Sökresultat:
18580 Uppsatser om Information security governance - Sida 11 av 1239
En kyrklig organisations informationssäkerhet : Policyimplementation och motivation till efterlevnad av policy
The following study is dedicated to investigate what kind of problems an organisation might stumble upon in the process of implementing a policy related to information security. Alongside investigating the eventual problems occurring in the implementation process of an organisation, the study also sets out to analyse how an organisation can motivate staff in order to follow the guidelines of a policy. The collection of empirical data was done using interviews. In order to seek answers to our research questions a theoretical background is presented that illustrate the need for information security after which motivational theories are applied to our collected data.To summarise the results of the study we find a gap of knowledge between the employees of the organisation. The organisational level of an employee together with the degree of participation in working with a policy seems connected to both the employee?s knowledge of a policy as well as how well the employee are motivated to learn about and follow the guidelines provided from a policy..
Den gemensamma utrikes och säkerhetspolitiken- Ett neo-funktionalistiskt perspektiv
This essay aims to explore the development of the common foreign and security policy within the European Union as well as the recent addition of the post of High representative in the field of the common foreign and security policy. This essay will attempt to achieve this trough exploring the questions; how have the aim of the European foreign policy developed, how the forms of cooperation has within this field developed and finally what impact will the recent addition of a high representative for the common foreign and security have. My aim is to answer these questions with the help of neo-functionalism.The results that came out of this essay point to the direction that the neo- functionalist premise about spill over effects and the notion about increased supranational influence turn out to have some validity in them. The study has shown that during the time the cooperation within the field of foreign and security policy have developed it is possible to see that supranational institutions will gain influence when the scope of integration within a policy area widens and deepens..
FN - i mäktiga staters tjänst En studie av hur FN påverkas av mäktiga stater
The United Nations is an important organization when it comes to international peace and security. Recent events in international politics, however, have brought about a widespread concern about the abilities of the organization. Powerful states have shosen to act outside of the organization to achieve their goals. They have furthermore a disproportionate influence on the decision-making body, the Security Council.The aim of this essay is to examine wheather UN can function productively as keeper of the international peace and security in the political climate of today, and to find out to what extent the powerful states harm the organization. I use a theoretical article, concerning states relations to international organisations, to analyse the acts of powerful states in UN.
Personuppgifteshantering och identifiering inom myndighet, skola och förtag
The authors of this thesis have studied the handling of personal information in various kinds of organizations, because the perception is that the knowledge in this area is weak relative to the weight of the subject.The purpose of this paper has been partly to shed light on how knowledge of this area in the organizations that we have visited during the study but also to answer questions about handling, knowledge and security, and identification of individuals in different systems. What kind of problems the processing of these data creates and why these problems occur.In the beginning of our study we understood the importance of using the correct identifier and therefore chose also to examine what the various identifiers used by the organizations and why they chose these particular identifiers.In the qualitative analysis, Datainspektionen´s general rules and advice has been used as a basis together with the laws applicable to the organizations to get a good picture of how management of personal information is in these organizations.What we have found in this paper is that knowledge about how personal data is handled and what laws and rules are saying is very much dependent on how central the information is to these organization's activities. The police use so many different types of records for their organization to function well and they have very good knowledge of laws and regulations. In contrast, schools that do not handle as much of personal data themselves nor have the same knowledge among staff and do not have enough resources to cope with keeping the same knowledge base as the police. This is something that applies to all types of handling, depending on how important the information is for the organization, the better the security and knowledge in handling the data is..
Stationsområde i Landskrona - En studie om exploateringen av jordbruksmark, stadsutveckling och stadsstyre med Landskronas stationsområde som exempel
In this essay a proposal of city renewal is made for the new train station area
built on highly productive agricultural land in Landskrona. The proposal is
based on how the situation for the agricultural land in terms of exploitation
looks like today and also on theories of urban governance to find out why the
area turned out the way it did..
En undersökning i datasäkerhet för hemanvändare : Är det nödvändigt att använda brandvägg?
The emphasize of this study is to evaluate security issues for home users having a personal computer connected to the Internet. It focus on the usage of advantages and disadvantages when using a firewall while connected to the Internet. The hypothesis is that it gives a better protection to install and use a firewall compared not to do so, due to security flaws in the operating system. The prediction was tested on a home user's personal computer. The testwork was divided into two major tests, each of them performed with, respectively without, a firewall.
Distriktssköterskans möte med föräldrar som ställer sig tveksamma till MPR-vaccination
Vaccination as a part of the preventative public health project has for many years been one of the important tasks of the children's health care. The vaccination program has been adjusted to current research and the health situation in the country. Having their children vaccinated is not something obvious for all parents, though. Especially the vaccination against measles, whooping cough and German measles have been questioned. The purpose of this literature study was to investigate the reasons for the resistance to vaccinate and to illuminate the security creating advice of the nurse at the public health centre.
Somaliska pirater - ett mycket litet problem: En undersökning av Sveriges arbete gällande frågan om somaliska pirater under 2009-2010.
During 2009-2010 Sweden participated in an international military operation whose intention, according to the Swedish news media, was to fight Somali pirates. The purpose of this thesis is to study various decisions and documents behind the Swedish efforts, both military and foreign aid, regarding the matter of Somali pirates during the years 2009-2010 and analyze the results using an interpretation of the security-development-nexus-theory. The method used is text analysis based on the hermeneutic idea of understanding and interpretation.The thesis studies the international resolutions and national decisions that lead to the military operations in the Gulf of Aden and also the international strategies and national approaches regarding Sweden's assistance in the development of Somalia. The theoretical section contains an interpretation of the vast security-development-nexus-theory. The concepts of security and development are first presented separately and then collectively in terms of military security, societal security, economic security, regime security and human security.
Går incitamentsprogram och Corporate Governance ihop? : en fallstudie av Skandias incitamentsprogram
Syftet med detta examensarbete var att undersöka vilka faktorer som påverkat acceptansen hos användare, inom den kommunala verksamheten, vid införande av ett datoriserat system. Med acceptans menas att användarna ska kunna utföra sina arbetsuppgifter på ett bra och lätt sätt. Studien har gjorts utifrån användarnas perspektiv.Genom att genomföra en intervjuundersökning på ett flertal kommuner där användarna använder systemet Vabas/Duf, har undersökts hur användarnas upplevda acceptans påverkas av faktorerna delaktighet, användbarhet och lättanvändhet, vid införande av ett datoriserat system. Delaktigheten vid införandet av ett system innefattar även information och utbildning.Resultatet från undersökningen visade att delaktigheten ökade användarnas acceptans. Ingen avgörande slutsats kunde däremot dras mellan acceptans och faktorerna användbarhet och lättanvändhet, då resultatet från de båda grupperna inte visade någon märkbar skillnad..
Svensk Kod för Bolagsstyrning : En förtroendeskapande åtgärd?
After a series of corporate scandals around the world the trust in the business world was damaged, probably most in the United States but also in Sweden. Voices were raised for an increase in the openness and insight into the affairs of the company whereupon different corporate governance codes were developed in a majority of countries. A Swedish corporate governance code was issued in December 2004 with the purpose to re-establish the damaged trust for the companies and the business world. The Swedish code was accepted by the Stockholm Stock Exchange as an exchange rule for A-listed and larger O-listed companies as of July 2005. The purpose of this essay is to study how the Swedish corporate governance code in fact leads to an increase in trust in the stock market and to study the companies? attitudes towards this code.To fulfil the purpose of this essay, the authors have carried out a survey among the concerned companies where the companies? attitudes towards the Swedish code were collected.
IT-säkerhet i små organisationer
IT- och informationssäkerhet är ett ständigt aktuellt ämnesområde. ITsäkerhetsarbetei små organisationer framstår som ett underforskat område. Föratt göra en kartläggning av hur arbete med risk, hot och säkerhet kan se ut i småorganisationer har vi genomfört en explorativ intervjustudie med representanterför små organisationer om deras arbete med IT- och informationssäkerhet. Vihar dessutom genomfört intervjuer med experter på området för att få ettbredare perspektiv. Tolkningen och analysen av intervjusvaren har utförtsgenom att först tolka svaren utifrån Security Controls och därefter analyserasvaren utifrån fem temaområden som vi funnit i materialet.
Framtagning av en förebyggande åtgärd mot kriminalitet vid lastbilstransporter
Boberg at Scania CV AB. The purpose was to investigate the technical and customer oriented possibilities for the development of a transport security measure against cargo crime, which is a growing problem in Europe. The main goal was to develop a concept that is possible to implement in the Scania CV AB Fleet Management System. Another goal was to develop a security model that will be used as a tool during Scania CV AB?s future development projects of transport security concepts.The work was divided into three main parts: a background study, handling cargo crime, transport security Scania CV AB trucks and market analysis, a stakeholder investigation including a questionnaire and interviews, and a concept development session.
HAVECA-modellen - En metod för att fortlöpande säkra ett internt nätverk mot tredjepart
This thesis will address a problem concerning availability of information
systems at an enterprise within the financial sector and its external
suppliers, so called trusted third party. The information system resides on the
internal network of the enterprise and must be available to both employees of
the enterprise and the trusted third party simultaneously. This contradicts the
company policy which
disallows third parties access to the internal network. The HAVECA-model
introduced in this thesis provides a framework of methods, each solving a sub
problem identified in the model. The identified methods are hardening,
verification, control and assurance, together supplying a method for
continuously securing the internal network against a trusted third party.
Terapiträdgårdens växtmaterial
This report discusses the IT archetypes "governance strategy" and how it could be linked to the IT benefits at the company. The study is based on IT investments that have taken place in ten banks operating in Sweden today, where the reality was modeled on the basis of a questionnaire survey and an additional interview. The aim was to examine whether it is possible to find any correlation between the governance in the banks and obtained benefits for an IT investments.While the competition is intensifying in most companies there is a greater demand for efficiency in IT. The need for IT solutions is greater than ever and the number of IT investments is increasing significantly in most workplaces today, especially on banks. But even if the investments are increasing in numbers it does not necessarily mean that all types of investments are effective and beneficial to the company.
En studie av zero knowledge-identifikationsprotokoll för smarta kort
Zero knowledge protocols is a lesser known type of protocol that can be used for identification. These protocols are especially designed not to reveal any information during an identification process that can be misused later on, neither by the one who should be convinced of the identity of the user, nor by anyone else that is eavesdropping. Many of these protocols are also especially designed for implementation in smart cards. The more common type of card with a magnetic stripe has during the last few years become more susceptible to attacks since they are easily copied. Smart cards combined with a secure identification protocol has been predicted to be the solution to this problem.