• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 115
  • 46
  • 44
  • 22
  • 21
  • 12
  • 10
  • 10
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 1
  • Tagged with
  • 324
  • 324
  • 102
  • 68
  • 67
  • 64
  • 61
  • 60
  • 60
  • 57
  • 56
  • 40
  • 40
  • 40
  • 34
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
71

Managing IT Security In Organizations : A look at Physical and Administrative Controls

Asmah, Gilbert Yaw, Baruwa, Adebola Abdulrafiu January 2005 (has links)
<p>Introduction</p><p>Information technology security or computing system security is one of the most impor-tant issues that businesses all over the world strive to deal with. However, the world has now changed and in essential ways. The desk-top computer and workstation have appeared and proliferated widely. The net effect of all this has been to expose the computer-based information system, i.e. its hardware, its software, its software processes, its databases, its communications to an environment over which no one—not end user, not network admin-istrator or system owner, not even government—has control.</p><p>Purpose</p><p>Since IT security has a very broad spectrum and encompasses a lot of issues, we want to focus our research by taking a critical look at how business organizations manage IT secu-rity with specific emphasis on administrative and physical controls.</p><p>Methods</p><p>When the authors of this paper approached the topic to be studied it soon became evident that the most relevant and interesting task was not merely to investigate how business and non business organizations manage their IT security, but in fact try to understand what lies behind them. The purpose of this paper demands a deeper insight of how organizations address the issue of computer security; the authors wanted to gain a deeper understanding of how security issues have been addressed or being tackled by the organizations. Thus, the qualitative method was most suitable for this study.</p><p>Conclusion</p><p>Based on the chosen approach, the result of this study has shown that both business and non-business organizations located in Jönköping recognize the importance of IT security, and are willing to protect their systems from threats such as unauthorized access, theft, fire, power outage and other threats to ensure the smooth running of their systems at all times.</p>
72

Nord-Koreas kjernefysiske prøvesprengning : utvikling og vurdering av rasjonalistiske forklaringer på hvorfor Nord-Korea prøvesprengte høsten 2006 /

Horgen, Erik Herstad. January 2007 (has links) (PDF)
Hovedopgave. / Format: PDF. Bibl.
73

Handelshinder som policy. Exportkontrollens effektivitet och påverkan på Sveriges handel med krigsmateriel 1984-2010 kopplat till policyutveckling. / Restriction to Trade as Policy. Effect and Impact of Trade Barriers on Swedish Arms Exports 1984-2010 connected to Policy Development.

Fjellman, Jonas January 2015 (has links)
The purpose of this thesis is to analyze the regulatory power, efficiency and impact of export control on Swedish arms export from the 1980s onwards, linked to the delegation of authority of permit license to the Inspectorate of Strategic Products in 1997. An increase in the administrative sector, based on a collective decision making process and established criteria and guidelines, aimed to strengthen the control of arms export to non-democratic and problematic states. In short, the aim of the study is to investigate and analyze whether there was a decrease in the arms export to problematic states or not. On one hand, it is reasonable to assume that the introduction of the new regulation entailed a more strict arms export policy. However, previous research has showed that regulations are sometimes not effective since incentives to breach these may be present. The study begins by examining the Swedish case and situation in terms of arms manufacturing and export, as well as the delegation of authority and legislation applied to the field over time. The general conclusion is that the legislature regulations and guidelines are vague in their design, as well as outdated, accompanied by the fact that new concepts, terms and classifications are introduced. The statistics are then approached by way of the analysis of the volume and composition of the trade and of the number and shares of problematic export in relation, based on the classifications of recipients regarding political freedoms and democratic rights. Finally, a correlation analysis is conducted and shares of problematic export is compared with the total arms export over time in order to interpret development. The results indicate that the delegation of authority regarding permit licensing to the Inspectorate of Strategic Products has not led to a decrease in the numbers of disputed shares. What is more, the study demonstrates that the delegation has led to a decrease in the responsibility concerning the arms export authority that can be correlated to the continuous high levels of disputed export, which might be approved. The existence of generic guidelines that are open to interpretation combined with an outdated set of legislature, plays a large role in this.
74

New Perspectives on Implementing Health Information Technology

Sarkar, Sumantra 24 July 2014 (has links)
The importance of studying challenges in implementing information technology solutions in health care organizations is highlighted by the huge investments in health care information technology (HIT) which has been spurred by recent government mandates. Information technology can help improve health care delivery cost by facilitating the standardization of work processes or routines and reducing variations among them. Set in a premier 950+ bed hospital in the south eastern part of US, this dissertation consists of two studies examining the challenges involved in implementing HIT solutions. In the first study, we seek to gain deep insights into how the process of creating a patient’s chart evolves over time in a health care institution. The second study focuses on the users of Electronic Health Records (EHR) system, investigating the compliance behavior of various providers with respect to patient records in the system. In the first study, through the lens of Activity theory our results show that the charting routine is implicated by the following environmental factors: (1) Tools, (2) Rules, (3) Community, and (4) Roles, and by individual factors: (5) Computer Self-Efficacy and (6) Risk Propensity. In the second study, our results indicate that there is a substantial effect of subculture of the different occupational groups on IT security compliance intent and behavior in a health care institution.
75

Wider die machtpolitische Resozialisierung der deutschen Außenpolitik / Countering Germany’s Realpolitik Re-Socialisation : a Plea for Offensive Idealism

Hellmann, Gunther January 2004 (has links)
German foreign policy is in the midst of a far-reaching transformation. Contrary to disciplinary expectations, this process is neither properly captured by descriptions in the liberal tradition („Europeanisation“, „Civilian Power“) nor by Realist expectations that Germany is doomed to „remilitarise“ and/or „renationalise“. However, the key term of foreign policy discourse, „normalisation“, is an unmistakable code, signalling a rediscovery of traditional Realpolitik practices which fit Germany’s current environment. The paper argues that rather than merely playing the role of an obedient disciple of Realpolitik socialisers, Germany ought to rehabilitate the foreign policy tradition of the Bonn Republic in support of an active Idealpolitik transformation of its environment. The article serves as a starting point for a debate on German foreign policy in the upcoming issues of WeltTrends.
76

Cometh the 'hour of Europe', cometh the institutions? : coherence and effectiveness of the EU's common foreign and security policy in Bosnia and Herzegovina (1991-2006)

Juncos Garcia, Ana E. January 2007 (has links)
Problems of coherence and effectiveness have been repeatedly mentioned by external observers as affecting European Union (EU) external action. A theory-based explanation of this state of affairs is, however, lacking in the literature. This thesis aims to address this lacuna by focusing on a particular aspect of EU external action, the Common Foreign and Security Policy (CFSP), and by analysing CFSP actions in Bosnia and Herzegovina (BiH) throughout the period 1991-2006. Its primary goal is to determine which factors explain different degrees of coherence and effectiveness, and, in particular, whether or not, increasing CFSP institutionalisation has promoted coherence and effectiveness. After introducing the concepts of coherence and effectiveness, the thesis sketches the political and academic debate surrounding these concepts, and three key explanatory factors are singled out: interests, identities and institutions. The latter is taken as a starting point for analysis. Drawing on a historical institutionalist theory, it explores the CFSP institutionalisation and examines how the development of institutions, path dependency, unintended consequences , learning and socialisation have affected CFSP coherence and effectiveness over time. Furthermore, it aims to find out whether changes in institutions have facilitated convergence of Member States' interests regarding EU policy towards BiH, as well as the development of the EU's broader international role. The thesis then proceeds to investigate CFSP activities in BiH, analysing coherence and effectiveness in eight case studies. It concludes that CFSP institutionalisation has partially increased levels of effectiveness over the period 1991-2006. As for coherence, greater institutionalisation has resulted in some problems of coherence in the short term, but leaming has been a significant factor correcting these in the medium and long term. While path dependency has resulted in problems of coherence and effectiveness, socialisation processes have been important in facilitating consensus among the Member States. Finally, CFSP institutionalisation is seen as having had an impact on the EU's international role moving it from a civilian to a normative power, willing to resort to military instruments when necessary.
77

Raising the information security awareness level in Saudi Arabian organizations through an effective, culturally aware information security framework

Alkahtani, Hend K. January 2018 (has links)
The focus of the research is to improve the security of information systems in Saudi Arabian knowledge-intensive organisations by raising the awareness level among all types of information system users. This is achieved by developing a culturally aware information security framework that requires the involvement of all types of information system user. Saudi Arabia has a unique culture that affects the security of information systems and, hence, the development of this information security framework. The research uses Princess Nora bint Abdul Rahman University (PNU), the largest all female university in Saudi Arabia, as a case study. The level of information security awareness among employees at Saudi Arabia Universities was tested. Surveys and interviews were conducted to gather data related to the information security system and its uses. It was found that most employees in Saudi Arabian organisations and universities are not involved in the development of any information security policy and, therefore, they are not fully aware of the importance of the security of information. The purpose of this study is to develop a cultural aware information security framework that does involve all types of employees contributing to the development of information security policy. The framework, consists of nine steps that were adapted, modified and arranged differently from the international best practice standard ISO 27K framework to fit the unique culture in Saudi Arabia. An additional step has been added to the framework to define and gather knowledge about the organisations population to justify its fit into the segregated working environment of many Saudi Arabian institutions. Part of the research objective is to educate employees to use this information security framework in order to help them recognise and report threats and risks they may encounter during their work, and therefore improve the overall level of information security awareness. The developed information security framework is a collection of ISO 27k best practice steps, re-ordered, and with the addition of one new step to enable the framework to fit the situation in Saudi Arabian segregation working environments. A before-assessment methodology was applied before the application of the culturally aware information security policy framework between two universities, Imam University which has ISO27K accreditation and PNU, the case study, to measure and compare their users information security awareness level. Then, an after-assessment methodology is used to demonstrate the framework effectiveness by comparing the level of awareness before the application of the culturally aware information security policy framework with the level of the awareness knowledge gained after the application.
78

Peer-to-peer : time to lock the door

Petersson, Linus January 2002 (has links)
Is a regulating policy concerning peer-to-peer applications required so that companies and institutions can better manage the security issues of internal peer-to-peer applications? There is high security and privacy risks involved when using p2p applications like KaZaA, Bearshare, Audiogalaxy and ICQ. With the high speed networks of today it is very important to really know what is going on in your network and which applications is doing what and with whom. If not, there are high possibilities that your system will be used for more or less malicious purposes. Therefore it is interesting to find out if p2p applications have found their way behind company walls. A policy can prevent the issues discussed either by banning employees from using p2p applications or by regulate the use of these applications in a very detailed manner. The implementation of a policy makes the usage controlled and easily supervised by the company security staff. Implementing a policy that regulates the use of p2p applications can prevent possible attacks on the company/organisation network.
79

Informationssäkerhetspolicy och Säkerhetsmedvetenhet : En undersökning av kommunala förvaltningars praktiska arbete med att uppnå informationsäkerhet

Malis, Johanna, Falck, Josette January 2016 (has links)
No description available.
80

Håller den svenska militära alliansfriheten på att urholkas? : En studie av Idéer i aktuell svensk utrikes- och säkerhetspolitisk debatt

Lundgren, Evelina January 2017 (has links)
The main purpose of this thesis was to analyze how Swedish political parties describe and frame Swedish foreign and security policy in the parliament debates from year 2015- 2017. The aim of the thesis was therefore to understand and concretize ideas politicians hold on the question of the Swedish non- military alignment policy. By extracting ideas from theories of international relations; realism, liberalism, constructivism and feminism the Swedish parties are being analyzed according to worldview, view of international actors, security issues and goals to achieve by the Swedish state in foreign policy matters. The analyze shows that politicians that had a realist view of foreign matters was in general more pessimistically oriented. Politicians with a liberal view was a bit more positively oriented towards both the world and also towards international cooperation. The politicians within liberal views also promoted a Swedish membership in NATO. Politicians with a constructivist and feminist view on foreign policy matters had a more optimistic view towards the world but also the states and organizations in it. They also promoted non- violence tools, diplomacy and negotiations above a NATO membership to secure the Swedish state, its people and interests. The second aim of the thesis was to discuss whether the Swedish military non- alignment policy is currently moving towards a change or reevaluation based on the behavior by the Swedish government. This raises questions about whether a foreign policy only exists in terms of words or also in terms of actions made by politicians as well.

Page generated in 0.0708 seconds