SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning ""information security" ;mspu:(chapter)"

Utökad sökning > "information security" > Bokkapitel

  • Resultat 1-10 av 28
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Kolkowska, Ella, et al. (författare)
  • Analyzing information security goals
  • 2012
  • Ingår i: Threats, countermeasures, and advances in applied information security. - : IGI Global. - 9781466609785 ; , s. 91-110
  • Bokkapitel (refereegranskat)
  •  
2.
  • Kolkowska, Ella, et al. (författare)
  • Analyzing information security goals
  • 2012. - 1
  • Ingår i: Threats, countermeasures and advances in applied information security. - : IGI Global. - 9781466609785 ; , s. 91-110
  • Bokkapitel (övrigt vetenskapligt/konstnärligt)abstract
    • "This book addresses the fact that managing information security program while effectively managing risks has never been so critical, discussing issues such as emerging threats and countermeasures for effective management of information security in organizations"--Provided by publisher.
  •  
3.
  • Herzog, Almut, et al. (författare)
  • An ontology for information security
  • 2009. - 1
  • Ingår i: Techniques and applications for advanced information privacy and security. - : Information Science Reference. - 1605662100 ; , s. 278-301
  • Bokkapitel (övrigt vetenskapligt/konstnärligt)abstract
    • Advances in technology are causing new privacy concerns as an increasing number of citizens are engaging in online activities.Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues provides a thorough understanding of issues and concerns in information technology security. An advanced reference source covering topics such as security management, privacy preservation, and authentication, this book outlines the field and provides a basic understanding of the most salient issues in privacy concerns for researchers and practitioners.Show more Show less
  •  
4.
  • Åhlfeldt, Rose-Mharie (författare)
  • Information Security Issues in Healthcare : an Experience Report
  • 2006
  • Ingår i: Knowledge in organizations 1. - : Högskolan i Skövde. ; , s. 147-158
  • Bokkapitel (övrigt vetenskapligt/konstnärligt)abstract
    • This paper presents a method based on process manager technology for making all actors (humans or information systems) involved in healthcare processes to communicate along these processes. The method utilizes straightforward and yet executable process diagrams. Furthermore, the paper suggests a number of additional features to the method that may cater for the representation of security and quality requirements, as well as enhanced efficiency of the healthcare processes.
  •  
5.
  • Dhillon, Gurpreet, et al. (författare)
  • Ensuring Core Competencies for Cybersecurity Specialists
  • 2019
  • Ingår i: Cybersecurity Education for Awareness and Compliance. - Hershey, Pennsylvania, USA : IGI Global. - 9781522578475 - 9781522578482 ; , s. 121-133
  • Bokkapitel (refereegranskat)abstract
    • Within an organization, it is critical that all employees possess a security awareness and thus play a part in the protection of said organization's information assets. Some employees will have key roles and responsibilities and require specific skills to support them. However, organizations can face challenges in regard to recognizing the required specialized skills as well as where to obtain them. For this reason, whether an organization chooses to hire new staff, developing existing staff, or outsource the activities altogether, it is necessary to know the type and level of expertise required. To this end, this chapter discusses the need for organizations to understand and identify the essential skills related to cybersecurity in order for their employees to develop core competencies in these areas.
  •  
6.
  • Große, Christine, Fil.Lic, 1974-, et al. (författare)
  • Information Technology Consulting Firms’ Readiness for Managing Information Security Incidents
  • 2020
  • Ingår i: Information Systems Security and Privacy. - Cham : Springer Publishing Company. - 9783030494421 - 9783030494438 ; , s. 48-73
  • Bokkapitel (refereegranskat)abstract
    • Because of the increase in the number and scope of information security incidents, proper management has recently gained importance for public and private organizations. Further challenges in this area have resulted from new regulations, such as the General Data Protection Regulation (GDPR) and the Directive on Security of Network and Information Systems (NIS), as well as a tendency to outsource vital services to subcontractors. This study addresses the lack of empirical studies in the field and focuses on information security incident management at information technology (IT) consulting firms.Specifically, it examines challenges due to their exposed position and newregulations. The contribution of the paper is twofold. First, it provides valuable insight into the experiences and challenges of Swedish IT consulting firms.Second, it proposes criteria for classifying an information security incident that can equip decision-makers with a solid and assessable basis for incident management. The results emphasize further improvements in employee awareness, incident classification, and systemic governance, thereby integrating corporate policy making, information security incident management, and information system leadership.
  •  
7.
  • Harnesk, Dan (författare)
  • Convergence of information security in B2B networks
  • 2011
  • Ingår i: Electronic Business Interoperability. - Hershey : Idea Group Publishing. - 1609604857 - 9781609604868 ; , s. 571-595
  • Bokkapitel (övrigt vetenskapligt/konstnärligt)abstract
    • Over the past 20 years, researchers have made significant headway into understanding information security, with most studies focusing on internal organizational information security affairs. This study adds to the cumulative tradition by creating a concept for the convergence of information security in B2B network contexts. More specifically, the move from information security safeguards to information security observers is presented in depth. By adopting the Actor Network Theory and the Process Theory, this chapter demonstrates how three conversion, use, and performance sub-processes constitute the devised process of converging information security. Each sub-process directs attention towards definition, integration, the evaluation of security and how the metaphor of the observer may operate in the B2B network context.
  •  
8.
  • Awad, Ali Ismail (författare)
  • Introduction to Information Security Foundations and Applications
  • 2018
  • Ingår i: Information Security. - : Institution of Engineering and Technology. - 9781849199742 - 9781849199766 ; , s. 3-9
  • Bokkapitel (refereegranskat)abstract
    • Information security has extended to include several research directions like user authentication and authorization, network security, hardware security, software security, and data cryptography. Information security has become a crucial need for protecting almost all information transaction applications. Security is considered as an important science discipline whose many multifaceted complexities deserve the synergy of the computer science and engineering communities.
  •  
9.
  •  
10.
  • Boldt, Martin, et al. (författare)
  • Exploring Spyware Effects
  • 2007
  • Ingår i: Spyware. - Hyderabad : ICFAI University Press. - 9788131407264 ; , s. 39-58
  • Bokkapitel (övrigt vetenskapligt/konstnärligt)
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-10 av 28
Typ av publikation
Typ av innehåll
refereegranskat (17)
övrigt vetenskapligt/konstnärligt (9)
populärvet., debatt m.m. (2)
Författare/redaktör
Hedström, Karin, 196 ... (3)
Kävrestad, Joakim, 1 ... (2)
Nohlberg, Marcus, 19 ... (2)
Karlsson, Fredrik, 1 ... (2)
Kolkowska, Ella (2)
Harnesk, Dan (2)
visa fler...
Karlsson, Fredrik (1)
Nohlberg, Marcus (1)
Popov, Oliver (1)
Ekenberg, Love (1)
Awad, Ali Ismail (1)
Saffiotti, Alessandr ... (1)
Jacobsson, Andreas (1)
Boldt, Martin (1)
Roos, Robert (1)
Rambusch, Jana (1)
Pousette, Anders, 19 ... (1)
Chessa, Stefano (1)
Dragone, Mauro (1)
Micheli, Alessio (1)
Åhlfeldt, Rose-Mhari ... (1)
Amouri, Amar (1)
Alaparthy, Vishwa Te ... (1)
Butun, Ismail (1)
Teixeira, André (1)
Hedström, Karin (1)
Magnusson, Lars, 195 ... (1)
Shahmehri, Nahid, 19 ... (1)
Carlsson, Bengt (1)
Päivärinta, Tero (1)
Bacciu, Davide (1)
Gallicchio, Claudio (1)
Quinn, Martin (1)
Tona, Olgerta (1)
Lundgren, Martin (1)
Åhlfeldt, Rose-Mhari ... (1)
Sundberg, Leif, 1980 ... (1)
Törner, Marianne, 19 ... (1)
Cavallo, Filippo (1)
Duma, Claudiu (1)
Magnusson Sjöberg, C ... (1)
Kolkowska, Ella, 197 ... (1)
Chockalingam, Sabara ... (1)
Pieters, Wolter (1)
van Gelder, Pieter (1)
Sarkheyli, Elnaz (1)
Skyvell Nilsson, Mar ... (1)
Tragos, Elias. (1)
Dhillon, Gurpreet (1)
Smith, Kane (1)
visa färre...
Lärosäte
Högskolan i Skövde (6)
Luleå tekniska universitet (4)
Örebro universitet (4)
Linköpings universitet (4)
Stockholms universitet (3)
Jönköping University (2)
visa fler...
Mittuniversitetet (2)
Göteborgs universitet (1)
Kungliga Tekniska Högskolan (1)
Uppsala universitet (1)
Lunds universitet (1)
Malmö universitet (1)
Linnéuniversitetet (1)
Högskolan Dalarna (1)
Blekinge Tekniska Högskola (1)
visa färre...
Språk
Engelska (23)
Svenska (5)
Forskningsämne (UKÄ/SCB)
Samhällsvetenskap (13)
Naturvetenskap (10)
Teknik (1)

År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy