SwePub
Tyck till om SwePub Sök här!
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "LAR1:his ;pers:(Åhlfeldt Rose Mharie)"

Sökning: LAR1:his > Åhlfeldt Rose Mharie

  • Resultat 1-10 av 90
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Amorim, Joni A., et al. (författare)
  • Awareness and training : Identification of relevant security skills and competencies
  • 2014
  • Ingår i: Engineering Education in a Technology-Dependent World. - Guimarães : INTERTECH. - 9788565992282 - 9788566680287 ; , s. 37-
  • Konferensbidrag (refereegranskat)abstract
    • In order to identify needed skills and competencies for privacy and security, we propose a systematic process that maps privacy and security threats to related controls that are required to prevent, detect or remove such threats. This work suggests how to apply the process, while discussing how games and simulations can be used both to develop the desired behavior and to monitor the current competency level.
  •  
2.
  • Amorim, Joni A., et al. (författare)
  • Privacy and Security in Cyberspace : Training Perspectives on the Personal Data Ecosystem
  • 2013
  • Ingår i: European Intelligence and Security Informatics Conference (EISIC), Proceedings CD. - : IEEE conference proceedings. - 9780769550626 ; , s. 139-142
  • Konferensbidrag (refereegranskat)abstract
    • There is a growing understanding that privacy is an essential component of security. In order to decrease the probability of having data breaches, the design of information systems,  processes  and  architectures  should  incorporate considerations  related  to  both  privacy  and  security.  This incorporation may benefit from the offering of appropriate training. In this way, this paper intends to discuss how to better offer training while considering new developments that involve both multimedia production and the “gamification” of training. The paper suggests the use in conjunction of two frameworks: the EduPMO Framework, useful for the management of large scale projects  that  may  involve  a  consortium  of  organizations developing multimedia for the offering of training, and the Game Development Framework, useful for the identification of the main components of the serious game for training on privacy by design to be developed as part of the training offering.
  •  
3.
  •  
4.
  • Bergström, Erik, 1976-, et al. (författare)
  • Developing an information classification method
  • 2021
  • Ingår i: Information and Computer Security. - : Emerald Group Publishing Limited. - 2056-4961. ; 29:2, s. 209-239
  • Tidskriftsartikel (refereegranskat)abstract
    • Purpose: The purpose of this paper is to develop a method for information classification. The proposed method draws on established standards, such as the ISO/IEC 27002 and information classification practices. The long-term goal of the method is to decrease the subjective judgement in the implementation of information classification in organisations, which can lead to information security breaches because the information is under- or over-classified. Design/methodology/approach: The results are based on a design science research approach, implemented as five iterations spanning the years 2013 to 2019. Findings: The paper presents a method for information classification and the design principles underpinning the method. The empirical demonstration shows that senior and novice information security managers perceive the method as a useful tool for classifying information assets in an organisation. Research limitations/implications: Existing research has, to a limited extent, provided extensive advice on how to approach information classification in organisations systematically. The method presented in this paper can act as a starting point for further research in this area, aiming at decreasing subjectivity in the information classification process. Additional research is needed to fully validate the proposed method for information classification and its potential to reduce the subjective judgement. Practical implications: The research contributes to practice by offering a method for information classification. It provides a hands-on-tool for how to implement an information classification process. Besides, this research proves that it is possible to devise a method to support information classification. This is important, because, even if an organisation chooses not to adopt the proposed method, the very fact that this method has proved useful should encourage any similar endeavour. Originality/value: The proposed method offers a detailed and well-elaborated tool for information classification. The method is generic and adaptable, depending on organisational needs.
  •  
5.
  • Bergström, Erik, 1976-, et al. (författare)
  • Information Classification Enablers
  • 2015
  • Ingår i: Foundations and Practice of Security. - Cham : Springer. - 9783319303024 - 9783319303031 ; , s. 268-276
  • Konferensbidrag (refereegranskat)abstract
    • This paper presents a comprehensive systematic literature review of information classification (IC) enablers. We propose a classification based on the well-known levels of management: strategic, tactical and operational. The results reveal that a large number of enablers could be adopted to increase the applicability of IC in organizations. The results also indicate that there is not one single enabler solving the problem, but rather several enablers can influence the adoption.
  •  
6.
  • Bergström, Erik, 1976-, et al. (författare)
  • Information Classification Issues
  • 2014
  • Ingår i: Secure IT Systems. - Cham : Springer. - 9783319115986 - 9783319115993 ; , s. 27-41
  • Konferensbidrag (refereegranskat)abstract
    • This paper presents an extensive systematic literature review with the aim of identifying and classifying issues in the information classification process. The classification selected uses human and organizational factors for grouping the identified issues. The results reveal that policy-related issues are most commonly described, but not necessarily the most crucial ones. Furthermore, gaps in the research field are identified in order to outline paths for further research.
  •  
7.
  • Bergström, Erik, 1976-, et al. (författare)
  • Information Classification Policies : An Exploratory Investigation
  • 2018
  • Ingår i: Proceedings of the Annual Information Institute Conference. - Washington, DC : Information Institute. - 9781935160199
  • Konferensbidrag (refereegranskat)abstract
    • InfoSec policies are considered a key mechanism in information security, and most organizations have one. However, the large majority of security policy research has focused on what policies should include rather than how they are accomplished in practice. To contribute to overcoming the lack of knowledge regarding this crucial aspect, this paper investigates information security policies based on what underlying approaches information classification practices are built on and the perceived ease of turning the policy into practice. To do so, a survey was sent to 284 Swedish government agencies, and 80 of their internal policies were collected as data. The data were analyzed both qualitatively, and qualitatively. The results show that information classification adoption rates are low despite being mandatory and that agencies are struggling in closing the gap between standards and practice. Furthermore, the results also show that information classification policies need to be more specific and give more actionable advice regarding, e.g., how information life-cycle management is included in practice, and where the responsibility for classification is put in the organization.
  •  
8.
  •  
9.
  • Bergström, Erik, 1976- (författare)
  • Supporting Information Security Management : Developing a Method for Information Classification
  • 2020
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • In the highly digitalised world in which we live today, information and information systems have become critical assets to organisations, and hence need to be safeguarded accordingly. In order to implement and work with information security in a structured way, an Information Security Management System (ISMS) can be implemented. Asset management is a central activity in ISMS that aims at identifying, assigning ownership and adding protection to information assets. One activity within asset management is information classification that has the objective to ensure that the information receives an appropriate level of protection in accordance with its importance to the organisation. Information classification is a well-known practice for all kinds of organisations, both in the private and public sector, and is included in different variants in standards such as ISO/IEC 27002, COBIT and NIST-SP800.However, information classification has received little attention from academia, and many organisations are struggling with the implementation. The reasons behind why it is problematic, and how to address such issues, are largely unknown. Furthermore, existing approaches, described in, for example, standards and national recommendations, do not provide a coherent and systematic approach to information classification. The short descriptions in standards, and literature alike, leave out essential aspects needed for many organisations to adopt and implement information classification. There is, for instance, a lack of detailed descriptions regarding (1) procedures and concepts, (2) how to tailor the approach for different situations, (3) a framework that structures and guides the classification, (4) what roles should be involved in the classification, and (5) how information with different granularity is handled.This thesis aims to increase the applicability of information classification by developing a method for information classification in ISMS that draws from established standards and practice. In order to address this aim, a Design Science Research (DSR) study was performed in three cycles. A wide range of data was collected, including a series of interviews with experts and novices on information classification, a survey, most of the Swedish public sector information classification policies, and observations. There are three main contributions made by this thesis (1) the identification of issues and enablers for information classification, (2) the design principles underpinning the development of a method for information classification, and (3) the method for information classification itself. Contributions have also been made to the context around information classification, such as, for example, 20 practical suggestions for how to meet documented challenges in practice.
  •  
10.
  • Brodin, Martin, et al. (författare)
  • Management issues for Bring Your Own Device
  • 2015
  • Ingår i: Proceedings of 12th European, Mediterranean & Middle Eastern Conference on Information Systems 2015 (EMCIS2015). - : European, Mediterranean & Middle Eastern Conference on Information Systems (EMCIS). - 9789606897085
  • Konferensbidrag (refereegranskat)abstract
    • Bring Your Own Device (BYOD) is an emerging research area focusing on the organisational adoption of (primarily mobile) devices used for both private and work purposes. There are many information security related problems concerning the use of BYOD and it should therefore be considered an issue of strategic importance for senior managers. This paper presents a systematic literature analysis using a BYOD strategic management framework to assess developing research trends. The analysis reveals early work in the analysis and design aspects of BYOD strategies, but a lack of research in operationalizing (planning, implementation and evaluating) strategy – the action phase. The resulting research agenda identifies twelve management issues for further research and four overall research directions that may stimulate future research.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-10 av 90
Typ av publikation
konferensbidrag (49)
tidskriftsartikel (22)
rapport (8)
doktorsavhandling (4)
bokkapitel (4)
licentiatavhandling (3)
visa fler...
visa färre...
Typ av innehåll
refereegranskat (69)
övrigt vetenskapligt/konstnärligt (15)
populärvet., debatt m.m. (6)
Författare/redaktör
Åhlfeldt, Rose-Mhari ... (24)
Söderström, Eva (15)
Wangler, Benkt (10)
Rexhepi, Hanife, 198 ... (10)
Persson, Anne (9)
visa fler...
Cajander, Åsa (9)
Scandurra, Isabella, ... (8)
Huvila, Isto (8)
Moll, Jonas, 1982- (7)
Nohlberg, Marcus (6)
Bergström, Erik, 197 ... (6)
Hägglund, Maria, Lek ... (6)
Huvila, Isto, Profes ... (5)
Fischer-Hübner, Simo ... (5)
Nohlberg, Marcus, 19 ... (5)
Cajander, Åsa, Profe ... (4)
Hägglund, Maria (4)
Perjons, Erik (3)
Martucci, Leonardo, ... (3)
Gustavsson, Per M., ... (3)
Brodin, Martin (3)
Eriksson, Nomie, 195 ... (3)
Eriksson, Nomie (3)
Kharko, Anna (3)
Rexhepi, Hanife (3)
Bärkås, Annika (3)
Iwaya, Leonardo H (3)
Daniels, Mats (2)
Rose, Jeremy (2)
Johannesson, Paul (2)
Backlund, Per (2)
van Laere, Joeri, 19 ... (2)
Kowalski, Stewart (2)
Kane, Bridget (2)
Krasniqi, Hanife (2)
Kävrestad, Joakim, 1 ... (2)
Amorim, Joni A. (2)
Andler, Sten F. (2)
Perjons, Erik A (2)
Eriksson, Nomie, Bit ... (2)
Blease, Charlotte (2)
Anteryd, Fredrik (2)
Lennerholt, Christia ... (2)
Persson, Anne, Profe ... (2)
Scandurra, Isabella (2)
Enwald, Heidi (2)
Hirvonen, Noora (2)
Söderström, Eva, 197 ... (2)
Hagström, Josefin (2)
visa färre...
Lärosäte
Högskolan i Skövde (90)
Uppsala universitet (16)
Örebro universitet (12)
Jönköping University (9)
Karlstads universitet (7)
Kungliga Tekniska Högskolan (5)
visa fler...
Göteborgs universitet (3)
Karolinska Institutet (3)
Stockholms universitet (2)
visa färre...
Språk
Engelska (78)
Svenska (12)
Forskningsämne (UKÄ/SCB)
Naturvetenskap (71)
Medicin och hälsovetenskap (19)
Samhällsvetenskap (15)
Teknik (3)

År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy