Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(IT security). Showing records 1 – 30 of 135 total matches.

[1] [2] [3] [4] [5]

Search Limiters

Last 2 Years | English Only

Levels

Languages

Country

▼ Search Limiters


University of Vienna

1. Yigitsoy, Gönül. IT-Security Status Evaluation.

Degree: 2018, University of Vienna

Im Rahmen dieser Arbeit wird ein Modell entwickelt, das den IT-Sicherheitsstatus eines Systems bewertet. Dabei werden Sicherheitskennzahlen basierend auf ISO-Standards entwickelt. Im Verlauf der Arbeit… (more)

Subjects/Keywords: 54.99 Informatik: Sonstiges; IT-Sicherheit / IT-Security Metrics / IT-Sicherheitsstatus; IT-Security / IT-Security Metrics / IT-Security Status

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yigitsoy, G. (2018). IT-Security Status Evaluation. (Thesis). University of Vienna. Retrieved from http://othes.univie.ac.at/54767/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Yigitsoy, Gönül. “IT-Security Status Evaluation.” 2018. Thesis, University of Vienna. Accessed April 09, 2020. http://othes.univie.ac.at/54767/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Yigitsoy, Gönül. “IT-Security Status Evaluation.” 2018. Web. 09 Apr 2020.

Vancouver:

Yigitsoy G. IT-Security Status Evaluation. [Internet] [Thesis]. University of Vienna; 2018. [cited 2020 Apr 09]. Available from: http://othes.univie.ac.at/54767/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Yigitsoy G. IT-Security Status Evaluation. [Thesis]. University of Vienna; 2018. Available from: http://othes.univie.ac.at/54767/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

2. Penso, Lucia Draque. Distributed Protocals Robust Against Malicious Attacks.

Degree: PhD, Computer Science, 2008, Brown University

 In this thesis we investigate distinct techniques to avoid the impact of miscellaneous failures derived from hostile attacks in a message-passing distributed computing environment. Our… (more)

Subjects/Keywords: IT-Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Penso, L. D. (2008). Distributed Protocals Robust Against Malicious Attacks. (Doctoral Dissertation). Brown University. Retrieved from https://repository.library.brown.edu/studio/item/bdr:105/

Chicago Manual of Style (16th Edition):

Penso, Lucia Draque. “Distributed Protocals Robust Against Malicious Attacks.” 2008. Doctoral Dissertation, Brown University. Accessed April 09, 2020. https://repository.library.brown.edu/studio/item/bdr:105/.

MLA Handbook (7th Edition):

Penso, Lucia Draque. “Distributed Protocals Robust Against Malicious Attacks.” 2008. Web. 09 Apr 2020.

Vancouver:

Penso LD. Distributed Protocals Robust Against Malicious Attacks. [Internet] [Doctoral dissertation]. Brown University; 2008. [cited 2020 Apr 09]. Available from: https://repository.library.brown.edu/studio/item/bdr:105/.

Council of Science Editors:

Penso LD. Distributed Protocals Robust Against Malicious Attacks. [Doctoral Dissertation]. Brown University; 2008. Available from: https://repository.library.brown.edu/studio/item/bdr:105/


Open Universiteit Nederland

3. Dreijer, Koen. Online hengelen zonder vergunning: een afstudeeronderzoek naar de mogelijkheden, effectiviteit en acceptatie van maatregelen tegen phishing gezien vanuit de financiële sector .

Degree: 2012, Open Universiteit Nederland

 De hoofdvraag van dit onderzoek luidt: Wat doen organisaties in de financiële sector om phishing te voorkomen, welke maatregelen blijken effectief om phishing tegen te… (more)

Subjects/Keywords: phishing; internetbankieren; IT security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dreijer, K. (2012). Online hengelen zonder vergunning: een afstudeeronderzoek naar de mogelijkheden, effectiviteit en acceptatie van maatregelen tegen phishing gezien vanuit de financiële sector . (Masters Thesis). Open Universiteit Nederland. Retrieved from http://hdl.handle.net/1820/4391

Chicago Manual of Style (16th Edition):

Dreijer, Koen. “Online hengelen zonder vergunning: een afstudeeronderzoek naar de mogelijkheden, effectiviteit en acceptatie van maatregelen tegen phishing gezien vanuit de financiële sector .” 2012. Masters Thesis, Open Universiteit Nederland. Accessed April 09, 2020. http://hdl.handle.net/1820/4391.

MLA Handbook (7th Edition):

Dreijer, Koen. “Online hengelen zonder vergunning: een afstudeeronderzoek naar de mogelijkheden, effectiviteit en acceptatie van maatregelen tegen phishing gezien vanuit de financiële sector .” 2012. Web. 09 Apr 2020.

Vancouver:

Dreijer K. Online hengelen zonder vergunning: een afstudeeronderzoek naar de mogelijkheden, effectiviteit en acceptatie van maatregelen tegen phishing gezien vanuit de financiële sector . [Internet] [Masters thesis]. Open Universiteit Nederland; 2012. [cited 2020 Apr 09]. Available from: http://hdl.handle.net/1820/4391.

Council of Science Editors:

Dreijer K. Online hengelen zonder vergunning: een afstudeeronderzoek naar de mogelijkheden, effectiviteit en acceptatie van maatregelen tegen phishing gezien vanuit de financiële sector . [Masters Thesis]. Open Universiteit Nederland; 2012. Available from: http://hdl.handle.net/1820/4391


Open Universiteit Nederland

4. Schless, Timo. De organisatie van botnetbestrijding in Nederland .

Degree: 2013, Open Universiteit Nederland

 Botnets zijn omvangrijke netwerken van geïnfecteerde computers waarmee gecoördineerde aanvallen op computersystemen worden uitgevoerd. Botnets vormen een grote dreiging en bestrijding is noodzakelijk. Dit onderzoek… (more)

Subjects/Keywords: botnets; botnetbestrijding; IT security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Schless, T. (2013). De organisatie van botnetbestrijding in Nederland . (Masters Thesis). Open Universiteit Nederland. Retrieved from http://hdl.handle.net/1820/5052

Chicago Manual of Style (16th Edition):

Schless, Timo. “De organisatie van botnetbestrijding in Nederland .” 2013. Masters Thesis, Open Universiteit Nederland. Accessed April 09, 2020. http://hdl.handle.net/1820/5052.

MLA Handbook (7th Edition):

Schless, Timo. “De organisatie van botnetbestrijding in Nederland .” 2013. Web. 09 Apr 2020.

Vancouver:

Schless T. De organisatie van botnetbestrijding in Nederland . [Internet] [Masters thesis]. Open Universiteit Nederland; 2013. [cited 2020 Apr 09]. Available from: http://hdl.handle.net/1820/5052.

Council of Science Editors:

Schless T. De organisatie van botnetbestrijding in Nederland . [Masters Thesis]. Open Universiteit Nederland; 2013. Available from: http://hdl.handle.net/1820/5052


Université Catholique de Louvain

5. D'Hondt, Alexandre. Design and implementation of a software APL automation framework - Analysis of common applications.

Degree: 2016, Université Catholique de Louvain

Nowadays, information security takes an increasing place in the world of Information Technologies. We work using software products provided by the enterprise, often assuming that… (more)

Subjects/Keywords: IT Security; Software Security; Assessment; Framework; SCAPL

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

D'Hondt, A. (2016). Design and implementation of a software APL automation framework - Analysis of common applications. (Thesis). Université Catholique de Louvain. Retrieved from http://hdl.handle.net/2078.1/thesis:8128

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

D'Hondt, Alexandre. “Design and implementation of a software APL automation framework - Analysis of common applications.” 2016. Thesis, Université Catholique de Louvain. Accessed April 09, 2020. http://hdl.handle.net/2078.1/thesis:8128.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

D'Hondt, Alexandre. “Design and implementation of a software APL automation framework - Analysis of common applications.” 2016. Web. 09 Apr 2020.

Vancouver:

D'Hondt A. Design and implementation of a software APL automation framework - Analysis of common applications. [Internet] [Thesis]. Université Catholique de Louvain; 2016. [cited 2020 Apr 09]. Available from: http://hdl.handle.net/2078.1/thesis:8128.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

D'Hondt A. Design and implementation of a software APL automation framework - Analysis of common applications. [Thesis]. Université Catholique de Louvain; 2016. Available from: http://hdl.handle.net/2078.1/thesis:8128

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Université Catholique de Louvain

6. Bahmad, Hussein. Design and Implementation of a Software APL Automation Framework - Analysis of Common Applications.

Degree: 2016, Université Catholique de Louvain

Nowadays, information security takes an increasing place in the world of Information Technologies. We work using software products provided by the enterprise, often assuming that… (more)

Subjects/Keywords: IT Security; Software Security; Assessement; Framework; SCAPL

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bahmad, H. (2016). Design and Implementation of a Software APL Automation Framework - Analysis of Common Applications. (Thesis). Université Catholique de Louvain. Retrieved from http://hdl.handle.net/2078.1/thesis:8127

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Bahmad, Hussein. “Design and Implementation of a Software APL Automation Framework - Analysis of Common Applications.” 2016. Thesis, Université Catholique de Louvain. Accessed April 09, 2020. http://hdl.handle.net/2078.1/thesis:8127.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Bahmad, Hussein. “Design and Implementation of a Software APL Automation Framework - Analysis of Common Applications.” 2016. Web. 09 Apr 2020.

Vancouver:

Bahmad H. Design and Implementation of a Software APL Automation Framework - Analysis of Common Applications. [Internet] [Thesis]. Université Catholique de Louvain; 2016. [cited 2020 Apr 09]. Available from: http://hdl.handle.net/2078.1/thesis:8127.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Bahmad H. Design and Implementation of a Software APL Automation Framework - Analysis of Common Applications. [Thesis]. Université Catholique de Louvain; 2016. Available from: http://hdl.handle.net/2078.1/thesis:8127

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Luleå University of Technology

7. Mark, Daniel. Säkerhetsmedvetenhet vid daglig IT-interaktion hos hemanvändare.

Degree: 2013, Luleå University of Technology

People interact daily with IT systems and communication over the Internet has become an important part of many people's lives. With more users than… (more)

Subjects/Keywords: Technology; Teknik; Säkerhetsmedvetenhet; Security awareness; Security; hemanvändare; homeusers; IT-security; It-säkerhet; It-interaktion; it-interaction

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mark, D. (2013). Säkerhetsmedvetenhet vid daglig IT-interaktion hos hemanvändare. (Thesis). Luleå University of Technology. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-46415

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Mark, Daniel. “Säkerhetsmedvetenhet vid daglig IT-interaktion hos hemanvändare.” 2013. Thesis, Luleå University of Technology. Accessed April 09, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-46415.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Mark, Daniel. “Säkerhetsmedvetenhet vid daglig IT-interaktion hos hemanvändare.” 2013. Web. 09 Apr 2020.

Vancouver:

Mark D. Säkerhetsmedvetenhet vid daglig IT-interaktion hos hemanvändare. [Internet] [Thesis]. Luleå University of Technology; 2013. [cited 2020 Apr 09]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-46415.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Mark D. Säkerhetsmedvetenhet vid daglig IT-interaktion hos hemanvändare. [Thesis]. Luleå University of Technology; 2013. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-46415

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Cincinnati

8. Hausrath, Nathaniel L. Methods for Hospital Network and Computer Security.

Degree: MS, Engineering and Applied Science: Computer Science, 2011, University of Cincinnati

 Hospital IT security presents many unique challenges that must be solved by the entire organization. Network and computer threats can cause thousands of dollars in… (more)

Subjects/Keywords: Information Technology; hospital it Security; information security; network security; computer security; hospital information security; security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hausrath, N. L. (2011). Methods for Hospital Network and Computer Security. (Masters Thesis). University of Cincinnati. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=ucin1303845234

Chicago Manual of Style (16th Edition):

Hausrath, Nathaniel L. “Methods for Hospital Network and Computer Security.” 2011. Masters Thesis, University of Cincinnati. Accessed April 09, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1303845234.

MLA Handbook (7th Edition):

Hausrath, Nathaniel L. “Methods for Hospital Network and Computer Security.” 2011. Web. 09 Apr 2020.

Vancouver:

Hausrath NL. Methods for Hospital Network and Computer Security. [Internet] [Masters thesis]. University of Cincinnati; 2011. [cited 2020 Apr 09]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ucin1303845234.

Council of Science Editors:

Hausrath NL. Methods for Hospital Network and Computer Security. [Masters Thesis]. University of Cincinnati; 2011. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ucin1303845234


Rochester Institute of Technology

9. Henríquez Badía, Héctor. Identifying a weak link in the network chain: Determining how prepared Dominican IT administrators are to confront today’s security issues.

Degree: 2010, Rochester Institute of Technology

 Enterprises in Dominican Republic are growing in size; this means that sooner or later these enterprises will have the necessity to create an IT department… (more)

Subjects/Keywords: Dominican IT administrators; Enterprise network security; IT administrators; Network security; Network systems security; Weakest link

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Henríquez Badía, H. (2010). Identifying a weak link in the network chain: Determining how prepared Dominican IT administrators are to confront today’s security issues. (Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/826

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Henríquez Badía, Héctor. “Identifying a weak link in the network chain: Determining how prepared Dominican IT administrators are to confront today’s security issues.” 2010. Thesis, Rochester Institute of Technology. Accessed April 09, 2020. https://scholarworks.rit.edu/theses/826.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Henríquez Badía, Héctor. “Identifying a weak link in the network chain: Determining how prepared Dominican IT administrators are to confront today’s security issues.” 2010. Web. 09 Apr 2020.

Vancouver:

Henríquez Badía H. Identifying a weak link in the network chain: Determining how prepared Dominican IT administrators are to confront today’s security issues. [Internet] [Thesis]. Rochester Institute of Technology; 2010. [cited 2020 Apr 09]. Available from: https://scholarworks.rit.edu/theses/826.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Henríquez Badía H. Identifying a weak link in the network chain: Determining how prepared Dominican IT administrators are to confront today’s security issues. [Thesis]. Rochester Institute of Technology; 2010. Available from: https://scholarworks.rit.edu/theses/826

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Linköping University

10. Björn, Johan. Extending a Platform for IT-Security Exercises.

Degree: Electrical Engineering, 2011, Linköping University

  The Swedish Defence Research Agency, FOI, has developed a platform that is used to train and study IT-security. This platform was used during the… (more)

Subjects/Keywords: IT-Security; IT-Security Assessment; IT-Security Exercise; Traffic Filtering; Firewalls; Computer and Information Sciences; Data- och informationsvetenskap

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Björn, J. (2011). Extending a Platform for IT-Security Exercises. (Thesis). Linköping University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-68883

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Björn, Johan. “Extending a Platform for IT-Security Exercises.” 2011. Thesis, Linköping University. Accessed April 09, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-68883.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Björn, Johan. “Extending a Platform for IT-Security Exercises.” 2011. Web. 09 Apr 2020.

Vancouver:

Björn J. Extending a Platform for IT-Security Exercises. [Internet] [Thesis]. Linköping University; 2011. [cited 2020 Apr 09]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-68883.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Björn J. Extending a Platform for IT-Security Exercises. [Thesis]. Linköping University; 2011. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-68883

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Debrecen

11. Lipcsei, Zoltán. The most important IT security trends .

Degree: DE – Informatikai Kar, University of Debrecen

 A dolgozat az elmúlt néhány év jellemző információ biztonsági trendjeit hivatott összefoglalni és ismertetni. Hét témán keresztül szélességi áttekintést kíván nyújtani olyan területekről amelyek meghatározták… (more)

Subjects/Keywords: IT security trends

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lipcsei, Z. (n.d.). The most important IT security trends . (Thesis). University of Debrecen. Retrieved from http://hdl.handle.net/2437/240390

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lipcsei, Zoltán. “The most important IT security trends .” Thesis, University of Debrecen. Accessed April 09, 2020. http://hdl.handle.net/2437/240390.

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lipcsei, Zoltán. “The most important IT security trends .” Web. 09 Apr 2020.

Note: this citation may be lacking information needed for this citation format:
No year of publication.

Vancouver:

Lipcsei Z. The most important IT security trends . [Internet] [Thesis]. University of Debrecen; [cited 2020 Apr 09]. Available from: http://hdl.handle.net/2437/240390.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

Council of Science Editors:

Lipcsei Z. The most important IT security trends . [Thesis]. University of Debrecen; Available from: http://hdl.handle.net/2437/240390

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.


University of North Texas

12. Negahban, Arash. Does Device Matter? Understanding How User, Device, and Usage Characteristics Influence Risky IT Behaviors of Individuals.

Degree: 2015, University of North Texas

 Over the past few years, there has been a skyrocketing growth in the use of mobile devices. Mobile devices are ushering in a new era… (more)

Subjects/Keywords: risky IT behavior; IT security; mobile devices; protective IT behavior; information systems security; Mobile computing  – Security measures.; Mobile communication systems  – Security measures.; Computer security.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Negahban, A. (2015). Does Device Matter? Understanding How User, Device, and Usage Characteristics Influence Risky IT Behaviors of Individuals. (Thesis). University of North Texas. Retrieved from https://digital.library.unt.edu/ark:/67531/metadc804895/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Negahban, Arash. “Does Device Matter? Understanding How User, Device, and Usage Characteristics Influence Risky IT Behaviors of Individuals.” 2015. Thesis, University of North Texas. Accessed April 09, 2020. https://digital.library.unt.edu/ark:/67531/metadc804895/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Negahban, Arash. “Does Device Matter? Understanding How User, Device, and Usage Characteristics Influence Risky IT Behaviors of Individuals.” 2015. Web. 09 Apr 2020.

Vancouver:

Negahban A. Does Device Matter? Understanding How User, Device, and Usage Characteristics Influence Risky IT Behaviors of Individuals. [Internet] [Thesis]. University of North Texas; 2015. [cited 2020 Apr 09]. Available from: https://digital.library.unt.edu/ark:/67531/metadc804895/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Negahban A. Does Device Matter? Understanding How User, Device, and Usage Characteristics Influence Risky IT Behaviors of Individuals. [Thesis]. University of North Texas; 2015. Available from: https://digital.library.unt.edu/ark:/67531/metadc804895/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of South Africa

13. Mahopo, Ntombizodwa Bessy. A risk based approach for managing information technology security risk within a dynamic environment.

Degree: 2015, University of South Africa

 Information technology (IT) security, which is concerned with protecting the confidentiality, integrity and availability of information technology assets, inherently possesses a significant amount of known… (more)

Subjects/Keywords: IT; IT security; Risk; Risk management; IT security threat modelling; IT security management; OCTAVE; COBIT; ITIL; ISO 27001/2; ISF Standard of Good Practice

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mahopo, N. B. (2015). A risk based approach for managing information technology security risk within a dynamic environment. (Masters Thesis). University of South Africa. Retrieved from http://hdl.handle.net/10500/21925

Chicago Manual of Style (16th Edition):

Mahopo, Ntombizodwa Bessy. “A risk based approach for managing information technology security risk within a dynamic environment.” 2015. Masters Thesis, University of South Africa. Accessed April 09, 2020. http://hdl.handle.net/10500/21925.

MLA Handbook (7th Edition):

Mahopo, Ntombizodwa Bessy. “A risk based approach for managing information technology security risk within a dynamic environment.” 2015. Web. 09 Apr 2020.

Vancouver:

Mahopo NB. A risk based approach for managing information technology security risk within a dynamic environment. [Internet] [Masters thesis]. University of South Africa; 2015. [cited 2020 Apr 09]. Available from: http://hdl.handle.net/10500/21925.

Council of Science Editors:

Mahopo NB. A risk based approach for managing information technology security risk within a dynamic environment. [Masters Thesis]. University of South Africa; 2015. Available from: http://hdl.handle.net/10500/21925

14. Lagerstrand, Philip. Säkerhetsmedvetenhet hos hemanvändare.

Degree: Informatics, 2015, University of Skövde

IT utgör en stor del av majoriteten av folks vardagliga liv. Smartphones och surfplattor har om möjligt ytterligare ökat vår användning av tekniska enheter… (more)

Subjects/Keywords: IT security; IT; Security awareness; Information security; Home user; User; TMT; IT-säkerhet; IT; Säkerhetsmedvetenhet; Informationssäkerhet; Hemanvändare; Användare; TMT; Computer Sciences; Datavetenskap (datalogi)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lagerstrand, P. (2015). Säkerhetsmedvetenhet hos hemanvändare. (Thesis). University of Skövde. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-11133

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lagerstrand, Philip. “Säkerhetsmedvetenhet hos hemanvändare.” 2015. Thesis, University of Skövde. Accessed April 09, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-11133.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lagerstrand, Philip. “Säkerhetsmedvetenhet hos hemanvändare.” 2015. Web. 09 Apr 2020.

Vancouver:

Lagerstrand P. Säkerhetsmedvetenhet hos hemanvändare. [Internet] [Thesis]. University of Skövde; 2015. [cited 2020 Apr 09]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-11133.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lagerstrand P. Säkerhetsmedvetenhet hos hemanvändare. [Thesis]. University of Skövde; 2015. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-11133

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

15. Halinár, Martin. Compliance analýza v oblasti IT managementu .

Degree: 2013, Brno University of Technology

 Tato práce se zabývá jednou z významných částí fungování velkých korporací, tedy Compliance, se zvláštní pozorností na IT management. Diplomová práce zevrubně prozkoumává danou oblast.… (more)

Subjects/Keywords: Compliance; IT management; bezpečnost; analýza; proces; framework; Compliance; IT management; security; analysis; process; framework

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Halinár, M. (2013). Compliance analýza v oblasti IT managementu . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/27396

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Halinár, Martin. “Compliance analýza v oblasti IT managementu .” 2013. Thesis, Brno University of Technology. Accessed April 09, 2020. http://hdl.handle.net/11012/27396.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Halinár, Martin. “Compliance analýza v oblasti IT managementu .” 2013. Web. 09 Apr 2020.

Vancouver:

Halinár M. Compliance analýza v oblasti IT managementu . [Internet] [Thesis]. Brno University of Technology; 2013. [cited 2020 Apr 09]. Available from: http://hdl.handle.net/11012/27396.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Halinár M. Compliance analýza v oblasti IT managementu . [Thesis]. Brno University of Technology; 2013. Available from: http://hdl.handle.net/11012/27396

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Kennesaw State University

16. Colvin, Randy G. Management and Organizational Influences on the Compliance Behavior of Employees to Reduce Non-malicious IT Misuse Intention.

Degree: Information Systems, Business Administration, 2016, Kennesaw State University

  The widespread use of information technology and information systems (IT) throughout corporations, too often includes employees who choose not to follow the stated policies… (more)

Subjects/Keywords: cyber security; IT compliance; data breach; insider threats; employee IT misuse; nonmalicious IT use; Management Information Systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Colvin, R. G. (2016). Management and Organizational Influences on the Compliance Behavior of Employees to Reduce Non-malicious IT Misuse Intention. (Thesis). Kennesaw State University. Retrieved from https://digitalcommons.kennesaw.edu/dba_etd/21

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Colvin, Randy G. “Management and Organizational Influences on the Compliance Behavior of Employees to Reduce Non-malicious IT Misuse Intention.” 2016. Thesis, Kennesaw State University. Accessed April 09, 2020. https://digitalcommons.kennesaw.edu/dba_etd/21.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Colvin, Randy G. “Management and Organizational Influences on the Compliance Behavior of Employees to Reduce Non-malicious IT Misuse Intention.” 2016. Web. 09 Apr 2020.

Vancouver:

Colvin RG. Management and Organizational Influences on the Compliance Behavior of Employees to Reduce Non-malicious IT Misuse Intention. [Internet] [Thesis]. Kennesaw State University; 2016. [cited 2020 Apr 09]. Available from: https://digitalcommons.kennesaw.edu/dba_etd/21.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Colvin RG. Management and Organizational Influences on the Compliance Behavior of Employees to Reduce Non-malicious IT Misuse Intention. [Thesis]. Kennesaw State University; 2016. Available from: https://digitalcommons.kennesaw.edu/dba_etd/21

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

17. Rybáková, Alena. Posouzení a návrh informační bezpečnosti v organizaci .

Degree: 2015, Brno University of Technology

 Tato diplomová práce pojednává o problematice informační bezpečnosti v organizaci. Snahou autorky je získat široký přehled souvislostí, které potom budou zhodnoceny v závěrečné části, při… (more)

Subjects/Keywords: ISMS; ITSM; bezpečnost informací; kybernetická bezpečnost; IT služby; ISMS; ITSM; information security; cyber security; IT services

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rybáková, A. (2015). Posouzení a návrh informační bezpečnosti v organizaci . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/39325

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Rybáková, Alena. “Posouzení a návrh informační bezpečnosti v organizaci .” 2015. Thesis, Brno University of Technology. Accessed April 09, 2020. http://hdl.handle.net/11012/39325.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Rybáková, Alena. “Posouzení a návrh informační bezpečnosti v organizaci .” 2015. Web. 09 Apr 2020.

Vancouver:

Rybáková A. Posouzení a návrh informační bezpečnosti v organizaci . [Internet] [Thesis]. Brno University of Technology; 2015. [cited 2020 Apr 09]. Available from: http://hdl.handle.net/11012/39325.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Rybáková A. Posouzení a návrh informační bezpečnosti v organizaci . [Thesis]. Brno University of Technology; 2015. Available from: http://hdl.handle.net/11012/39325

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

18. Mirbaz, Jamshid. Säkerhetsstyrning inom den Finansiella Sektorn : En Studie på Best Practice hos Tre Svenska Banker.

Degree: Industrial Information and Control Systems, 2012, KTH

  For organizations that handle sensitive information, IT governance and information security are necessities in order to maintain credibility and to conduct its business efficiently.… (more)

Subjects/Keywords: IT Governance; IT Infrastructure; Information Security; Security

…på ett företags IT-stöd. Därför behöver företagen en ständig förändring av IT-system för… …förbättring av IT är i dagsläget nyckeln till ett företags lönsamhet. IT-stöd blir alltmer en… …överenskommelser mellan olika parter för att informationshanteringen och IT-stödet skall kunna fungera… …verksamhetens viktigaste resurser. [8] IT-behoven för ett företag misstolkas ofta och det… …kan leda till att fokus läggs på felprioriteringar. Det kan leda till att nya IT-system köps… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mirbaz, J. (2012). Säkerhetsstyrning inom den Finansiella Sektorn : En Studie på Best Practice hos Tre Svenska Banker. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-98863

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Mirbaz, Jamshid. “Säkerhetsstyrning inom den Finansiella Sektorn : En Studie på Best Practice hos Tre Svenska Banker.” 2012. Thesis, KTH. Accessed April 09, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-98863.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Mirbaz, Jamshid. “Säkerhetsstyrning inom den Finansiella Sektorn : En Studie på Best Practice hos Tre Svenska Banker.” 2012. Web. 09 Apr 2020.

Vancouver:

Mirbaz J. Säkerhetsstyrning inom den Finansiella Sektorn : En Studie på Best Practice hos Tre Svenska Banker. [Internet] [Thesis]. KTH; 2012. [cited 2020 Apr 09]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-98863.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Mirbaz J. Säkerhetsstyrning inom den Finansiella Sektorn : En Studie på Best Practice hos Tre Svenska Banker. [Thesis]. KTH; 2012. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-98863

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

19. Bertilsson, Linus. IT-säkerhetspolicy : - en studie kring anställdas kunskap om två verksamheters IT-säkerhetspolicys.

Degree: Computer and Electrical Engineering (IDE), 2014, Halmstad University

IT-användandet bland Sveriges företag är mycket stort och utvecklingen går snabbt framåt. Samtidigt som teknologin skapar möjligheter så skapar den även hot mot företagen… (more)

Subjects/Keywords: IT; IT-security; computersecurity; IT-policy; IT-securitypolicy; IT; forensik; it-säkerhet; it-policy; it-säkerhetspolicy

…underlaget i undersökningen och två intervjuer genomfördes som komplement. Verksamheternas IT… …underlag till frågeställningen kring anställdas kunskapsnivå kring den egna verksamhetens IT… …intervju kan ge en bredare bild kring företagens kompetens gällande IT-säkerhetspolicys och inte… …verksamheternas IT-säkerhetspolicys och frågor ställdes kring dem. Efter en noggrann granskning av… …egna verksamhetens IT-säkerhetspolicy och därför skräddarsyddes två olika enkätformulär med… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bertilsson, L. (2014). IT-säkerhetspolicy : - en studie kring anställdas kunskap om två verksamheters IT-säkerhetspolicys. (Thesis). Halmstad University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-25846

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Bertilsson, Linus. “IT-säkerhetspolicy : - en studie kring anställdas kunskap om två verksamheters IT-säkerhetspolicys.” 2014. Thesis, Halmstad University. Accessed April 09, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-25846.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Bertilsson, Linus. “IT-säkerhetspolicy : - en studie kring anställdas kunskap om två verksamheters IT-säkerhetspolicys.” 2014. Web. 09 Apr 2020.

Vancouver:

Bertilsson L. IT-säkerhetspolicy : - en studie kring anställdas kunskap om två verksamheters IT-säkerhetspolicys. [Internet] [Thesis]. Halmstad University; 2014. [cited 2020 Apr 09]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-25846.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Bertilsson L. IT-säkerhetspolicy : - en studie kring anställdas kunskap om två verksamheters IT-säkerhetspolicys. [Thesis]. Halmstad University; 2014. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-25846

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


KTH

20. Sparell, Peder. Lingvistisk knäckning av lösenordsfraser.

Degree: Computer Science and Communication (CSC), 2015, KTH

För att minnas långa lösenord är det inte ovanligt att användare rekommenderas att skapa en mening som sedan sätts ihop till ett långt lösenord,… (more)

Subjects/Keywords: passwords; information security; cyber security; IT forensics; passphrases; markov chains; n-gram; entropy; cracking; lösenord; informationssäkerhet; it-säkerhet; it-forensik; lösenordsfraser; markovkedjor; n-gram; entropi; knäckning; Computer Sciences; Datavetenskap (datalogi)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sparell, P. (2015). Lingvistisk knäckning av lösenordsfraser. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-169881

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Sparell, Peder. “Lingvistisk knäckning av lösenordsfraser.” 2015. Thesis, KTH. Accessed April 09, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-169881.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Sparell, Peder. “Lingvistisk knäckning av lösenordsfraser.” 2015. Web. 09 Apr 2020.

Vancouver:

Sparell P. Lingvistisk knäckning av lösenordsfraser. [Internet] [Thesis]. KTH; 2015. [cited 2020 Apr 09]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-169881.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Sparell P. Lingvistisk knäckning av lösenordsfraser. [Thesis]. KTH; 2015. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-169881

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Tasmania

21. de la Motte, LH. A conceptual model for compliant management systems.

Degree: 2012, University of Tasmania

 The dissertation specifies a Set of Concepts and a Conceptual Model for Compliant Management Systems (CMSs). The Set of Concepts is drawn from existing methodologies… (more)

Subjects/Keywords: computer security management; contract e-business compliance; IT law

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

de la Motte, L. (2012). A conceptual model for compliant management systems. (Thesis). University of Tasmania. Retrieved from https://eprints.utas.edu.au/15907/1/front-delamotte-2012.pdf ; https://eprints.utas.edu.au/15907/2/whole-delamotte-2012.pdf

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

de la Motte, LH. “A conceptual model for compliant management systems.” 2012. Thesis, University of Tasmania. Accessed April 09, 2020. https://eprints.utas.edu.au/15907/1/front-delamotte-2012.pdf ; https://eprints.utas.edu.au/15907/2/whole-delamotte-2012.pdf.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

de la Motte, LH. “A conceptual model for compliant management systems.” 2012. Web. 09 Apr 2020.

Vancouver:

de la Motte L. A conceptual model for compliant management systems. [Internet] [Thesis]. University of Tasmania; 2012. [cited 2020 Apr 09]. Available from: https://eprints.utas.edu.au/15907/1/front-delamotte-2012.pdf ; https://eprints.utas.edu.au/15907/2/whole-delamotte-2012.pdf.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

de la Motte L. A conceptual model for compliant management systems. [Thesis]. University of Tasmania; 2012. Available from: https://eprints.utas.edu.au/15907/1/front-delamotte-2012.pdf ; https://eprints.utas.edu.au/15907/2/whole-delamotte-2012.pdf

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brigham Young University

22. Newby, Chandler Ryan. Designing Cybersecurity Competitions in the Cloud: A Framework and Feasibility Study.

Degree: MS, 2018, Brigham Young University

  Cybersecurity is an ever-expanding field. In order to stay current, training, development, and constant learning are necessary. One of these training methods has historically… (more)

Subjects/Keywords: cybersecurity; IT; cloud; virtualization; competition; CCDC; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Newby, C. R. (2018). Designing Cybersecurity Competitions in the Cloud: A Framework and Feasibility Study. (Masters Thesis). Brigham Young University. Retrieved from https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=8417&context=etd

Chicago Manual of Style (16th Edition):

Newby, Chandler Ryan. “Designing Cybersecurity Competitions in the Cloud: A Framework and Feasibility Study.” 2018. Masters Thesis, Brigham Young University. Accessed April 09, 2020. https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=8417&context=etd.

MLA Handbook (7th Edition):

Newby, Chandler Ryan. “Designing Cybersecurity Competitions in the Cloud: A Framework and Feasibility Study.” 2018. Web. 09 Apr 2020.

Vancouver:

Newby CR. Designing Cybersecurity Competitions in the Cloud: A Framework and Feasibility Study. [Internet] [Masters thesis]. Brigham Young University; 2018. [cited 2020 Apr 09]. Available from: https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=8417&context=etd.

Council of Science Editors:

Newby CR. Designing Cybersecurity Competitions in the Cloud: A Framework and Feasibility Study. [Masters Thesis]. Brigham Young University; 2018. Available from: https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=8417&context=etd


KTH

23. Kang, Johan. Diffusion of Cybersecurity Technology - Next Generation, Powered by Artificial Intelligence.

Degree: Industrial Economics and Management (Dept.), 2018, KTH

The cyber world is growing as more information is converted from analogue to digital form. While convenience has been the main driver for this… (more)

Subjects/Keywords: Cybersecurity; IT-security; Artificial Intelligence; Diffusion of Innovation; Technology Adoption; IT innovation; Security Strategy; Cybersecurity; IT-security; Artificial Intelligence; Diffusion of Innovation; Technology Adoption; IT innovation; Security Strategy; Economics and Business; Ekonomi och näringsliv

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kang, J. (2018). Diffusion of Cybersecurity Technology - Next Generation, Powered by Artificial Intelligence. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-246027

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kang, Johan. “Diffusion of Cybersecurity Technology - Next Generation, Powered by Artificial Intelligence.” 2018. Thesis, KTH. Accessed April 09, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-246027.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kang, Johan. “Diffusion of Cybersecurity Technology - Next Generation, Powered by Artificial Intelligence.” 2018. Web. 09 Apr 2020.

Vancouver:

Kang J. Diffusion of Cybersecurity Technology - Next Generation, Powered by Artificial Intelligence. [Internet] [Thesis]. KTH; 2018. [cited 2020 Apr 09]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-246027.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kang J. Diffusion of Cybersecurity Technology - Next Generation, Powered by Artificial Intelligence. [Thesis]. KTH; 2018. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-246027

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of South Africa

24. Basani, Mandla. Towards a framework to ensure alignment among information security professionals, ICT security auditors and regulatory officials in implementing information security in South Africa .

Degree: 2012, University of South Africa

 Information security in the form of IT governance is part of corporate governance. Corporate governance requires that structures and processes are in place with appropriate… (more)

Subjects/Keywords: Information security professionals,; ICT security auditors,; Regulatory officials; Framework; Role players; Information security programme; Corporate governance; IT governance; COBIT

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Basani, M. (2012). Towards a framework to ensure alignment among information security professionals, ICT security auditors and regulatory officials in implementing information security in South Africa . (Masters Thesis). University of South Africa. Retrieved from http://hdl.handle.net/10500/9300

Chicago Manual of Style (16th Edition):

Basani, Mandla. “Towards a framework to ensure alignment among information security professionals, ICT security auditors and regulatory officials in implementing information security in South Africa .” 2012. Masters Thesis, University of South Africa. Accessed April 09, 2020. http://hdl.handle.net/10500/9300.

MLA Handbook (7th Edition):

Basani, Mandla. “Towards a framework to ensure alignment among information security professionals, ICT security auditors and regulatory officials in implementing information security in South Africa .” 2012. Web. 09 Apr 2020.

Vancouver:

Basani M. Towards a framework to ensure alignment among information security professionals, ICT security auditors and regulatory officials in implementing information security in South Africa . [Internet] [Masters thesis]. University of South Africa; 2012. [cited 2020 Apr 09]. Available from: http://hdl.handle.net/10500/9300.

Council of Science Editors:

Basani M. Towards a framework to ensure alignment among information security professionals, ICT security auditors and regulatory officials in implementing information security in South Africa . [Masters Thesis]. University of South Africa; 2012. Available from: http://hdl.handle.net/10500/9300


East Carolina University

25. Vail, John Edwards. Small Business Information Security.

Degree: 2012, East Carolina University

 Small businesses account for over fifty percent of the Gross National Product of the U.S. economy; and the security of their information systems is critical… (more)

Subjects/Keywords: Information technology; Information security; Information technology management; Information technology policy; IT due diligence; IT governance; Small business information security; Small business – Technological innovations; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Vail, J. E. (2012). Small Business Information Security. (Thesis). East Carolina University. Retrieved from http://hdl.handle.net/10342/3889

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Vail, John Edwards. “Small Business Information Security.” 2012. Thesis, East Carolina University. Accessed April 09, 2020. http://hdl.handle.net/10342/3889.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Vail, John Edwards. “Small Business Information Security.” 2012. Web. 09 Apr 2020.

Vancouver:

Vail JE. Small Business Information Security. [Internet] [Thesis]. East Carolina University; 2012. [cited 2020 Apr 09]. Available from: http://hdl.handle.net/10342/3889.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Vail JE. Small Business Information Security. [Thesis]. East Carolina University; 2012. Available from: http://hdl.handle.net/10342/3889

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

26. Čampula, Roman. Zavedení managementu informační bezpečnosti v malém podniku .

Degree: 2013, Brno University of Technology

 Tato diplomová práce analyzuje bezpečnostní situaci softwarové firmy. Obsahuje teoretické poznatky, které jsou pro zavedení systému bezpečnosti informací nezbytné, a ukazuje způsob jejich aplikace. Na… (more)

Subjects/Keywords: Bezpečnosti IT; informační bezpečnost; management bezpečnosti informací; analýza rizik; informační systém; ČSN ISO/IEC 27000; IT security; information security; management information security; risk analysis; information system; ČSN ISO/IEC 27000

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Čampula, R. (2013). Zavedení managementu informační bezpečnosti v malém podniku . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/25043

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Čampula, Roman. “Zavedení managementu informační bezpečnosti v malém podniku .” 2013. Thesis, Brno University of Technology. Accessed April 09, 2020. http://hdl.handle.net/11012/25043.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Čampula, Roman. “Zavedení managementu informační bezpečnosti v malém podniku .” 2013. Web. 09 Apr 2020.

Vancouver:

Čampula R. Zavedení managementu informační bezpečnosti v malém podniku . [Internet] [Thesis]. Brno University of Technology; 2013. [cited 2020 Apr 09]. Available from: http://hdl.handle.net/11012/25043.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Čampula R. Zavedení managementu informační bezpečnosti v malém podniku . [Thesis]. Brno University of Technology; 2013. Available from: http://hdl.handle.net/11012/25043

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

27. Bravc, Jernej. METODA ZA UVEDBO IN VZDRŽEVANJE SISTEMA ZA UPRAVLJANJE INFORMACIJSKE VARNOSTI V PODJETJU.

Degree: 2012, Univerza v Mariboru

V magistrskem delu smo poudarili pomembnost ustreznega nivoja informacijske varnosti, ki ga podjetjem zagotavlja sistem za upravljanje informacijske varnosti. Za njegovo uvedbo in učinkovito vzdrževanje… (more)

Subjects/Keywords: upravljanje IT; informacijska varnost; sistem za upravljanje informacijske varnosti (SUIV); informacijska varnostna politika; upravljanje IT tveganj; IT governance; information security; information security management system (ISMS); information security policy; IT risk management; info:eu-repo/classification/udc/005:004.6/.7.056(043)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bravc, J. (2012). METODA ZA UVEDBO IN VZDRŽEVANJE SISTEMA ZA UPRAVLJANJE INFORMACIJSKE VARNOSTI V PODJETJU. (Masters Thesis). Univerza v Mariboru. Retrieved from https://dk.um.si/IzpisGradiva.php?id=22671 ; https://dk.um.si/Dokument.php?id=29369&dn= ; https://plus.si.cobiss.net/opac7/bib/16000790?lang=sl

Chicago Manual of Style (16th Edition):

Bravc, Jernej. “METODA ZA UVEDBO IN VZDRŽEVANJE SISTEMA ZA UPRAVLJANJE INFORMACIJSKE VARNOSTI V PODJETJU.” 2012. Masters Thesis, Univerza v Mariboru. Accessed April 09, 2020. https://dk.um.si/IzpisGradiva.php?id=22671 ; https://dk.um.si/Dokument.php?id=29369&dn= ; https://plus.si.cobiss.net/opac7/bib/16000790?lang=sl.

MLA Handbook (7th Edition):

Bravc, Jernej. “METODA ZA UVEDBO IN VZDRŽEVANJE SISTEMA ZA UPRAVLJANJE INFORMACIJSKE VARNOSTI V PODJETJU.” 2012. Web. 09 Apr 2020.

Vancouver:

Bravc J. METODA ZA UVEDBO IN VZDRŽEVANJE SISTEMA ZA UPRAVLJANJE INFORMACIJSKE VARNOSTI V PODJETJU. [Internet] [Masters thesis]. Univerza v Mariboru; 2012. [cited 2020 Apr 09]. Available from: https://dk.um.si/IzpisGradiva.php?id=22671 ; https://dk.um.si/Dokument.php?id=29369&dn= ; https://plus.si.cobiss.net/opac7/bib/16000790?lang=sl.

Council of Science Editors:

Bravc J. METODA ZA UVEDBO IN VZDRŽEVANJE SISTEMA ZA UPRAVLJANJE INFORMACIJSKE VARNOSTI V PODJETJU. [Masters Thesis]. Univerza v Mariboru; 2012. Available from: https://dk.um.si/IzpisGradiva.php?id=22671 ; https://dk.um.si/Dokument.php?id=29369&dn= ; https://plus.si.cobiss.net/opac7/bib/16000790?lang=sl


Brno University of Technology

28. Kornelly, Aleš. Budování bezpečnostního povědomí na střední a vyšší odborné škole .

Degree: 2016, Brno University of Technology

 Tato diplomová práce se zabývá návrhem a zavedením ISMS na konkrétní střední škole. Cílem práce je poskytnutí vlastních doporučení a návrhů na zlepšení současné situace.… (more)

Subjects/Keywords: IT bezpečnost; informace; data; ISMS; ISO/IEC 27001; IT Security; information; data; ISMS; ISO/IEC 27001

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kornelly, A. (2016). Budování bezpečnostního povědomí na střední a vyšší odborné škole . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/59324

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kornelly, Aleš. “Budování bezpečnostního povědomí na střední a vyšší odborné škole .” 2016. Thesis, Brno University of Technology. Accessed April 09, 2020. http://hdl.handle.net/11012/59324.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kornelly, Aleš. “Budování bezpečnostního povědomí na střední a vyšší odborné škole .” 2016. Web. 09 Apr 2020.

Vancouver:

Kornelly A. Budování bezpečnostního povědomí na střední a vyšší odborné škole . [Internet] [Thesis]. Brno University of Technology; 2016. [cited 2020 Apr 09]. Available from: http://hdl.handle.net/11012/59324.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kornelly A. Budování bezpečnostního povědomí na střední a vyšší odborné škole . [Thesis]. Brno University of Technology; 2016. Available from: http://hdl.handle.net/11012/59324

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

29. Sidor, Peter. Návrh infrastruktury ICS pro průmyslový podnik .

Degree: 2017, Brno University of Technology

 Táto práca sa zaoberá problematikou priemyselnej komunikácie, ktorú je nutné brať do úvahy pred konečným návrhom priemyselnej infraštruktúry a celkovému návrhu sieťovej infraštruktúry pre konkrétny… (more)

Subjects/Keywords: ICS; IT komunikácia; priemyselná infraštruktúra; bezpečnosť; firewall; Ethernet; ICS; IT communication; industrial infrastructure; security; firewall; Ethernet

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sidor, P. (2017). Návrh infrastruktury ICS pro průmyslový podnik . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/65321

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Sidor, Peter. “Návrh infrastruktury ICS pro průmyslový podnik .” 2017. Thesis, Brno University of Technology. Accessed April 09, 2020. http://hdl.handle.net/11012/65321.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Sidor, Peter. “Návrh infrastruktury ICS pro průmyslový podnik .” 2017. Web. 09 Apr 2020.

Vancouver:

Sidor P. Návrh infrastruktury ICS pro průmyslový podnik . [Internet] [Thesis]. Brno University of Technology; 2017. [cited 2020 Apr 09]. Available from: http://hdl.handle.net/11012/65321.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Sidor P. Návrh infrastruktury ICS pro průmyslový podnik . [Thesis]. Brno University of Technology; 2017. Available from: http://hdl.handle.net/11012/65321

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Vienna

30. Gelashvili, Nino. CRM support for creating IT security awareness with electronic banking customers.

Degree: 2017, University of Vienna

Sicherheit von Informationssystemen ist ein kritisches Thema für jede Organisation, insbesondere für die Finanzinstitute. Die häufigsten Bedrohungen für die Sicherheit des elektronischen Bankings in den… (more)

Subjects/Keywords: 54.38 Computersicherheit; Informationssysteme / IT-Sicherheitsbewusstsein / Bildung / Kunden / CRM-Tool; Information Systems / CRM support tool / IT security awareness / customer education

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gelashvili, N. (2017). CRM support for creating IT security awareness with electronic banking customers. (Thesis). University of Vienna. Retrieved from http://othes.univie.ac.at/50465/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Gelashvili, Nino. “CRM support for creating IT security awareness with electronic banking customers.” 2017. Thesis, University of Vienna. Accessed April 09, 2020. http://othes.univie.ac.at/50465/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Gelashvili, Nino. “CRM support for creating IT security awareness with electronic banking customers.” 2017. Web. 09 Apr 2020.

Vancouver:

Gelashvili N. CRM support for creating IT security awareness with electronic banking customers. [Internet] [Thesis]. University of Vienna; 2017. [cited 2020 Apr 09]. Available from: http://othes.univie.ac.at/50465/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Gelashvili N. CRM support for creating IT security awareness with electronic banking customers. [Thesis]. University of Vienna; 2017. Available from: http://othes.univie.ac.at/50465/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2] [3] [4] [5]

.