Organizations today are increasingly dependent on IS (information systems) to perform vital tasks. Dependence of the IS, and the fact that organizations are exposed to an increasing number of threats has given information security increasing attention within the organizations. Information security has long been perceived as a technical problem. Only recently information security begun to be understood as an interaction involving technical, organizational and human factors. To create an effective information security within an organization, extensive work should be put on developing the organizations information security policy. The main purpose of this study is to investigate the impact information security policies have on the IS users eff...
The following study is dedicated to investigate what kind of problems an organisation might stumble ...
Many companies struggle to gain a proper information security level, since employees lack such trai...
This thesis aims to have an overview of the current studies in the development of information securi...
Information technology (IT) can be used to empower an organization to enable it to continue evolving...
Information technology (IT) can be used to empower an organization to enable it to continue evolving...
Information security is only as strong as the weakest link. Although the technical, externally orien...
Purpose The aim of this study is to encourage management boards to recognize that employees play a m...
In our paper we argue that effective information system (IS) security mainly has to take employees a...
The main object of work is the impact of human factor on IS security. The main purpose of this work ...
This study examined how municipalities work with information security focusing on the use of securit...
This study examined how municipalities work with information security focusing on the use of securit...
Information security is one of the most essential concerns in today’s organizations. IT departments ...
Many companies struggle to gain a proper information security level, since employees lack such trai...
Many companies struggle to gain a proper information security level, since employees lack such trai...
This report is a bachelor thesis created for the Technology Center as a part of the Software Enginee...
The following study is dedicated to investigate what kind of problems an organisation might stumble ...
Many companies struggle to gain a proper information security level, since employees lack such trai...
This thesis aims to have an overview of the current studies in the development of information securi...
Information technology (IT) can be used to empower an organization to enable it to continue evolving...
Information technology (IT) can be used to empower an organization to enable it to continue evolving...
Information security is only as strong as the weakest link. Although the technical, externally orien...
Purpose The aim of this study is to encourage management boards to recognize that employees play a m...
In our paper we argue that effective information system (IS) security mainly has to take employees a...
The main object of work is the impact of human factor on IS security. The main purpose of this work ...
This study examined how municipalities work with information security focusing on the use of securit...
This study examined how municipalities work with information security focusing on the use of securit...
Information security is one of the most essential concerns in today’s organizations. IT departments ...
Many companies struggle to gain a proper information security level, since employees lack such trai...
Many companies struggle to gain a proper information security level, since employees lack such trai...
This report is a bachelor thesis created for the Technology Center as a part of the Software Enginee...
The following study is dedicated to investigate what kind of problems an organisation might stumble ...
Many companies struggle to gain a proper information security level, since employees lack such trai...
This thesis aims to have an overview of the current studies in the development of information securi...