• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 10
  • 2
  • 1
  • 1
  • Tagged with
  • 21
  • 21
  • 8
  • 5
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Institutionalization of Information Security: Case of the Indonesian Banking Sector

Nasution, Muhamad Faisal Fariduddin Attar 10 May 2012 (has links)
This study focuses on the institutionalization of information security in the banking sector. This study is important to pursue since it explicates the internalization of information security governance and practices and how such internalization develops an organizational resistance towards security breach. The study argues that information security governance and practices become institutionalized through social integration of routines and system integration of relevant technologies. The objective is to develop an understanding of how information security governance and practices in the Indonesian banking sector become institutionalized. Such objective is built on an argument that information security governance and practices become institutionalized through social integration of routines and system integration of relevant technologies. Pursuing this study is necessary to conceptualize the incorporation of security governance and practices as routines, the impact of security breaches on such routines, and the effects of a central governing body on such routines altogether. Accordingly, the concept of institutionalization is developed using Barley and Tolbert’s (1997) combination of institutional theory and structuration theory to explain the internalization of security governance and practices at an organizational level. Scott’s (2008) multilevel institutional processes based on institutional theory is needed to elaborate security governance and practices in an organization-to-organization context. The research design incorporates the interpretive case-study method to capture communicative interactions among respondents. Doing so provides answers to the following research questions: (1) how institutions internalize information security governance and practices, (2) how an external governing body affects the institutionalization of information security governance and practices in institutions, and (3) how security breaches re-institutionalize information security governance and practices in institutions. Several important findings include the habitualized security routines, information stewardship, and institutional relationship in information-security context. This study provides contributions to the body of literature, such as depicting how information security becomes internalized in an organization and the interaction among organizations engaged in implementing information security.
12

Personal identity and the police occupation in South Africa

Faull, Andrew Gordon January 2015 (has links)
This thesis explores the question, 'Who do South African police officers think they are and how does this shape police practice?' Based on eight months of ethnographic fieldwork in Cape Town and the Eastern Cape province of South Africa in 2012/13, it is an exploration of the deep-seated perceptions, stories and imaginings that South African Police Service (SAPS) officers have of themselves, their occupation and their country, in the early twenty-first century. It unpacks how officers’ individual narratives shape, and are shaped by organisational narratives and forces, and how this interplay influences police practice in an unequal and violent young democracy. The thesis suggests that a job in the SAPS is primarily just that, a job. It is a means to strive and survive in a country saturated in vulnerability and risk. Most officers join the organisation after other dreams have slipped out of reach. Once recruited they re-write their self-narratives to accommodate their new circumstances. Recruited from lineages long-oppressed, the meaning and income the job brings to their lives is usually more important to them than the work they carry out. As a result, they seek first to please their institutional overseers and ease the pressure of the job. This is achieved by enacting institutional performances that promote the idea that the SAPS is a rational, effective, evidence-based and rule-bound organisation made of up well trained officers performing common-sense crime prevention tasks, while hiding the darker side of police work. Using carefully choreographed performances, the SAPS and its officers present a strategically crafted façade behind which individual officers strive to secure their sense of self. When the façade is challenged, some resort to violence in an attempt to garner the respect they seek.
13

Sensitising Urban Transport Security : Surveillance and Policing in Berlin, Stockholm, and Warsaw

Svenonius, Ola January 2011 (has links)
The city as a focal point of both domestic and international security policy is characteristic of the 21st century security landscape in Europe. Amidst the 'War on Terror' and the pan-European battle against organised crime, the city is the location where global processes are actually taking place. Urban security is the local policy response both to such global threats as terrorism and local ones, such as violent crime. Public transport systems in particular came under threat after the terrorist attacks in the United States in 2001, Madrid in 2004, and London in 2005. This doctoral thesis studies security policy in three public transport systems – Berlin, Stockholm, and Warsaw – from a comparative perspective focusing on the conditions that made new and very specific understandings of security possible. The study argues that urban transport security has undergone radical changes during the last ten years. While transport authorities and the police used to conceive security as related solely to crime rates, today the focus of security practices consists of passengers' perceptions. The study shows how this shift is paralleled by a new discourse of 'security as emotion', and how it came into being. It concentrates specifically on the central role that surveillance and private policing assumes as the security policy shifts objectives to the inner life of the passengers. Today, complex governance networks of both public and private actors manage security in the three cities. The analysis shows how passengers are constructed in the urban security policy as children, consumers, and citizens. These different 'roles' constitute the passenger in the eye of urban security governance characterised by technocracy, 'friendly security', and individual responsibility. The introduction of new governance models for public administration, the legacy of European communist regimes, and rising fear of crime are central conditions for this new, sensitised urban transport security.
14

Shaping information security behaviors related to social engineering attacks

Rocha Flores, Waldo January 2016 (has links)
Today, few companies would manage to continuously stay competitive without the proper utilization of information technology (IT). This has increased companies’ dependency of IT and created new threats that need to be addressed to mitigate risks to daily business operations. A large extent of these IT-related threats includes hackers attempting to gain unauthorized access to internal computer networks by exploiting vulnerabilities in the behaviors of employees. A common way to exploit human vulnerabilities is to deceive and manipulate employees through the use of social engineering. Although researchers have attempted to understand social engineering, there is a lack of empirical research capturing multilevel factors explaining what drives employees’ existing behaviors and how these behaviors can be improved. This is addressed in this thesis. The contribution of this thesis includes (i) an instrument to measure security behaviors and its multilevel determinants, (ii) identification of multilevel variables that significantly influence employees’ intent for behavior change, (iii) identification of what behavioral governance factors that lay the foundation for behavior change, (iv) identification that national culture has a significant effect on how organizations cope with behavioral information security threats, and (v) a strategy to ensure adequate information security behaviors throughout an organization. This thesis is a composite thesis of eight papers. Paper 1 describes the instrument measuring multilevel determinants. Paper 2 and 3 describes how security knowledge is established in organizations, and the effect on employee information security awareness. In Paper 4 the root cause of employees’ intention to change their behaviors and resist social engineering is described. Paper 5 and 8 describes how the instrument to measure social engineering security behaviors was developed and validated through scenario-based surveys and phishing experiments. Paper 6 and 7 describes experiments performed to understand reason to why employees fall for social engineering. Finally, paper 2, 5 and 6 examines the moderating effect of national culture. / <p>QC 20160503</p>
15

Norms and non-governmental advocacy on conventional arms control : dynamics and governance

Anders, Nils H. January 2009 (has links)
Clear changes occurred in the field of conventional arms control in the last two decades. States adopted a multitude of norms on especially small arms control in various multilateral control instruments. In addition, non-governmental advocacy actors often established themselves as active participants in control debates with governments. The changes are surprising because they took place in the security sphere and therewith in an area traditionally understood to be the exclusive domain of governments. This research project investigates the significance of the changes for the traditional understanding of security governance. Specifically, it investigates the emergence of control norms and the role and policy impact of non-governmental actors in the promotion of the norms. It asks whether the normative changes and significance of nongovernmental actors therein challenge the understanding of security governance that underpins many established approaches to international relations theory.
16

東北亞非傳統安全議題: 以中國及日本為例 / Governance in Northeast Asia in non-traditional security: focused on China and Japan

菲莉卡, Filipova Monika Unknown Date (has links)
這碩士論文的目的是研究非傳統安全問題在東北亞地區安全困境發揮作用的程度和意義,並了解正式和制度化安全管理,在該地區連續失敗背後的原因筆者在以下研究中列出多個任務,包括了以下主要目標提供一個非傳統安全問題的全面,但簡化的概念附著到該地區的安全困境,並威脅其穩定性;提供一個具體的非傳統安全的情況下,研究基於政策的分析選定的國家,從而來了解和承認它的意義. / The purpose of this master thesis is to study the degree and significance of role played by unconventional security problems in the Northeast Asian security dilemma and understand the reason behind continuous failures to formalize and/or institutionalize security governance in the region. The author in the following research sets out multiple tasks, which include the following principal goals: provide a comprehensive but simplified conception on non-traditional security issues adherent to the region’s security dilemma and threatening its stability; offer a concrete case-study of unconventional security based on policy-analysis of selected countries, which helps to understand and acknowledge its significance; analyze instititionalism against the backdrop of Northeast Asia’s specificity concerning the lack of strictly formal organizations; and last but not least develop an idea of how and whether cooperation in non-traditional security issues can lead to the improvement of security governance in the region.
17

Styrning av informationssäkerhet vid hemarbete : En fallstudie om styrning av informationssäkerhet i förhållande till hemarbete / Governance of information security in a work from home context : A case study on information security governance relative to working from home

Palmgren, Patrik, Schylström, Per January 2021 (has links)
Under Covid-19-pandemin har organisationer med hjälp av digitaliseringen genomgått en omställning från kontorsarbete till hemarbete i en större utsträckning än tidigare. Förflyttningen av personal till hemmet och nya kommunikationskanaler har lett till en ökad hotbild gentemot organisationer och dess medarbetare som arbetar med känslig information. Höga krav ställs därför på en god informationssäkerhetsnivå inom organisationer, vilket kräver ett systematiskt styrningsarbete av informationssäkerhet. En nyckelfaktor i efterlevnaden av organisationers regler för informationssäkerhet är tydlig kommunikation och utbildning i syfte att öka medvetenheten och förmågan hos medarbetarna i organisationen. Genom en kvalitativ ansats beskriver denna fallstudie hur olika medarbetare som arbetar hemifrån kan uppleva informationssäkerhet och hur en organisation kan arbeta med styrning av informationssäkerhet i samband med att medarbetarna arbetar hemifrån. Studien presenterar också likheter och skillnader som finns mellan dessa två perspektiv. Vi har genomfört åtta intervjuer med olika personer från en fallorganisation som har flyttat större delen av sin arbetsstyrka från arbetsplatsen till hemmet.  Studiens resultat är att efterlevnaden av informationssäkerhet är beroende av en organisations kultur och personalens säkerhetsmedvetande. Motivationsfaktorer för att följa regler för informationssäkerhet har i fallet följt delarna i Protection Motivation Theory och Fogg Behavior Model. Vi ser också att borttagandet av sociala kontakter och påminnelser försvårar för medarbetare att arbeta på ett informationssäkert sätt och för organisationen att påverka sina medarbetare. Vidare är också avsaknaden av kontroll vid utbildning och kommunikation en faktor som är organisationen inte har åtkomst till, detta är ett problem då det försvårar för en organisation att bygga en bild över medarbetarnas kompetens. Insatser för att öka medvetenheten om informationssäkerhet bör ske löpande och det ska vara enkelt för medarbetaren att göra rätt och hitta väsentlig information. / During the Covid-19 pandemic, organisations have shifted from office work to work at home to a greater extent than before with the help of digitalisation. The shift of staff to the home and new communication channels have led to an increased threat to organisations and their employees working with sensitive information. High standards of information security are required within organisations, which calls for great governance efforts regarding information security. Clear communication and training to increase the awareness and capability of employees in the organisation is a key factor in ensuring compliance with the organisation's information security rules. Through a qualitative approach, this case study describes how different employees working from home experience information security efforts and how an organisation can work on information security governance. The study also presents similarities and differences that exist between these two perspectives. We conducted eight interviews with different people from different parts of an organisation that has moved most of its workforce from the workplace to their home.  The findings of the study are that compliance with information security is dependent on an organisation's culture and the security awareness and ability of its staff. Motivational factors for information security compliance in the case followed the elements of Protection Motivation Theory and Fogg's Behavior Model. We also see that the removal of social contacts and reminders makes it more difficult for employees to work in an information-secure manner and for the organization to influence its employees. Furthermore, the lack of control in training and communication is also a factor that is not accessible to the organisation, this is a problem as it makes it difficult for an organisation to build a picture of the competence of its employees. Efforts to raise awareness of information security should be ongoing and it should be easy for employees to do the right thing and find essential information.
18

Norms and non-governmental advocacy on conventional arms control : dynamics and governance.

Anders, Nils H. January 2009 (has links)
Clear changes occurred in the field of conventional arms control in the last two decades. States adopted a multitude of norms on especially small arms control in various multilateral control instruments. In addition, non-governmental advocacy actors often established themselves as active participants in control debates with governments. The changes are surprising because they took place in the security sphere and therewith in an area traditionally understood to be the exclusive domain of governments. This research project investigates the significance of the changes for the traditional understanding of security governance. Specifically, it investigates the emergence of control norms and the role and policy impact of non-governmental actors in the promotion of the norms. It asks whether the normative changes and significance of nongovernmental actors therein challenge the understanding of security governance that underpins many established approaches to international relations theory.
19

L'UNIONE EUROPEA E LA GESTIONE DELLE CRISI DOPO LISBONA: UN NUOVO MODELLO PER AFFRONTARE LE SFIDE ALLA SICUREZZA NEL XXI SECOLO? / THE EUROPEAN UNION AND CRISIS MANAGEMENT AFTER LISBON A NEW MODEL TO ADDRESS SECURITY CHALLENGES IN THE 21ST CENTURY?

PIROZZI, NICOLETTA 16 April 2013 (has links)
L’obiettivo di questa tesi è di valutare che tipo di modello per la gestione delle crisi l’Unione Europea (UE) ha elaborato attraverso l’adozione e l’attuazione del Trattato di Lisbona, ma anche di capire che impatto ha prodotto la sua interazione con lo scenario internazionale di sicurezza. L’analisi è condotta a tre livelli: (1) strategico – elaborazione o revisione di concetti, politiche e documenti quadro; (2) istituzionale – creazione e riorganizzazione delle strutture di riferimento e dei processi decisionali; (3) operativo – pianificazione e gestione delle missioni civili e militari sul terreno. Lo scopo finale è quello di verificare se l’approccio dell’UE alla gestione delle crisi può considerarsi efficace per affrontare i possibili scenari futuri e come possa essere migliorato sulla base delle esperienze più recenti. / The objective of this thesis is to assess what kind of crisis management model the European Union (EU) has elaborated through the adoption and implementation of the Treaty of Lisbon and what is the impact produced by its interaction with the international security context. The analysis is conducted at three different levels: (1) strategic – elaboration or review of concepts, policies and framework documents; (2) institutional – establishment or reorganization of structures and decision-making process; (3) operational – planning and conduct of civilian and military missions on the ground. The final aim is to evaluate whether the EU’s approach to crisis management will be able to face up possible future scenarios and how this model might be improved on the basis of most recent experiences.
20

Inter-Institutional Linkages and Great Power Influence : The G5 Sahel, France, and the EU in Sahelian Security Governance

Egbewatt Arrey, Lwanga January 2023 (has links)
Within international security governance and crisis management practice, there has been an increase in inter-institutional cooperation and multi-actor security initiatives. While many studies have attempted to shed light on the factors that determine the emergence of these inter-institutional security governance initiatives, many have approached the subject from a liberal-institutionalist perspective, giving only scant attention to the role of hegemons and great powers in these processes. To contribute to closing this gap, this study focuses on the role of hegemonic influence in the emergence and assemblage of inter-institutional (sub)regional security governance arrangements. It specifically focuses on Mali and the Sahel region following the 2012 Malian crisis, tracing the process through which inter-institutional cooperation between the G5S-JF and EUTM Mali became established by laying focus on the role of France as an extra-regional hegemon with a security agenda in the region. The study explores the role of French influence by outlining France’s preferences, actions, and narrations and explaining how they influenced the EU’s decision to operationally support the G5S-JF. The study also highlights the need to investigate how relations between resident powers and extra-regional hegemons shape the emergence, evolution, and decline of international organisations and regional security governance configurations.

Page generated in 0.0637 seconds