SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning ""information security" srt2:(2015-2019)"

Utökad sökning > "information security" > (2015-2019)

  • Resultat 1-10 av 142
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Information Security : Foundations, technologies and applications
  • 2018
  • Samlingsverk (redaktörskap) (refereegranskat)abstract
    • The rapid advancements in telecommunications, computing hardware and software, and data encryption, and the widespread use of electronic data processing and electronic business conducted through the Internet have led to a strong increase in information security threats. The latest advances in information security have increased practical deployments and scalability across a wide range of applications to better secure and protect our information systems and the information stored, processed and transmitted. This book outlines key emerging trends in information security from the foundations and technologies in biometrics, cybersecurity, and big data security to applications in hardware and embedded systems security, computer forensics, the Internet of Things security, and network security. Information Security: Foundations, technologies and applications is a comprehensive review of cutting-edge algorithms, technologies, and applications, and provides new insights into a range of fundamentally important topics in the field. This up-to-date body of knowledge is essential reading for researchers and advanced students in information security, and for professionals in sectors where information security is required.
  •  
2.
  • Karlsson, Fredrik, 1974-, et al. (författare)
  • Information security culture : state-of-the-art review between 2000 and 2013
  • 2015
  • Ingår i: Information and Computer Security. - : Emerald. - 2056-4961. ; 23:3, s. 246-285
  • Forskningsöversikt (refereegranskat)abstract
    • Purpose – The aim of this paper is to survey existing information security culture research to scrutinise the kind of knowledge that has been developed and the way in which this knowledge has been brought about.Design/methodology/approach – Results are based on a literature review of information security culture research published between 2000 and 2013 (December).Findings – This paper can conclude that existing research has focused on a broad set of research topics, but with limited depth. It is striking that the effects of different information security cultures have not been part of that focus. Moreover, existing research has used a small repertoire of research methods, a repertoire that is more limited than in information systems research in general. Furthermore, an extensive part of the research is descriptive, philosophical or theoretical – lacking a structured use of empirical data – which means that it is quite immature.Research limitations/implications – Findings call for future research that: addresses the effects of different information security cultures; addresses the identified research topics with greater depth; focuses more on generating theories or testing theories to increase the maturity of this subfield of information security research; and uses a broader set of research methods. It would be particularly interesting to see future studies that use intervening or ethnographic approaches because, to date, these have been completely lacking in existing research.Practical implications – Findings show that existing research is, to a large extent, descriptive, philosophical or theoretical. Hence, it is difficult for practitioners to adopt these research results, such as frameworks for cultivating or assessment tools, which have not been empirically validated.Originality/value – Few state-of-the-art reviews have sought to assess the maturity of existing research on information security culture. Findings on types of research methods used in information security culture research extend beyond the existing knowledge base, which allows for a critical discussion about existing research in this sub-discipline of information security.
  •  
3.
  • Rocha Flores, Waldo (författare)
  • Shaping information security behaviors related to social engineering attacks
  • 2016
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • Today, few companies would manage to continuously stay competitive without the proper utilization of information technology (IT). This has increased companies’ dependency of IT and created new threats that need to be addressed to mitigate risks to daily business operations. A large extent of these IT-related threats includes hackers attempting to gain unauthorized access to internal computer networks by exploiting vulnerabilities in the behaviors of employees. A common way to exploit human vulnerabilities is to deceive and manipulate employees through the use of social engineering. Although researchers have attempted to understand social engineering, there is a lack of empirical research capturing multilevel factors explaining what drives employees’ existing behaviors and how these behaviors can be improved. This is addressed in this thesis.The contribution of this thesis includes (i) an instrument to measure security behaviors and its multilevel determinants, (ii) identification of multilevel variables that significantly influence employees’ intent for behavior change, (iii) identification of what behavioral governance factors that lay the foundation for behavior change, (iv) identification that national culture has a significant effect on how organizations cope with behavioral information security threats, and (v) a strategy to ensure adequate information security behaviors throughout an organization.This thesis is a composite thesis of eight papers. Paper 1 describes the instrument measuring multilevel determinants. Paper 2 and 3 describes how security knowledge is established in organizations, and the effect on employee information security awareness. In Paper 4 the root cause of employees’ intention to change their behaviors and resist social engineering is described. Paper 5 and 8 describes how the instrument to measure social engineering security behaviors was developed and validated through scenario-based surveys and phishing experiments. Paper 6 and 7 describes experiments performed to understand reason to why employees fall for social engineering. Finally, paper 2, 5 and 6 examines the moderating effect of national culture.
  •  
4.
  • Lundgren, Björn, 1984-, et al. (författare)
  • Defining Information Security
  • 2017
  • Ingår i: Science and Engineering Ethics. - : Springer. - 1353-3452 .- 1471-5546.
  • Tidskriftsartikel (refereegranskat)abstract
    • This article proposes a new definition of information security, the ‘Appropriate Access’ definition. Apart from providing the basic criteria for a definition—correct demarcation and meaning concerning the state of security—it also aims at being a definition suitable for any information security perspective. As such, it bridges the conceptual divide between so-called ‘soft issues’ of information security (those including, e.g., humans, organizations, culture, ethics, policies, and law) and more technical issues. Because of this it is also suitable for various analytical purposes, such as analysing possible security breaches, or for studying conflicting attitudes on security in an organization. The need for a new definition is demonstrated by pointing to a number of problems for the standard definition type of information security—the so-called CIA definition. Besides being too broad as well as too narrow, it cannot properly handle the soft issues of information security, nor recognize the contextual and normative nature of security.
  •  
5.
  • Karlsson, Fredrik, 1974-, et al. (författare)
  • Inter-organisational information security : a systematic literature review
  • 2016
  • Ingår i: Information & Computer Security. - : Emerald Group Publishing Limited. - 2056-4961. ; 24:5, s. 418-451
  • Forskningsöversikt (refereegranskat)abstract
    • Purpose: The purpose of this paper is to survey existing inter-organisational information securityresearch to scrutinise the kind of knowledge that is currently available and the way in which thisknowledge has been brought about.Design/methodology/approach: The results are based on a literature review of inter-organisational information security research published between 1990 and 2014.Findings: The authors conclude that existing research has focused on a limited set of research topics.A majority of the research has focused management issues, while employees’/non-staffs’ actualinformation security work in inter-organisational settings is an understudied area. In addition, themajority of the studies have used a subjective/argumentative method, and few studies combinetheoretical work and empirical data.Research limitations/implications: The findings suggest that future research should address abroader set of research topics, focusing especially on employees/non-staff and their use of processes andtechnology in inter-organisational settings, as well as on cultural aspects, which are lacking currently;focus more on theory generation or theory testing to increase the maturity of this sub-field; and use abroader set of research methods.Practical implications: The authors conclude that existing research is to a large extent descriptive,philosophical or theoretical. Thus, it is difficult for practitioners to adopt existing research results, suchas governance frameworks, which have not been empirically validated.Originality/value: Few systematic reviews have assessed the maturity of existinginter-organisational information security research. Findings of authors on research topics, maturity andresearch methods extend beyond the existing knowledge base, which allow for a critical discussionabout existing research in this sub-field of information security.
  •  
6.
  • Lundgren, Martin, et al. (författare)
  • Security-related stress : A perspective on information security risk management
  • 2019
  • Ingår i: 2019 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2019. - : IEEE. - 9781728102290 - 9781728102306
  • Konferensbidrag (refereegranskat)abstract
    • In this study, the enactment of information security risk management by novice practitioners is studied by applying an analytical lens of security-related stress. Two organisations were targeted in the study using a case study approach to obtain data about their practices. The study identifies stressors and stress inhibitors in the ISRM process and the supporting ISRM tools and discusses the implications for practitioners. For example, a mismatch between security standards and how they are interpreted in practice has been identified. This mismatch was further found to be strengthened by the design of the used ISRM tools. Those design shortcomings hamper agility since they may enforce a specific workflow or may restrict documentation. The study concludes that security-related stress can provide additional insight into security-novice practitioners' ISRM challenges. 
  •  
7.
  • Lundgren, Björn, 1984- (författare)
  • Semantic Information and Information Security : Definitional Issues
  • 2016
  • Licentiatavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • This licentiate thesis consist of two separate research papers which concern two tangential topics – that of semantic information and that of information security. Both topics are approached by similar methods, i.e. with a concern about conceptual and definitional issues. In Paper I – concerning the concept of information, and a semantic conception thereof – the conceptual, and definitional, issues focus on one property, that of truthfulness. It is argued – against the veridicality thesis – that semantic information need not be truthful. In Paper II – concerning information security – it is argued that the current leading definitions (so-called ‘CIA’ definitions, which define information as secure if, and only if, the properties of confidentiality, integrity, and availability are retained) suffer from both actual and possible counter-examples, and lack an appropriate conceptual sense. On the basis of this criticism a new kind of definitions is proposed and argued for.
  •  
8.
  • Lundgren, Björn, 1984- (författare)
  • Information, Security, Privacy, and Anonymity : Definitional and Conceptual Issues
  • 2018
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • This doctoral thesis consists of five research papers that address four tangential topics, all of which are relevant for the challenges we are facing in our socio-technical society: information, security, privacy, and anonymity. All topics are approached by similar methods, i.e. with a concern about conceptual and definitional issues. In Paper I—concerning the concept of information and a semantic conception thereof—it is argued that the veridicality thesis (i.e. that information must be true or truthful) is false. In Paper II—concerning information security—it is argued that the current leading definitions suffer from counter-examples, and lack an appropriate conceptual sense. Based on this criticism a new kind of definition is proposed and defended.  In Paper III—concerning control definitions of privacy—it is argued that any sensible control-definition of privacy must properly recognize the context as part of the defining criteria. In Paper IV—concerning the concept of privacy—it is argued that privacy is a normative concept and that it is constituted by our social relations. Final, in Paper V—concerning anonymity—it is argued that the threat from deanonymization technology goes beyond harm to anonymity. It is argued that a person who never is deanonymized can still be harmed and what is at stake is an ability to be anonymous.
  •  
9.
  • Bergström, Erik, 1976-, et al. (författare)
  • Stress Amongst Novice Information Security Risk Management Practitioners
  • 2019
  • Ingår i: International Journal on Cyber Situational Awareness. - : Centre for Multidisciplinary Research, Innovation and Collaboration (C-MRiC). - 2057-2182 .- 2057-2182. ; 4:1, s. 128-154
  • Tidskriftsartikel (refereegranskat)abstract
    • Today, information is a key asset for many organisations. Reducing risks of information compromise is increasingly prioritised. However, there is an incomplete understanding of how organisations with limited security knowledge and experience manage information security risks in practice. Previous studies have suggested that security-novice employees faced with burdensome, complex, and ambiguous security requirements can experience security-related stress (SRS), and ultimately influence their security decisions. In this study, we further this research stream by suggesting that SRS can similarly be found with security-novice managers responsible for developing and practising information security risk management (ISRM). Two organisations were targeted in the study using a case study approach, to obtain data about their practices, using SRS as an analytical lens. The study found various examples where SRS influenced security-novice managers’ decisions, and identifies several stressors and stress inhibitors in the ISRM process and supporting ISRM tools, and discusses the implications for practitioners.
  •  
10.
  • Bergström, Erik, 1976-, et al. (författare)
  • Revisiting information security risk management challenges : a practice perspective
  • 2019
  • Ingår i: Information and Computer Security. - : Emerald Group Publishing Limited. - 2056-4961. ; 27:3, s. 358-372
  • Tidskriftsartikel (refereegranskat)abstract
    • Purpose – The study aims to revisit six previously defined challenges in information security risk management to provide insights into new challenges based on current practices.Design/methodology/approach – The study is based on an empirical study consisting of in-depth interviews with representatives from public sector organisations. The data were analysed by applying a practice-based view, i.e. the lens of knowing (or knowings). The results were validated by an expert panel.Findings – Managerial and organisational concerns that go beyond a technical perspective have been . found, which affect the ongoing social build-up of knowledge in everyday information security work.Research limitations/implications – The study has delimitation as it consists of data from four public sector organisations, i.e. statistical analyses have not been in focus, while implying a better understanding of what and why certain actions are practised in their security work.Practical implications – The new challenges that have been identified offer a refined set of actionable advice to practitioners, which, for example, can support cost-efficient decisions and avoid unnecessary security trade-offs.Originality/value – Information security is increasingly relevant for organisations, yet little is still known about how related risks are handled in practice. Recent studies have indicated a gap between the espoused and the actual actions. Insights from actual, situated enactment of practice can advise on process adaption and suggest more fit approaches.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-10 av 142
Typ av publikation
konferensbidrag (56)
tidskriftsartikel (51)
bokkapitel (10)
doktorsavhandling (8)
forskningsöversikt (4)
rapport (3)
visa fler...
licentiatavhandling (3)
bok (2)
proceedings (redaktörskap) (2)
annan publikation (2)
samlingsverk (redaktörskap) (1)
visa färre...
Typ av innehåll
refereegranskat (114)
övrigt vetenskapligt/konstnärligt (26)
populärvet., debatt m.m. (2)
Författare/redaktör
Torra, Vicenç (8)
Ekstedt, Mathias (8)
Karlsson, Fredrik, 1 ... (8)
Bergström, Erik, 197 ... (7)
Awad, Ali Ismail (6)
Fischer-Hübner, Simo ... (6)
visa fler...
Åhlfeldt, Rose-Mhari ... (5)
Brodin, Martin (5)
Hedström, Karin, 196 ... (5)
Magnusson, Lars, 195 ... (5)
Lundgren, Martin (5)
Åhlfeldt, Rose-Mhari ... (5)
Kolkowska, Ella, 197 ... (5)
Karlsson, Martin, 19 ... (4)
Nohlberg, Marcus, 19 ... (4)
Lagerström, Robert (4)
Fritsch, Lothar, 197 ... (4)
Åström, Joachim, 197 ... (3)
Sandkuhl, Kurt, 1963 ... (3)
Johnson, Pontus (3)
Kävrestad, Joakim, 1 ... (3)
Päivärinta, Tero (3)
Ding, Jianguo (3)
Mirijamdotter, Anita ... (2)
Leidner, Dorothy (2)
Nohlberg, Marcus (2)
Vasilakos, Athanasio ... (2)
Johansson, Peter, 19 ... (2)
Atif, Yacine, 1967- (2)
Kirikova, Marite (2)
van Laere, Joeri, 19 ... (2)
Kowalski, Stewart (2)
Russo, Alejandro, 19 ... (2)
Pousette, Anders, 19 ... (2)
Thapa, Devinder (2)
Bednar, Peter (2)
Jiang, Yuning, 1993- (2)
Goldkuhl, Göran (2)
Mayer, Peter (2)
Balozian, Puzant (2)
Volkamer, Melanie (2)
Anteryd, Fredrik (2)
Lennerholt, Christia ... (2)
Korman, Matus, 1985- (2)
Möller, Niklas (2)
Törner, Marianne, 19 ... (2)
Persson, Anne, Profe ... (2)
Buiras, Pablo, 1986 (2)
Casas-Roma, Jordi (2)
Herrera-Joancomartí, ... (2)
visa färre...
Lärosäte
Högskolan i Skövde (32)
Luleå tekniska universitet (23)
Kungliga Tekniska Högskolan (16)
Örebro universitet (16)
Jönköping University (15)
Karlstads universitet (11)
visa fler...
Lunds universitet (10)
Linnéuniversitetet (7)
Göteborgs universitet (6)
Uppsala universitet (5)
Stockholms universitet (5)
Linköpings universitet (5)
Blekinge Tekniska Högskola (5)
Mittuniversitetet (4)
Chalmers tekniska högskola (4)
Malmö universitet (3)
Södertörns högskola (2)
RISE (2)
Umeå universitet (1)
Högskolan Väst (1)
Mälardalens universitet (1)
Högskolan i Borås (1)
Försvarshögskolan (1)
Högskolan Dalarna (1)
visa färre...
Språk
Engelska (136)
Svenska (5)
Italienska (1)
Forskningsämne (UKÄ/SCB)
Naturvetenskap (79)
Samhällsvetenskap (48)
Teknik (24)
Humaniora (4)
Medicin och hälsovetenskap (3)

År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy