Ändra sökning
RefereraExporteraLänk till posten
Permanent länk

Direktlänk
Referera
Referensformat
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Managing IT Security In Organizations: A look at Physical and Administrative Controls
Högskolan i Jönköping, Internationella Handelshögskolan, IHH, Informatik.
2005 (Engelska)Självständigt arbete på avancerad nivå (magisterexamen), 10 poäng / 15 hpStudentuppsats
Abstract [en]

Introduction

Information technology security or computing system security is one of the most impor-tant issues that businesses all over the world strive to deal with. However, the world has now changed and in essential ways. The desk-top computer and workstation have appeared and proliferated widely. The net effect of all this has been to expose the computer-based information system, i.e. its hardware, its software, its software processes, its databases, its communications to an environment over which no one—not end user, not network admin-istrator or system owner, not even government—has control.

Purpose

Since IT security has a very broad spectrum and encompasses a lot of issues, we want to focus our research by taking a critical look at how business organizations manage IT secu-rity with specific emphasis on administrative and physical controls.

Methods

When the authors of this paper approached the topic to be studied it soon became evident that the most relevant and interesting task was not merely to investigate how business and non business organizations manage their IT security, but in fact try to understand what lies behind them. The purpose of this paper demands a deeper insight of how organizations address the issue of computer security; the authors wanted to gain a deeper understanding of how security issues have been addressed or being tackled by the organizations. Thus, the qualitative method was most suitable for this study.

Conclusion

Based on the chosen approach, the result of this study has shown that both business and non-business organizations located in Jönköping recognize the importance of IT security, and are willing to protect their systems from threats such as unauthorized access, theft, fire, power outage and other threats to ensure the smooth running of their systems at all times.

Ort, förlag, år, upplaga, sidor
2005.
Nyckelord [en]
Computer System Security, IT security, Security Planning, Security policy.
Nationell ämneskategori
Företagsekonomi
Identifikatorer
URN: urn:nbn:se:hj:diva-249OAI: oai:DiVA.org:hj-249DiVA, id: diva2:3951
Uppsök
samhälle/juridik
Handledare
Tillgänglig från: 2005-09-12 Skapad: 2005-09-12

Open Access i DiVA

fulltext(351 kB)2043 nedladdningar
Filinformation
Filnamn FULLTEXT01.pdfFilstorlek 351 kBChecksumma MD5
9095c6e11f64bf43ee218ac6001b062b62c1ad9970dcf4acd4642a5c084801eeaf6565a6
Typ fulltextMimetyp application/pdf

Av organisationen
IHH, Informatik
Företagsekonomi

Sök vidare utanför DiVA

GoogleGoogle Scholar
Totalt: 2043 nedladdningar
Antalet nedladdningar är summan av nedladdningar för alla fulltexter. Det kan inkludera t.ex tidigare versioner som nu inte längre är tillgängliga.

urn-nbn

Altmetricpoäng

urn-nbn
Totalt: 1307 träffar
RefereraExporteraLänk till posten
Permanent länk

Direktlänk
Referera
Referensformat
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf