Search results for "Security"
showing 10 items of 1693 documents
HEALTH COVER, THE CASE OF MARTIN AND CAROLINA IN AUSTRALIA
2014
This research examines, from a qualitative perspective, some public opinion related to issues associated with the management of a tensed situation. In that process, it identifies some of the subtle differences in the Anglo-Latino cultural expectations. Martin, an Argentine tourist, contracted the Gullien-Barre syndrome in Australia, while enjoying his honeymoon vacation on a Tasmanian island with his partner Carolina. With the passing of days, Martin lost his mobility and was finally hospitalized in emergency. Doctors induced Martin into a coma temporarily because his muscles were paralyzed by the action of the virus. Health costs were more expensive than the family could absorb in Australi…
Global Climate Policies, Local Institutions and Food Security in a Pastoral Society in Ethiopia
2020
This paper explores climate change adaptation within national policy priorities in a least developed country (LDC). The premise of the article is that when considering food security, climate is an exogenous trigger, while the deeper causes lie in social problems. Therefore, adaptation is subordinate to poverty alleviation. The paper examines how these two goals, climate adaptation and poverty alleviation, can be combined. Recent studies have shown that the most effective way to adapt to changing climate conditions in a poor country is to rely on local institutions that have established and sustainable mechanisms to deal with extreme climatic conditions. This research analyzes the stakeholde…
Alternative Military Keynesianism as a Tool of Civil-Military Cooperation in the Framework of the EU Defence Policy
2015
During the last year the security threats to the European Union have increased dramatically under the influence of military crisis in eastern Ukraine and Islamic terrorist activities in Europe. Consequently the demand for defence in the member states of the European Union has become greater than in previous years.This situation leads to the dilemma when the high level of defence expenditure can hamper the financial support of other sectors of national economy.Therefore it is necessary to increase the efficiency of available financial resources that have been allocated for the defence without a significant increase in defence expenditure. In order to achieve this efficiency the concept of cl…
Informace : výzva bezpečnostního systému
2018
The issue of information in the security system is extremely wide. Therefore, it is also difficult to deal with it within a scientific article. At the launch of this publication, the author did not aim, on the basis of the research will be able to solve problems related to the functioning of information system security. That is why he also focused on his issues in his papers, which are, in his opinion, the most important.
Case study of why information security investment fail?
2015
Tämä tutkielma keskittyy tietoturvainvestointien päätöksentekoprosessiin. Ta- voitteena on tutkia miksi tietoturvainvestointipäätös hylätään. Tutkimuksen teoreettinen tausta perustuu aiemmin suoritettuun tutkimukseen, mikä on pää- osin käsitellyt tietoturvainvestointeja joko optimaalisen investointitason näkö- kulmasta, tai tehokkaan investointitason näkökulmasta. Aiempi tutkimus ei ole käsitellyt tietoturvainvestointeja epäonnistuneen päätöksenteon näkökulmasta, eikä siten voi esittää perusteluita päätöksenteolle. Tämän tutkielman tuloksena esitetään teoreettisia väittämiä, jotka tarjoavat mahdollisia vastauksia tutki- muskysymykseen. Tämä tutkimus täydentää osaltaan akateemista kirjallisu…
Analysis of information risk management methods
2014
Zudin, Rodion Analysis of information risk management methods Jyväskylä: University of Jyväskylä, 2014, 33 p. Information Systems, Bachelor’s Thesis Supervisor: Siponen, Mikko A brief overview in the information risk management field is done in this study by introducing the shared terminology and methodology of the field using literature overview in the first chapter. Second chapter consists of examining and comparing two information risk management methodologies proposed by two different guides: Risk Management Guide for Information Technology Systems by National Institute of Standards and Technology and The Security Risk Management Guide by Microsoft. By finding common factors and methods…
Common Misunderstandings of Deterrence Theory in Information Systems Research and Future Research Directions
2022
In the 1980s, information systems (IS) borrowed deterrence theory (DT) from the field of criminology to explain information security behaviors (or intention). Today, DT is among the most commonly used theories in IS security research. Our review of IS research applying DT highlights that many fundamental assumptions of DT are unrecognized and therefore unexamined. This may have resulted in misunderstandings and conceptual confusions regarding some of the basic concepts of DT. For example, some IS studies confuse general deterrence with specific deterrence or do not recognize the difference between the two. Moreover, these fundamental assumptions, when directly examined, may provide importan…
Moral sensitivity in information security dilemmas
2019
Activities that undermine information security such as noncompliance with information security policies raise moral concerns since they can expose valuable information assets. Existing research shows that moral reflection could play an inhibitory role in one’s decision to undermine information security. However, it is not clear whether users interpret such decisions from a moral standpoint to engage in moral reflection in the first place. Users have to be morally sensitive before they engage in moral reflection. Moral sensitivity involves perceiving a situation as morally relevant, identifying the parties involved and perceiving possible courses of action. We examine moral sensitivity in se…
Investigating the Impact of Organizational Culture on Information Security Policy Compliance : The Case of Ethiopia
2021
Information security is one of the organizations' top agendas worldwide. Similarly, there is a growing trend in the kinds and rate of security breaches. Information security experts and scholars concentrate on outsiders' threats; conversely, insiders are responsible for most of the security breaches in organizations. Further, the majority of information security research findings are limited to solutions that are technically focused. However, it is now recognized that the technological approach alone does not carry the security level needed. So this led researchers to embark on socio-technical approaches. Thus, this study explores organizational culture's effect on employees' intention to c…
Euroopan unionin yleisen tietosuoja-asetuksen aiheuttamat muutokset organisaatioiden tietoturvapolitiikkoihin
2017
EU:n yleistä tietosuoja-asetusta aletaan soveltaa toukokuun 25. päivänä 2018 ja sen aiheuttamat muutokset ovat merkittäviä ja kunnianhimoisia. Se on yksi laaja-alaisimpia EU:n lakimuutoksia viimevuosien ajalta. Yleisen tietosuoja-asetuksen vaikutukset ovat merkittäviä organisaatioille, sillä epäonnistuessaan asetuksen vaatimusten noudattamisessa organisaatio joutuu maksamaan merkittävät sakot, korkeimmillaan joko 4% yrityksen globaalista vuosittaisesta liikevaihdosta tai 20 000 000 euroa riippuen siitä, kumpi on korkeampi. Yleinen tietosuoja-asetus tulee luultavasti vaikuttamaan tietoturvapoliitikkojen kehitykseen, kun yritykset pyrkivät noudattamaan uusia vaatimuksia. Tietotu…