Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Managing IT Security In Organizations: A look at Physical and Administrative Controls
Jönköping University, Jönköping International Business School, JIBS, Business Informatics.
2005 (English)Independent thesis Advanced level (degree of Magister), 10 points / 15 hpStudent thesis
Abstract [en]

Introduction

Information technology security or computing system security is one of the most impor-tant issues that businesses all over the world strive to deal with. However, the world has now changed and in essential ways. The desk-top computer and workstation have appeared and proliferated widely. The net effect of all this has been to expose the computer-based information system, i.e. its hardware, its software, its software processes, its databases, its communications to an environment over which no one—not end user, not network admin-istrator or system owner, not even government—has control.

Purpose

Since IT security has a very broad spectrum and encompasses a lot of issues, we want to focus our research by taking a critical look at how business organizations manage IT secu-rity with specific emphasis on administrative and physical controls.

Methods

When the authors of this paper approached the topic to be studied it soon became evident that the most relevant and interesting task was not merely to investigate how business and non business organizations manage their IT security, but in fact try to understand what lies behind them. The purpose of this paper demands a deeper insight of how organizations address the issue of computer security; the authors wanted to gain a deeper understanding of how security issues have been addressed or being tackled by the organizations. Thus, the qualitative method was most suitable for this study.

Conclusion

Based on the chosen approach, the result of this study has shown that both business and non-business organizations located in Jönköping recognize the importance of IT security, and are willing to protect their systems from threats such as unauthorized access, theft, fire, power outage and other threats to ensure the smooth running of their systems at all times.

Place, publisher, year, edition, pages
2005.
Keyword [en]
Computer System Security, IT security, Security Planning, Security policy.
National Category
Business Administration
Identifiers
URN: urn:nbn:se:hj:diva-249OAI: oai:DiVA.org:hj-249DiVA: diva2:3951
Uppsok
samhälle/juridik
Supervisors
Available from: 2005-09-12 Created: 2005-09-12

Open Access in DiVA

fulltext(351 kB)1859 downloads
File information
File name FULLTEXT01.pdfFile size 351 kBChecksum MD5
9095c6e11f64bf43ee218ac6001b062b62c1ad9970dcf4acd4642a5c084801eeaf6565a6
Type fulltextMimetype application/pdf

By organisation
JIBS, Business Informatics
Business Administration

Search outside of DiVA

GoogleGoogle Scholar
Total: 1859 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

Total: 1156 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf