SwePub
Tyck till om SwePub Sök här!
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning ""information security" ;spr:eng"

Utökad sökning > "information security" > Engelska

  • Resultat 1-10 av 542
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Information Security : Foundations, technologies and applications
  • 2018
  • Samlingsverk (redaktörskap) (refereegranskat)abstract
    • The rapid advancements in telecommunications, computing hardware and software, and data encryption, and the widespread use of electronic data processing and electronic business conducted through the Internet have led to a strong increase in information security threats. The latest advances in information security have increased practical deployments and scalability across a wide range of applications to better secure and protect our information systems and the information stored, processed and transmitted. This book outlines key emerging trends in information security from the foundations and technologies in biometrics, cybersecurity, and big data security to applications in hardware and embedded systems security, computer forensics, the Internet of Things security, and network security. Information Security: Foundations, technologies and applications is a comprehensive review of cutting-edge algorithms, technologies, and applications, and provides new insights into a range of fundamentally important topics in the field. This up-to-date body of knowledge is essential reading for researchers and advanced students in information security, and for professionals in sectors where information security is required.
  •  
2.
  • Karlsson, Fredrik, 1974-, et al. (författare)
  • Information security culture : state-of-the-art review between 2000 and 2013
  • 2015
  • Ingår i: Information and Computer Security. - : Emerald. - 2056-4961. ; 23:3, s. 246-285
  • Forskningsöversikt (refereegranskat)abstract
    • Purpose – The aim of this paper is to survey existing information security culture research to scrutinise the kind of knowledge that has been developed and the way in which this knowledge has been brought about.Design/methodology/approach – Results are based on a literature review of information security culture research published between 2000 and 2013 (December).Findings – This paper can conclude that existing research has focused on a broad set of research topics, but with limited depth. It is striking that the effects of different information security cultures have not been part of that focus. Moreover, existing research has used a small repertoire of research methods, a repertoire that is more limited than in information systems research in general. Furthermore, an extensive part of the research is descriptive, philosophical or theoretical – lacking a structured use of empirical data – which means that it is quite immature.Research limitations/implications – Findings call for future research that: addresses the effects of different information security cultures; addresses the identified research topics with greater depth; focuses more on generating theories or testing theories to increase the maturity of this subfield of information security research; and uses a broader set of research methods. It would be particularly interesting to see future studies that use intervening or ethnographic approaches because, to date, these have been completely lacking in existing research.Practical implications – Findings show that existing research is, to a large extent, descriptive, philosophical or theoretical. Hence, it is difficult for practitioners to adopt these research results, such as frameworks for cultivating or assessment tools, which have not been empirically validated.Originality/value – Few state-of-the-art reviews have sought to assess the maturity of existing research on information security culture. Findings on types of research methods used in information security culture research extend beyond the existing knowledge base, which allows for a critical discussion about existing research in this sub-discipline of information security.
  •  
3.
  • Bergström, Erik, 1976- (författare)
  • Supporting Information Security Management : Developing a Method for Information Classification
  • 2020
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • In the highly digitalised world in which we live today, information and information systems have become critical assets to organisations, and hence need to be safeguarded accordingly. In order to implement and work with information security in a structured way, an Information Security Management System (ISMS) can be implemented. Asset management is a central activity in ISMS that aims at identifying, assigning ownership and adding protection to information assets. One activity within asset management is information classification that has the objective to ensure that the information receives an appropriate level of protection in accordance with its importance to the organisation. Information classification is a well-known practice for all kinds of organisations, both in the private and public sector, and is included in different variants in standards such as ISO/IEC 27002, COBIT and NIST-SP800.However, information classification has received little attention from academia, and many organisations are struggling with the implementation. The reasons behind why it is problematic, and how to address such issues, are largely unknown. Furthermore, existing approaches, described in, for example, standards and national recommendations, do not provide a coherent and systematic approach to information classification. The short descriptions in standards, and literature alike, leave out essential aspects needed for many organisations to adopt and implement information classification. There is, for instance, a lack of detailed descriptions regarding (1) procedures and concepts, (2) how to tailor the approach for different situations, (3) a framework that structures and guides the classification, (4) what roles should be involved in the classification, and (5) how information with different granularity is handled.This thesis aims to increase the applicability of information classification by developing a method for information classification in ISMS that draws from established standards and practice. In order to address this aim, a Design Science Research (DSR) study was performed in three cycles. A wide range of data was collected, including a series of interviews with experts and novices on information classification, a survey, most of the Swedish public sector information classification policies, and observations. There are three main contributions made by this thesis (1) the identification of issues and enablers for information classification, (2) the design principles underpinning the development of a method for information classification, and (3) the method for information classification itself. Contributions have also been made to the context around information classification, such as, for example, 20 practical suggestions for how to meet documented challenges in practice.
  •  
4.
  • Kolkowska, Ella, et al. (författare)
  • Analyzing information security goals
  • 2012
  • Ingår i: Threats, countermeasures, and advances in applied information security. - : IGI Global. - 9781466609785 ; , s. 91-110
  • Bokkapitel (refereegranskat)
  •  
5.
  • Rocha Flores, Waldo (författare)
  • Shaping information security behaviors related to social engineering attacks
  • 2016
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • Today, few companies would manage to continuously stay competitive without the proper utilization of information technology (IT). This has increased companies’ dependency of IT and created new threats that need to be addressed to mitigate risks to daily business operations. A large extent of these IT-related threats includes hackers attempting to gain unauthorized access to internal computer networks by exploiting vulnerabilities in the behaviors of employees. A common way to exploit human vulnerabilities is to deceive and manipulate employees through the use of social engineering. Although researchers have attempted to understand social engineering, there is a lack of empirical research capturing multilevel factors explaining what drives employees’ existing behaviors and how these behaviors can be improved. This is addressed in this thesis.The contribution of this thesis includes (i) an instrument to measure security behaviors and its multilevel determinants, (ii) identification of multilevel variables that significantly influence employees’ intent for behavior change, (iii) identification of what behavioral governance factors that lay the foundation for behavior change, (iv) identification that national culture has a significant effect on how organizations cope with behavioral information security threats, and (v) a strategy to ensure adequate information security behaviors throughout an organization.This thesis is a composite thesis of eight papers. Paper 1 describes the instrument measuring multilevel determinants. Paper 2 and 3 describes how security knowledge is established in organizations, and the effect on employee information security awareness. In Paper 4 the root cause of employees’ intention to change their behaviors and resist social engineering is described. Paper 5 and 8 describes how the instrument to measure social engineering security behaviors was developed and validated through scenario-based surveys and phishing experiments. Paper 6 and 7 describes experiments performed to understand reason to why employees fall for social engineering. Finally, paper 2, 5 and 6 examines the moderating effect of national culture.
  •  
6.
  • Lundgren, Björn, 1984-, et al. (författare)
  • Defining Information Security
  • 2017
  • Ingår i: Science and Engineering Ethics. - : Springer. - 1353-3452 .- 1471-5546.
  • Tidskriftsartikel (refereegranskat)abstract
    • This article proposes a new definition of information security, the ‘Appropriate Access’ definition. Apart from providing the basic criteria for a definition—correct demarcation and meaning concerning the state of security—it also aims at being a definition suitable for any information security perspective. As such, it bridges the conceptual divide between so-called ‘soft issues’ of information security (those including, e.g., humans, organizations, culture, ethics, policies, and law) and more technical issues. Because of this it is also suitable for various analytical purposes, such as analysing possible security breaches, or for studying conflicting attitudes on security in an organization. The need for a new definition is demonstrated by pointing to a number of problems for the standard definition type of information security—the so-called CIA definition. Besides being too broad as well as too narrow, it cannot properly handle the soft issues of information security, nor recognize the contextual and normative nature of security.
  •  
7.
  • Rocha Flores, Waldo, et al. (författare)
  • Information security knowledge sharing in organizations : Investigating the effect of behavioral information security governance and national culture
  • 2014
  • Ingår i: Computers & security (Print). - : Elsevier. - 0167-4048 .- 1872-6208. ; 43, s. 90-110
  • Tidskriftsartikel (refereegranskat)abstract
    • This paper presents an empirical investigation on what behavioral information security governance factors drives the establishment of information security knowledge sharing in organizations. Data was collected from organizations located in different geographic regions of the world, and the amount of data collected from two countries – namely, USA and Sweden – allowed us to investigate if the effect of behavioral information security governance factors on the establishment of security knowledge sharing differs based on national culture.The study followed a mixed methods research design, wherein qualitative data was collected to both establish the study’s research model and develop a survey instrument that was distributed to 578 information security executives. The results suggest that processes to coordinate implemented security knowledge sharing mechanisms have a major direct influence on the establishment of security knowledge sharing in organizations; the effect of organizational structure (e.g., centralized security function to develop and deploy uniform firm-wide policies, and use of steering committees to facilitate information security planning) is slightly weaker, while business-based information security management has no significant direct effect on security knowledge sharing. A mediation analysis revealed that the reason for the non-significant direct relation between business-based information security management and security knowledge sharing is the fully mediating effect of coordinating information security processes. Thus, the results disentangles the interrelated influences of behavioral information security governance factors on security knowledge sharing by showing that information security governance sets the platform to establish security knowledge sharing, and coordinating processes realize the effect of both the structure of the information security function and the alignment of information security management with business needs.A multigroup analysis identified that national culture had a significant moderating effect on the association between four of the six proposed relations. In Sweden – which is seen as a less individualist, feminine country – managers tend to focus their efforts on implementing controls that are aligned with business activities and employees’ need; monitoring the effectiveness of the implemented controls, and assuring that the controls are not too obtrusive to the end user. On the contrary, US organizations establish security knowledge sharing in their organization through formal arrangements and structures. These results imply that Swedish managers perceive it to be important to involve, or at least know how their employees cope with the decisions that have been made, thus favoring local participation in information security management, while US managers may feel the need to have more central control when running their information security function.The findings suggest that national culture should be taken into consideration in future studies – in particular when investigating organizations operating in a global environment – and understand how it affects behaviors and decision-making. 
  •  
8.
  • Björck, Fredrik, 1972- (författare)
  • Discovering Information Security Management
  • 2005
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • This thesis is concerned with issues relating to the management of information security in organisations, motivated by the need for cost-efficient information security.It is based on the assumption that: in order to achieve cost-efficient information security, the point of departure must be knowledge about the empirical reality in which the management of information security takes place.The data gathering instruments employed are questionnaires with open-ended questions and unstructured research interviews. The empirical material is analysed, and conclusions are drawn following the principles of Grounded Theory. Data sources are professionals in the area of information security management, including information security consultants (n=13), certification auditors (n=8), and information security managers (n=8).The main contributions are: an integrated model illustrating the experts’ perceptions concerning the objectives, actors, resources, threats, and countermeasures of information security management; a framework for the evaluation, formation, and implementation of information security management systems; a new approach for the evaluation of information security in organisations; a set of success factors concerning the formation of information security management systems; and a problem inventory concerning the value and assessment of information security education and training.
  •  
9.
  • Rostami, Elham, 1983- (författare)
  • Tailoring information security policies : a computerized tool and a design theory
  • 2023
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • Protecting information assets in organizations is a must and one way for doing it is developing information security policy (ISP) to direct employees’ behavior and define acceptable procedures that employees have to comply with on a daily basis. However, compliance with the ISP is a perennial problem. Non-compliance with ISPs is at least related to two factors: 1) employees’ behavior, and 2) the design of ISPs. Although much attention has been given to understanding and changing employees’ behavior, designing ISPs that are easy to follow has received less attention. Existing research has suggested designing such ISPs using a tailoring approach where the ISP is designed in several versions that fulfill the needs of different target groups of employees. At the same time, tailoring means increased design complexity for information security managers as the designer of ISPs, where computerized tool can aid. Thus, the aim of this thesis is to develop a computerized tool to support information security managers’ tailoring of ISPs and the design principles that such a tool can be based on. To this end, a design science research approach was employed. Using the knowledge from the Situational Method Engineering field as the kernel theory for the design science research project, a set of design principles and a conceptual model were developed in terms of a Unified Modeling Language class diagram. Subsequently, a web-based software (POLCO) was developed based on the proposed conceptual model to support information security managers to design tailored ISPs. The conceptual model and POLCO were developed, demonstrated, and evaluated as a proof-of-concept in three DSR cycles.The thesis contribute to research and practice by proposing the design principles and the conceptual model that can be considered as: 1) a new theory on how to design ISPs, 2) a way to develop software to assist information security managers in designing tailored ISPs. Meanwhile, POLCO as an artifactual contribution can be considered as a starting point for researchers to do studies in the ISP design area.
  •  
10.
  • Karlsson, Fredrik, 1974-, et al. (författare)
  • Inter-organisational information security : a systematic literature review
  • 2016
  • Ingår i: Information & Computer Security. - : Emerald Group Publishing Limited. - 2056-4961. ; 24:5, s. 418-451
  • Forskningsöversikt (refereegranskat)abstract
    • Purpose: The purpose of this paper is to survey existing inter-organisational information securityresearch to scrutinise the kind of knowledge that is currently available and the way in which thisknowledge has been brought about.Design/methodology/approach: The results are based on a literature review of inter-organisational information security research published between 1990 and 2014.Findings: The authors conclude that existing research has focused on a limited set of research topics.A majority of the research has focused management issues, while employees’/non-staffs’ actualinformation security work in inter-organisational settings is an understudied area. In addition, themajority of the studies have used a subjective/argumentative method, and few studies combinetheoretical work and empirical data.Research limitations/implications: The findings suggest that future research should address abroader set of research topics, focusing especially on employees/non-staff and their use of processes andtechnology in inter-organisational settings, as well as on cultural aspects, which are lacking currently;focus more on theory generation or theory testing to increase the maturity of this sub-field; and use abroader set of research methods.Practical implications: The authors conclude that existing research is to a large extent descriptive,philosophical or theoretical. Thus, it is difficult for practitioners to adopt existing research results, suchas governance frameworks, which have not been empirically validated.Originality/value: Few systematic reviews have assessed the maturity of existinginter-organisational information security research. Findings of authors on research topics, maturity andresearch methods extend beyond the existing knowledge base, which allow for a critical discussionabout existing research in this sub-field of information security.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-10 av 542
Typ av publikation
konferensbidrag (239)
tidskriftsartikel (183)
doktorsavhandling (36)
bokkapitel (22)
annan publikation (17)
licentiatavhandling (16)
visa fler...
forskningsöversikt (11)
rapport (9)
proceedings (redaktörskap) (4)
bok (3)
samlingsverk (redaktörskap) (2)
visa färre...
Typ av innehåll
refereegranskat (429)
övrigt vetenskapligt/konstnärligt (98)
populärvet., debatt m.m. (15)
Författare/redaktör
Yngström, Louise (29)
Karlsson, Fredrik, 1 ... (28)
Kowalski, Stewart (27)
Kävrestad, Joakim, 1 ... (23)
Nohlberg, Marcus, 19 ... (21)
Åhlfeldt, Rose-Mhari ... (20)
visa fler...
Ekstedt, Mathias (19)
Harnesk, Dan (19)
Hedström, Karin, 196 ... (18)
Rocha Flores, Waldo (16)
Lindström, John (15)
Kolkowska, Ella, 197 ... (14)
Johnson, Pontus (13)
Bergström, Erik, 197 ... (13)
Lundgren, Martin (12)
Awad, Ali Ismail (11)
Magnusson, Lars, 195 ... (10)
Söderström, Eva (9)
Kolkowska, Ella (9)
Rostami, Elham, 1983 ... (9)
Torra, Vicenç (8)
Sandkuhl, Kurt, 1963 ... (8)
Holm, Hannes (8)
Gao, Shang, 1982- (8)
Iqbal, Sarfraz, 1979 ... (8)
Iqbal, Sarfraz (8)
Johansson, Erik (7)
Brodin, Martin (7)
Päivärinta, Tero (7)
Åhlfeldt, Rose-Mhari ... (7)
Kajtazi, Miranda, 19 ... (7)
Monfelt, Yngve (7)
Nohlberg, Marcus (6)
Abbas, Haider (6)
Magnusson, Christer (6)
Hemani, Ahmed (6)
Ericson, Åsa (6)
Fischer-Hübner, Simo ... (6)
Lagerström, Robert (6)
Sommestad, Teodor (6)
Dhillon, Gurpreet (6)
Karlsson, Martin, 19 ... (5)
Sabelfeld, Andrei, 1 ... (5)
Boldt, Martin (5)
Islam, M. Sirajul, 1 ... (5)
Russo, Alejandro, 19 ... (5)
Hallberg, Jonas (5)
Thapa, Devinder (5)
Fritsch, Lothar, 197 ... (5)
Lugnet, Johan, 1983- (5)
visa färre...
Lärosäte
Luleå tekniska universitet (88)
Högskolan i Skövde (88)
Kungliga Tekniska Högskolan (81)
Stockholms universitet (62)
Örebro universitet (61)
Jönköping University (46)
visa fler...
Linköpings universitet (39)
Linnéuniversitetet (28)
Lunds universitet (21)
Karlstads universitet (20)
Blekinge Tekniska Högskola (20)
Chalmers tekniska högskola (18)
Uppsala universitet (16)
Göteborgs universitet (13)
Mittuniversitetet (13)
Mälardalens universitet (5)
Malmö universitet (5)
RISE (4)
Försvarshögskolan (4)
Högskolan Kristianstad (3)
Södertörns högskola (3)
Umeå universitet (2)
Högskolan i Halmstad (2)
Högskolan Väst (2)
Högskolan Dalarna (2)
Handelshögskolan i Stockholm (1)
Högskolan i Borås (1)
Karolinska Institutet (1)
VTI - Statens väg- och transportforskningsinstitut (1)
visa färre...
Språk
Forskningsämne (UKÄ/SCB)
Naturvetenskap (307)
Samhällsvetenskap (157)
Teknik (108)
Medicin och hälsovetenskap (11)
Humaniora (5)

År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy