Avancerad sökning
Visar resultat 16 - 20 av 7723 avhandlingar som matchar ovanstående sökkriterier.
16. Exploring Impacts of Secondary Information Use on Individual Privacy
Sammanfattning : Information collected from individuals via online social networks and Internet of things devices can be used by institutions and service providers for different business purposes to tailor and customize their services, which is defined as secondary use of information. Although the literature on secondary use is well developed, prior studies have largely focused on direct use of information such as those instances of information use that do not stem from data mining. LÄS MER
17. Utvärdera Informationssystem : Pragmatiskt perspektiv och metod
Sammanfattning : Syfte: Det övergripande syftet med avhandlingen är att utveckla en intressentbaseradutvärderingsmetod för att utvärdera informationssystem. Jag har valt attkalla utvärderingsmetoden för VISU (Verksamhetsutvecklande InformationssystemUtvärdering). LÄS MER
18. Decentralized Control of Networked Systems : Information Asymmetries and Limitations
Sammanfattning : Designing local controllers for networked systems is challenging, because in these systems each local controller can often access only part of the overall information on system parameters and sensor measurements. Traditional control design cannot be easily applied due to the unconventional information patterns, communication network imperfections, and design procedure complexities. LÄS MER
19. Discovering Information Security Management
Sammanfattning : This thesis is concerned with issues relating to the management of information security in organisations, motivated by the need for cost-efficient information security.It is based on the assumption that: in order to achieve cost-efficient information security, the point of departure must be knowledge about the empirical reality in which the management of information security takes place. LÄS MER
20. Making the Dead Alive : Dynamic Routines in Risk Management
Sammanfattning : Risk management in information security is relevant to most, if not all, organizations. It is perhaps even more relevant considering the opportunities offered by the digitalization era, where reliably sharing, creating, and consuming information has become a competitive advantage, and information has become an asset of strategic concern. LÄS MER