Sökresultat:
18580 Uppsatser om Information security governance - Sida 3 av 1239
Informationssa?kerhetsanalysers verksamhetsnytta : Utva?rdering och fo?rba?ttringsfo?rslag
The importance of good information security and safety grows larger and larger for each day in the information society of today. This concerns citizens, companies and public authorities. At the Swedish Transport Administration, the operation of an information security and safety process has evolved over the years to guarantee that the public authority can be trusted by its citizens, cooperating companies and other public authorities. This responsibility has been assigned to the Information Security and Safety Department (Informationssa?kerhetsavdelningen, ITsa?).In this thesis the aim is to review to what extent ITsa? achieves any business benefits for the Swedish Transport Administration, and to analyze, streamline and come up with solutions to improve their workflow.
Trygghet och trygghetsskapande i arbetslivet
In this paper we examine what security is to the individual and how the individual creates and maintains security in their work. The purpose of this paper is to study how the creating of security in working life is performed. We conduct six semi-structured qualitative interviews with permanent employees in the private sector and we encode our material using thematic analysis. We analyze our material and illustrate our problem area on the basis of Anthony Giddens's theory of ontological security and give examples of how security and creating of security is performed at the empirical field with previous studies in the research area. Our survey shows that security for the individual at work seems to be about having continuity in everyday life, financial stability, a permanent employment, a challenging and fun job and a family in good health and good living.
Restinformation i elektroniska textdokument
Some word processing programs save information that not all users of the program are aware of. This information consists of a number of things. Example of that is who the writer of the document is, the time it took to write it and where on the computer the document is saved. Text that has been changed or removedcan also be saved. This information is not shown in the program and the user will therefore not be aware of its existence.
Global kapitalplacering men nationell bolagsstyrning?: En explorativ studie om valberedningsdeltagandet i svenska börsbolag med fokus på utländska institutionella ägare
[Abstract: This study examines the observed difference between Swedish and foreign owners when it comes to nominating committee participation. The background to the study is that foreign owners seem to participate in Swedish nominating committees to a lesser extent than their Swedish counterparts. The focus is on institutional owners and the companies studied are all listed companies who follow the Swedish code of corporate governance. Particular attention is paid to perceived differences in behavior that can be explained using the common corporate governance related theories of Exit, Voice and Loyalty as well as Agency Theory. These explanations are chiefly related to differences in attitudes regarding insider information, different knowledge levels regarding the purpose and workings of nominating committees of the Swedish kind as well as differences due to home market biases.].
"Jag tycker nog att jag bor på Araby, det är nog alla andra som tycker att jag inte gör det." : - En kvalitativ studie om hur distinktioner påverkar tryggheten
This thesis suggests an explanation for how it is possible for individuals living in an unsafe neighborhood to expressa highlevel of security. Araby is the district in Växjö municipality withthe highest level of insecurity. Within the district, there is acategory of individuals in security-measurements showing a high degree of security. Inhabitants living in house in Araby also seem to show a higher level of security than inhabitants in the same accommodation in other neighborhoods in the municipality.The study's purpose is to understand how individuals belonging to an unsafe neighborhood can experience a high degree of security.Qualitative data were collected from an observation in Araby and from interviews with individuals living in house in the district.Previous research has shown that security in the surrounding area depends on several factors, such as disorders, the degree of social control and personal opinions. Thestudy shows how a distinction to places and people in the district can explain the degree of security.
Styrningsmentalitet i socialt arbete En kritisk diskursanalys av KBT
This study is based on the will to understand the importance of a specific theory within social work. From the concept of neo-liberal governmentality, the aim is to critically examine and discuss how governance and self-governance is manifested in social work methods and interventions, exemplified by the theory cognitive-behavioural therapy (CBT). This will be accomplished through an analysis of:? How governance (and self-governance) is manifested in text through the advocacy of CBT and methods based on CBT.? How (governance and) self-governance is manifested in text through the contents of CBT and methods based on CBT. The study has a deductive approach including the hypothesis that the discourses inherent in social work methods and interventions, exemplified by the theory of CBT and methods based on CBT, may be related to the West?s development of a neo-liberal concept of governance.
Synen på Säkerhet och Immigration : Finns det ett samband?
The aim of this study is to explore howEuropean changes in the view on securityrelates to the view on immigration and viceversa. The answer to that question is basedupon collected data from three separatetime periods; the 1950s, 1970s and 1990s.These time periods are seen as importanthistoric decades when political changes,assumed to have affected the views onsecurity and immigration, have occurred.According to certain criteria each timeperiod has been labelled in terms ofnarrowed/widened view on security as wellas restrictive/open view on immigration.The hypothesis of the study is that, whencompared, a constant pattern can be seenbetween the historical labels of eachphenomenon, where a narrow view onsecurity goes hand in hand with an openview on immigration and similarly a widesecurity view relates to a restrictive viewon immigration.The conclusion of the study gives supportto the hypothesis. During all three periodsstudied a restrictive view on immigrationrelates to a wider view on security while anopen view on immigration relates to anarrower view on security. Thisrelationship goes both ways..
Good Governance: En utvecklingsagenda i Världsbankens regi
Good governance-begreppet introducerades av Världsbanken på slutet av 1980-talet som riktlinjer för hur en stat på bästa sätt skall organiseras och styras för att nå ekonomisk utveckling. Good governance-idealen innefattar bland annat öppenhet, transparens, rättsäkerhet och effektivitet, som sägs uppnås genom åtgärder som liberalisering och decentralisering. Banken har använt sig av konditionalitet då de ställt krav på anpassning till good governance till de länder som ansökt om utvecklingslån. Tidigare har good governance-kriterierna setts som absolut goda och tillämpbara i alla länder, i enlighet med ett best practice-synsätt. Många har kritiserat denna tillsynes förenklade världssyn och hävdat att agendan är alltför ambitiös och att banken bör ta hänsyn till mottagarländernas specifika kontexter för att nå bästa resultat.
Governance Disclosures According to IIRC's Integrated Reporting Framework -Are Annual Reports of Swedish Listed Companies in Line with the Framework?
Background and problem - Integrated reporting is a hot topic today and is predicted to be the future of companies? external reporting. In December 2013 a new framework on integrated reporting was released and one part of the framework concerns governance and how it supports the organization?s value creation. A recent study on integrated reporting in Sweden showed the area of governance to be poorly reported.
ISIT-modellen : Vägledning för att realisera en verksamhets informationssäkerhetsmål
The ISO standard ISO/IEC 17799/SS-627799-2 is a guidance for organizations to realize their information security goals. In spite of this standard, studies show flaws regarding information security in organizations. In particular flaws regarding overall view, knowledge and clear roles and responsibilities have been observed. The ISIT (Information Security Integrated Three level) model and its guidelines, developed in this thesis, help organizations to identify the required processes and procedures as well as the logical process flow. The thesis is based on theoretical studies and a case study within a multinational company.
En jämförelse av krypteringsalgoritmer
Today the Internet is used more and more as a transportation for information.
Much of the information is confidential and should not be read by those not
privileged. To protect the information from unauthorized access cryptography
can be applied. The cryptography algorithms in use today all have their pros
and cons. They are therefore suited for different applications.
Är handdatorer säkra nog för hälso- och sjukvården?
The aim of this report is to discuss computer security in handheld computers and to find out the appropriate security level that must be implemented to be able to use handheld computers within the Swedish healthcare system. Most healthcare centers are using some kind of electronic journals for their patient´s data today, but there are still a number of clinics that are usingthe old paper-system. On a few places in Sweden the use of handheld computers at the clinics has already started, but in the United States the use of handheld computers in the medical area is already widespread and from this we can see a lot of different situations where it is useful and effective to work with handheld computers. The security demands on patient´s journals are high and regulated in both Swedish law and regulations from the National Swedish Board of Health and Welfare. The law does not have any substantial demands, but states that there should be an adequate security level based on the nature of the information and the costs.
En jämförelse av krypteringsalgoritmer
Today the Internet is used more and more as a transportation for information. Much of the information is confidential and should not be read by those not privileged. To protect the information from unauthorized access cryptography can be applied. The cryptography algorithms in use today all have their pros and cons. They are therefore suited for different applications.
ISIT-modellen - Vägledning för att realisera en verksamhets informationssäkerhetsmål
The ISO standard ISO/IEC 17799/SS-627799-2 is a guidance for organizations to
realize their information security goals. In spite of this standard, studies
show flaws regarding information security in organizations. In particular flaws
regarding overall view, knowledge and clear roles and responsibilities have
been observed.
The ISIT (Information Security Integrated Three level) model and its
guidelines, developed in this thesis, help organizations to identify the
required processes and procedures as well as the logical process flow. The
thesis is based on theoretical studies and a case study within a multinational
company.
Internationell fred och säkerhet ur ett genusperspektiv: En diskursiv studie av Säkerhetsrådets resolutioner för kvinnor, fred och säkerhet
The Security Council?s resolution 1325 addressed the major negative impact that armed conflict has on women and children. This in turn complicates the Council?s work on maintaining international peace and security. The resolution therefore highlights women?s rights as participants in peace- and conflict processes.