System disruptions
We are currently experiencing disruptions on the search portals due to high traffic. We are working to resolve the issue, you may temporarily encounter an error message.
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Managing IT Security In Organizations: A look at Physical and Administrative Controls
Jönköping University, Jönköping International Business School, JIBS, Business Informatics.
2005 (English)Independent thesis Advanced level (degree of Magister), 10 points / 15 hpStudent thesis
Abstract [en]

Introduction

Information technology security or computing system security is one of the most impor-tant issues that businesses all over the world strive to deal with. However, the world has now changed and in essential ways. The desk-top computer and workstation have appeared and proliferated widely. The net effect of all this has been to expose the computer-based information system, i.e. its hardware, its software, its software processes, its databases, its communications to an environment over which no one—not end user, not network admin-istrator or system owner, not even government—has control.

Purpose

Since IT security has a very broad spectrum and encompasses a lot of issues, we want to focus our research by taking a critical look at how business organizations manage IT secu-rity with specific emphasis on administrative and physical controls.

Methods

When the authors of this paper approached the topic to be studied it soon became evident that the most relevant and interesting task was not merely to investigate how business and non business organizations manage their IT security, but in fact try to understand what lies behind them. The purpose of this paper demands a deeper insight of how organizations address the issue of computer security; the authors wanted to gain a deeper understanding of how security issues have been addressed or being tackled by the organizations. Thus, the qualitative method was most suitable for this study.

Conclusion

Based on the chosen approach, the result of this study has shown that both business and non-business organizations located in Jönköping recognize the importance of IT security, and are willing to protect their systems from threats such as unauthorized access, theft, fire, power outage and other threats to ensure the smooth running of their systems at all times.

Place, publisher, year, edition, pages
2005.
Keywords [en]
Computer System Security, IT security, Security Planning, Security policy.
National Category
Business Administration
Identifiers
URN: urn:nbn:se:hj:diva-249OAI: oai:DiVA.org:hj-249DiVA, id: diva2:3951
Uppsok
samhälle/juridik
Supervisors
Available from: 2005-09-12 Created: 2005-09-12

Open Access in DiVA

fulltext(351 kB)2317 downloads
File information
File name FULLTEXT01.pdfFile size 351 kBChecksum SHA-1
70dcf4acd4642a5c084801eeaf6565a69095c6e11f64bf43ee218ac6001b062b62c1ad99
Type fulltextMimetype application/pdf

By organisation
JIBS, Business Informatics
Business Administration

Search outside of DiVA

GoogleGoogle Scholar
Total: 2318 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 1843 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf