Every year, the Norwegian government and its organisations acquire a large number of new IT-systems. These must be bought through a well regulated and rigid procurement process, where system requirements must be clearly formulated ahead of time. This is especially a challenge for security requirements, as changes to the system and the technological development might render such requirements outdated quickly. This thesis investigates the security requirements of publicly procured IT-systems and how they are impacted by the procurement process. In total, 14 participants were interviewed to provide insight into the three research questions: (1) How is the current state of security requirements in public procurements viewed by procurers and s...
When acquiring information systems, public entities face a dilemma. On the one hand, they want to pr...
AbstractIT procurement represents a business process of importance, including the ability to articul...
This thesis research evaluates the extent to which IT decision makers consider security concerns and...
Public procurement constitutes a large part of the market in many countries, and it has the potentia...
Municipalities and regions in Sweden have an increasing need to purchase security technology to secu...
The Norwegian power sector is currently experiencing an increasingly complex supply chain, affected ...
Published version of a chapter in the book Lecture Notes in Computer Science, 6846, 404-417. Also av...
Information Technology is an essential part of the society today, not least in large organisati...
There are few legal requirements currently for information technology (IT) systems or infrastructure...
Context. Public procurement is an important economic factor. To protect against corruption governmen...
Purpose – A deteriorating security situation and an increased need for defence equipment calls for n...
The law of public procurement has been a factor in government-controlled businesses since the early ...
This thesis has looked at “how Norwegian municipalities work with the risk of cyber attacks via sup...
When acquiring information systems, public entities face a dilemma. On the one hand, they want to pr...
Context and Motivation: In 2016, the European Union introduced ‘innovation partnerships’ to facilit...
When acquiring information systems, public entities face a dilemma. On the one hand, they want to pr...
AbstractIT procurement represents a business process of importance, including the ability to articul...
This thesis research evaluates the extent to which IT decision makers consider security concerns and...
Public procurement constitutes a large part of the market in many countries, and it has the potentia...
Municipalities and regions in Sweden have an increasing need to purchase security technology to secu...
The Norwegian power sector is currently experiencing an increasingly complex supply chain, affected ...
Published version of a chapter in the book Lecture Notes in Computer Science, 6846, 404-417. Also av...
Information Technology is an essential part of the society today, not least in large organisati...
There are few legal requirements currently for information technology (IT) systems or infrastructure...
Context. Public procurement is an important economic factor. To protect against corruption governmen...
Purpose – A deteriorating security situation and an increased need for defence equipment calls for n...
The law of public procurement has been a factor in government-controlled businesses since the early ...
This thesis has looked at “how Norwegian municipalities work with the risk of cyber attacks via sup...
When acquiring information systems, public entities face a dilemma. On the one hand, they want to pr...
Context and Motivation: In 2016, the European Union introduced ‘innovation partnerships’ to facilit...
When acquiring information systems, public entities face a dilemma. On the one hand, they want to pr...
AbstractIT procurement represents a business process of importance, including the ability to articul...
This thesis research evaluates the extent to which IT decision makers consider security concerns and...