a Reflection of European Identity Politics

    University essay from Malmö universitet/Institutionen för globala politiska studier (GPS)

    Author : Jade Marie Prideaux de Lacy; [2023]
    Keywords : European Union; Neocolonialism; Identity; Discourse; Externalisation; Refugee; Crisis;

    Abstract : In 2015, the high influx of refugees dispersing throughout Europe was represented as a crisis tocooperation and European security. In contrast, the response to the Russian invasion of Ukrainein February 2022, saw the EU institute the Temporary Protection Order to bypass standardmigration procedures to allow Ukrainian refugees safe access and asylum. READ MORE

  4. 4. Security Management in Cloud Computing for healthcare Data

    University essay from Luleå tekniska universitet

    Author : Malik Asad; [2023]
    Keywords : ;

    Abstract : "In today's research field interconnected world, preventing security issues and confidentiality breaches has become paramount to safeguarding sensitive information, and organizations must take proactive measures to ensure data security. Cloud computing enhances security management by reducing the likelihood of cyber-attacks. READ MORE

  5. 5. Gap Analysis of Information Security Management Systems in Sri Lankan Higher Education Institutes

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Suneth Piumal Don Appuhamilage; Rathnayake Mudiyanselage Dineth Udyan Rathnayake; [2023]
    Keywords : Compliance; Gap analysis; Maturity model; Maturity level; MTO model; ISO IEC 27001:2013;

    Abstract : This work presents an overview of preliminary stages taken towards proper establishment ofan Information Security Management System (ISMS) for Sri Lankan Higher EducationInstitutes (HEIs) based on ISO/IEC 27001:2013 standard. This study consists with a gapanalysis conducted on selected HEIs within Sri Lanka to evaluate their compliance withISO/IEC 27001:2013 standards. READ MORE