Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Information Security Management System). Showing records 1 – 30 of 185218 total matches.

[1] [2] [3] [4] [5] … [6174]

Search Limiters

Last 2 Years | English Only

Degrees

Languages

Country

▼ Search Limiters


NSYSU

1. Kuo, Jui-hsiang. Study on the Integration of Information Security Management System and Personal Information Management System.

Degree: Master, Information Management, 2013, NSYSU

 With the formally carrying out of the Personal Information Protection Act, the Party is going to realize his own rights to his personal information. Therefore,… (more)

Subjects/Keywords: Personal Information Management System; Information Security Management System; Information Security and Personal Information Management System

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kuo, J. (2013). Study on the Integration of Information Security Management System and Personal Information Management System. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0624113-215807

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kuo, Jui-hsiang. “Study on the Integration of Information Security Management System and Personal Information Management System.” 2013. Thesis, NSYSU. Accessed January 25, 2020. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0624113-215807.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kuo, Jui-hsiang. “Study on the Integration of Information Security Management System and Personal Information Management System.” 2013. Web. 25 Jan 2020.

Vancouver:

Kuo J. Study on the Integration of Information Security Management System and Personal Information Management System. [Internet] [Thesis]. NSYSU; 2013. [cited 2020 Jan 25]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0624113-215807.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kuo J. Study on the Integration of Information Security Management System and Personal Information Management System. [Thesis]. NSYSU; 2013. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0624113-215807

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Loughborough University

2. Al-Hamar, Aisha. Enhancing information security in organisations in Qatar.

Degree: PhD, 2018, Loughborough University

 Due to the universal use of technology and its pervasive connection to the world, organisations have become more exposed to frequent and various threats. Therefore,… (more)

Subjects/Keywords: Information security; Information security policy; Information security awareness; Information security management system; Information security culture; Qatar National Information Assurance policy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Al-Hamar, A. (2018). Enhancing information security in organisations in Qatar. (Doctoral Dissertation). Loughborough University. Retrieved from https://dspace.lboro.ac.uk/2134/33541 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.747959

Chicago Manual of Style (16th Edition):

Al-Hamar, Aisha. “Enhancing information security in organisations in Qatar.” 2018. Doctoral Dissertation, Loughborough University. Accessed January 25, 2020. https://dspace.lboro.ac.uk/2134/33541 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.747959.

MLA Handbook (7th Edition):

Al-Hamar, Aisha. “Enhancing information security in organisations in Qatar.” 2018. Web. 25 Jan 2020.

Vancouver:

Al-Hamar A. Enhancing information security in organisations in Qatar. [Internet] [Doctoral dissertation]. Loughborough University; 2018. [cited 2020 Jan 25]. Available from: https://dspace.lboro.ac.uk/2134/33541 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.747959.

Council of Science Editors:

Al-Hamar A. Enhancing information security in organisations in Qatar. [Doctoral Dissertation]. Loughborough University; 2018. Available from: https://dspace.lboro.ac.uk/2134/33541 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.747959


Loughborough University

3. Al-Hamar, Aisha. Enhancing information security in organisations in Qatar.

Degree: PhD, 2018, Loughborough University

 Due to the universal use of technology and its pervasive connection to the world, organisations have become more exposed to frequent and various threats. Therefore,… (more)

Subjects/Keywords: Information security; Information security policy; Information security awareness; Information security management system; Information security culture; Qatar National Information Assurance policy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Al-Hamar, A. (2018). Enhancing information security in organisations in Qatar. (Doctoral Dissertation). Loughborough University. Retrieved from http://hdl.handle.net/2134/33541

Chicago Manual of Style (16th Edition):

Al-Hamar, Aisha. “Enhancing information security in organisations in Qatar.” 2018. Doctoral Dissertation, Loughborough University. Accessed January 25, 2020. http://hdl.handle.net/2134/33541.

MLA Handbook (7th Edition):

Al-Hamar, Aisha. “Enhancing information security in organisations in Qatar.” 2018. Web. 25 Jan 2020.

Vancouver:

Al-Hamar A. Enhancing information security in organisations in Qatar. [Internet] [Doctoral dissertation]. Loughborough University; 2018. [cited 2020 Jan 25]. Available from: http://hdl.handle.net/2134/33541.

Council of Science Editors:

Al-Hamar A. Enhancing information security in organisations in Qatar. [Doctoral Dissertation]. Loughborough University; 2018. Available from: http://hdl.handle.net/2134/33541


University of Plymouth

4. Miloslavskaya, Natalia. Network security intelligence centres for information security incident management.

Degree: PhD, 2019, University of Plymouth

 Intensive IT development has led to qualitative changes in our living, which are driving current information security (IS) trends and require sophisticated structures and adequate… (more)

Subjects/Keywords: Network Security Intelligence Centre; Information Security Incident Management; Security Information and Event Management system

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Miloslavskaya, N. (2019). Network security intelligence centres for information security incident management. (Doctoral Dissertation). University of Plymouth. Retrieved from http://hdl.handle.net/10026.1/14306

Chicago Manual of Style (16th Edition):

Miloslavskaya, Natalia. “Network security intelligence centres for information security incident management.” 2019. Doctoral Dissertation, University of Plymouth. Accessed January 25, 2020. http://hdl.handle.net/10026.1/14306.

MLA Handbook (7th Edition):

Miloslavskaya, Natalia. “Network security intelligence centres for information security incident management.” 2019. Web. 25 Jan 2020.

Vancouver:

Miloslavskaya N. Network security intelligence centres for information security incident management. [Internet] [Doctoral dissertation]. University of Plymouth; 2019. [cited 2020 Jan 25]. Available from: http://hdl.handle.net/10026.1/14306.

Council of Science Editors:

Miloslavskaya N. Network security intelligence centres for information security incident management. [Doctoral Dissertation]. University of Plymouth; 2019. Available from: http://hdl.handle.net/10026.1/14306


NSYSU

5. Tsao, Yu-Jen. The effect of Information Security Management System in Hospitals on the Maturity of Information Security.

Degree: Master, Information Management, 2017, NSYSU

 In recent years, with the advancement and development of information technology, the issue of information security has become the most important of hospitals. Taking the… (more)

Subjects/Keywords: Conflict; Information Security Policy; Information Security Maturity; Information Security Management System; Coordination Mechanism; Information Security Management Acceptance

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tsao, Y. (2017). The effect of Information Security Management System in Hospitals on the Maturity of Information Security. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0717117-212100

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tsao, Yu-Jen. “The effect of Information Security Management System in Hospitals on the Maturity of Information Security.” 2017. Thesis, NSYSU. Accessed January 25, 2020. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0717117-212100.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tsao, Yu-Jen. “The effect of Information Security Management System in Hospitals on the Maturity of Information Security.” 2017. Web. 25 Jan 2020.

Vancouver:

Tsao Y. The effect of Information Security Management System in Hospitals on the Maturity of Information Security. [Internet] [Thesis]. NSYSU; 2017. [cited 2020 Jan 25]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0717117-212100.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tsao Y. The effect of Information Security Management System in Hospitals on the Maturity of Information Security. [Thesis]. NSYSU; 2017. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0717117-212100

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Newcastle

6. Pranata, Ilung. Architecture for security and trust in digital environments (SecuTIDE).

Degree: PhD, 2014, University of Newcastle

Research Doctorate - Doctor of Philosophy (PhD)

Digital environments have long been considered an enabler for information sharing, electronic transactions, knowledge dissemination and online collaborations.… (more)

Subjects/Keywords: authentication; authorisation; trust; trust management system; online ratings; information security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pranata, I. (2014). Architecture for security and trust in digital environments (SecuTIDE). (Doctoral Dissertation). University of Newcastle. Retrieved from http://hdl.handle.net/1959.13/1040878

Chicago Manual of Style (16th Edition):

Pranata, Ilung. “Architecture for security and trust in digital environments (SecuTIDE).” 2014. Doctoral Dissertation, University of Newcastle. Accessed January 25, 2020. http://hdl.handle.net/1959.13/1040878.

MLA Handbook (7th Edition):

Pranata, Ilung. “Architecture for security and trust in digital environments (SecuTIDE).” 2014. Web. 25 Jan 2020.

Vancouver:

Pranata I. Architecture for security and trust in digital environments (SecuTIDE). [Internet] [Doctoral dissertation]. University of Newcastle; 2014. [cited 2020 Jan 25]. Available from: http://hdl.handle.net/1959.13/1040878.

Council of Science Editors:

Pranata I. Architecture for security and trust in digital environments (SecuTIDE). [Doctoral Dissertation]. University of Newcastle; 2014. Available from: http://hdl.handle.net/1959.13/1040878


McMaster University

7. Tu, Zhiling. Information Security Management: A Critical Success Factors Analysis.

Degree: PhD, 2015, McMaster University

Information security has been a crucial strategic issue in organizational management. Information security management (ISM) is a systematic process of effectively coping with information security(more)

Subjects/Keywords: Information Security Management

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tu, Z. (2015). Information Security Management: A Critical Success Factors Analysis. (Doctoral Dissertation). McMaster University. Retrieved from http://hdl.handle.net/11375/18168

Chicago Manual of Style (16th Edition):

Tu, Zhiling. “Information Security Management: A Critical Success Factors Analysis.” 2015. Doctoral Dissertation, McMaster University. Accessed January 25, 2020. http://hdl.handle.net/11375/18168.

MLA Handbook (7th Edition):

Tu, Zhiling. “Information Security Management: A Critical Success Factors Analysis.” 2015. Web. 25 Jan 2020.

Vancouver:

Tu Z. Information Security Management: A Critical Success Factors Analysis. [Internet] [Doctoral dissertation]. McMaster University; 2015. [cited 2020 Jan 25]. Available from: http://hdl.handle.net/11375/18168.

Council of Science Editors:

Tu Z. Information Security Management: A Critical Success Factors Analysis. [Doctoral Dissertation]. McMaster University; 2015. Available from: http://hdl.handle.net/11375/18168


Brno University of Technology

8. Čampula, Roman. Zavedení managementu informační bezpečnosti v malém podniku .

Degree: 2013, Brno University of Technology

 Tato diplomová práce analyzuje bezpečnostní situaci softwarové firmy. Obsahuje teoretické poznatky, které jsou pro zavedení systému bezpečnosti informací nezbytné, a ukazuje způsob jejich aplikace. Na… (more)

Subjects/Keywords: Bezpečnosti IT; informační bezpečnost; management bezpečnosti informací; analýza rizik; informační systém; ČSN ISO/IEC 27000; IT security; information security; management information security; risk analysis; information system; ČSN ISO/IEC 27000

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Čampula, R. (2013). Zavedení managementu informační bezpečnosti v malém podniku . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/25043

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Čampula, Roman. “Zavedení managementu informační bezpečnosti v malém podniku .” 2013. Thesis, Brno University of Technology. Accessed January 25, 2020. http://hdl.handle.net/11012/25043.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Čampula, Roman. “Zavedení managementu informační bezpečnosti v malém podniku .” 2013. Web. 25 Jan 2020.

Vancouver:

Čampula R. Zavedení managementu informační bezpečnosti v malém podniku . [Internet] [Thesis]. Brno University of Technology; 2013. [cited 2020 Jan 25]. Available from: http://hdl.handle.net/11012/25043.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Čampula R. Zavedení managementu informační bezpečnosti v malém podniku . [Thesis]. Brno University of Technology; 2013. Available from: http://hdl.handle.net/11012/25043

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Wollongong

9. Saad Alarifi, Abdulaziz. Assessing and mitigating information security risk in Saudi Arabia.

Degree: PhD, 2013, University of Wollongong

  While the Web, cell phone ‘apps’ and cloud computing put a world of information at our fingertips, that information is under constant threat from… (more)

Subjects/Keywords: information security; information security awareness; information systems; information security management

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Saad Alarifi, A. (2013). Assessing and mitigating information security risk in Saudi Arabia. (Doctoral Dissertation). University of Wollongong. Retrieved from 0806 INFORMATION SYSTEMS, 080609 Information Systems Management ; https://ro.uow.edu.au/theses/4317

Chicago Manual of Style (16th Edition):

Saad Alarifi, Abdulaziz. “Assessing and mitigating information security risk in Saudi Arabia.” 2013. Doctoral Dissertation, University of Wollongong. Accessed January 25, 2020. 0806 INFORMATION SYSTEMS, 080609 Information Systems Management ; https://ro.uow.edu.au/theses/4317.

MLA Handbook (7th Edition):

Saad Alarifi, Abdulaziz. “Assessing and mitigating information security risk in Saudi Arabia.” 2013. Web. 25 Jan 2020.

Vancouver:

Saad Alarifi A. Assessing and mitigating information security risk in Saudi Arabia. [Internet] [Doctoral dissertation]. University of Wollongong; 2013. [cited 2020 Jan 25]. Available from: 0806 INFORMATION SYSTEMS, 080609 Information Systems Management ; https://ro.uow.edu.au/theses/4317.

Council of Science Editors:

Saad Alarifi A. Assessing and mitigating information security risk in Saudi Arabia. [Doctoral Dissertation]. University of Wollongong; 2013. Available from: 0806 INFORMATION SYSTEMS, 080609 Information Systems Management ; https://ro.uow.edu.au/theses/4317


NSYSU

10. Lu, Woei-Yuan. Study on Architecture-Oriented Enterprise Security Management Model.

Degree: Master, Information Management, 2015, NSYSU

 Due to the trend of globalization, international trade, and a variety of business activities, companies must be able to provide timely, safely, and integrity information(more)

Subjects/Keywords: Information Security Management System; International Organization for Standardization; Structure-Behavior Coalescence; Enterprise Architecture; Architecture-Oriented Enterprise Security Management Model

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lu, W. (2015). Study on Architecture-Oriented Enterprise Security Management Model. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0810115-110440

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lu, Woei-Yuan. “Study on Architecture-Oriented Enterprise Security Management Model.” 2015. Thesis, NSYSU. Accessed January 25, 2020. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0810115-110440.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lu, Woei-Yuan. “Study on Architecture-Oriented Enterprise Security Management Model.” 2015. Web. 25 Jan 2020.

Vancouver:

Lu W. Study on Architecture-Oriented Enterprise Security Management Model. [Internet] [Thesis]. NSYSU; 2015. [cited 2020 Jan 25]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0810115-110440.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lu W. Study on Architecture-Oriented Enterprise Security Management Model. [Thesis]. NSYSU; 2015. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0810115-110440

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

11. Trunkát, Jan. Návrh zavedení ISMS ve firmě .

Degree: 2015, Brno University of Technology

 Diplomová práce je zaměřená na návrh zavedení managementu bezpečnosti informací ve firmě. Seznamuje se základními pojmy z oblasti bezpečnosti informací a obsahuje obecné postupy systému… (more)

Subjects/Keywords: ISO/IEC 27000; systém řízení bezpečnosti informací; bezpečnost; bezpečnost informací; analýza rizik; bezpečnostní opatření; ISO/IEC 27000; information security management system; security; information security; risk analysis; security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Trunkát, J. (2015). Návrh zavedení ISMS ve firmě . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/40435

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Trunkát, Jan. “Návrh zavedení ISMS ve firmě .” 2015. Thesis, Brno University of Technology. Accessed January 25, 2020. http://hdl.handle.net/11012/40435.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Trunkát, Jan. “Návrh zavedení ISMS ve firmě .” 2015. Web. 25 Jan 2020.

Vancouver:

Trunkát J. Návrh zavedení ISMS ve firmě . [Internet] [Thesis]. Brno University of Technology; 2015. [cited 2020 Jan 25]. Available from: http://hdl.handle.net/11012/40435.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Trunkát J. Návrh zavedení ISMS ve firmě . [Thesis]. Brno University of Technology; 2015. Available from: http://hdl.handle.net/11012/40435

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Melbourne

12. MAYNARD, SEAN. Strategic information security policy quality assessment: a multiple constituency perspective.

Degree: 2010, University of Melbourne

 An integral part of any information security management program is the information security policy. The purpose of an information security policy is to define the… (more)

Subjects/Keywords: information security management; information security policy; information security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

MAYNARD, S. (2010). Strategic information security policy quality assessment: a multiple constituency perspective. (Doctoral Dissertation). University of Melbourne. Retrieved from http://hdl.handle.net/11343/42194

Chicago Manual of Style (16th Edition):

MAYNARD, SEAN. “Strategic information security policy quality assessment: a multiple constituency perspective.” 2010. Doctoral Dissertation, University of Melbourne. Accessed January 25, 2020. http://hdl.handle.net/11343/42194.

MLA Handbook (7th Edition):

MAYNARD, SEAN. “Strategic information security policy quality assessment: a multiple constituency perspective.” 2010. Web. 25 Jan 2020.

Vancouver:

MAYNARD S. Strategic information security policy quality assessment: a multiple constituency perspective. [Internet] [Doctoral dissertation]. University of Melbourne; 2010. [cited 2020 Jan 25]. Available from: http://hdl.handle.net/11343/42194.

Council of Science Editors:

MAYNARD S. Strategic information security policy quality assessment: a multiple constituency perspective. [Doctoral Dissertation]. University of Melbourne; 2010. Available from: http://hdl.handle.net/11343/42194


Technical University of Lisbon

13. Pina, João Nuno Esteves. Framework de auto-avaliação interna para gestão da segurança da informação : estudo de caso.

Degree: 2012, Technical University of Lisbon

Mestrado em Gestão de Sistemas de Informação

A importância da protecção da informação, associada aos factores de insucesso na implementação de Sistemas de Gestão da… (more)

Subjects/Keywords: Information Security Management System, ISO/IEC 27002:2005, auto-avaliação (Português) Information Security Management System, ISO/IEC 27002:2005, self ? evaluation; ISO/IEC 27002:2005; auto-avaliação; self-evaluation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pina, J. N. E. (2012). Framework de auto-avaliação interna para gestão da segurança da informação : estudo de caso. (Thesis). Technical University of Lisbon. Retrieved from http://www.rcaap.pt/detail.jsp?id=oai:www.repository.utl.pt:10400.5/10756

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Pina, João Nuno Esteves. “Framework de auto-avaliação interna para gestão da segurança da informação : estudo de caso.” 2012. Thesis, Technical University of Lisbon. Accessed January 25, 2020. http://www.rcaap.pt/detail.jsp?id=oai:www.repository.utl.pt:10400.5/10756.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Pina, João Nuno Esteves. “Framework de auto-avaliação interna para gestão da segurança da informação : estudo de caso.” 2012. Web. 25 Jan 2020.

Vancouver:

Pina JNE. Framework de auto-avaliação interna para gestão da segurança da informação : estudo de caso. [Internet] [Thesis]. Technical University of Lisbon; 2012. [cited 2020 Jan 25]. Available from: http://www.rcaap.pt/detail.jsp?id=oai:www.repository.utl.pt:10400.5/10756.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Pina JNE. Framework de auto-avaliação interna para gestão da segurança da informação : estudo de caso. [Thesis]. Technical University of Lisbon; 2012. Available from: http://www.rcaap.pt/detail.jsp?id=oai:www.repository.utl.pt:10400.5/10756

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

14. Hvězda, Vojtěch. Posouzení informačního systému firmy a návrh změn .

Degree: 2016, Brno University of Technology

 Diplomová práce řeší problém fyzického zabezpečení dokumentů v Document Management System (DMS) ve společnosti Icontio CR s.r.o. Tento fakt zajistí zvýšení bezpečnosti celého systému a… (more)

Subjects/Keywords: Document management system; secIQdoc; bezpečnost; broadcast encryption; informační systém; workflow; Document management system; secIQdoc; security; broadcast encryption; information systém; workflow

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hvězda, V. (2016). Posouzení informačního systému firmy a návrh změn . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/59383

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hvězda, Vojtěch. “Posouzení informačního systému firmy a návrh změn .” 2016. Thesis, Brno University of Technology. Accessed January 25, 2020. http://hdl.handle.net/11012/59383.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hvězda, Vojtěch. “Posouzení informačního systému firmy a návrh změn .” 2016. Web. 25 Jan 2020.

Vancouver:

Hvězda V. Posouzení informačního systému firmy a návrh změn . [Internet] [Thesis]. Brno University of Technology; 2016. [cited 2020 Jan 25]. Available from: http://hdl.handle.net/11012/59383.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hvězda V. Posouzení informačního systému firmy a návrh změn . [Thesis]. Brno University of Technology; 2016. Available from: http://hdl.handle.net/11012/59383

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Melbourne

15. Onibere, Mazino. Information security manager as a strategist.

Degree: 2015, University of Melbourne

 The modern organisation operates within a highly complex and sophisticated security threat landscape that exposes its information infrastructure to a range of security risks. This… (more)

Subjects/Keywords: information security strategy; information security management; information security strategic challenges; information security strategist

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Onibere, M. (2015). Information security manager as a strategist. (Masters Thesis). University of Melbourne. Retrieved from http://hdl.handle.net/11343/56595

Chicago Manual of Style (16th Edition):

Onibere, Mazino. “Information security manager as a strategist.” 2015. Masters Thesis, University of Melbourne. Accessed January 25, 2020. http://hdl.handle.net/11343/56595.

MLA Handbook (7th Edition):

Onibere, Mazino. “Information security manager as a strategist.” 2015. Web. 25 Jan 2020.

Vancouver:

Onibere M. Information security manager as a strategist. [Internet] [Masters thesis]. University of Melbourne; 2015. [cited 2020 Jan 25]. Available from: http://hdl.handle.net/11343/56595.

Council of Science Editors:

Onibere M. Information security manager as a strategist. [Masters Thesis]. University of Melbourne; 2015. Available from: http://hdl.handle.net/11343/56595

16. Tomažič, Samo. MODEL SISTEMA ZA UPRAVLJANJE INFORMACIJSKE VARNOSTI V DRŽAVNI UPRAVI.

Degree: 2012, Univerza v Mariboru

V magistrskem delu je predstavljena zasnova modela sistema za upravljanje informacijske varnosti za slovensko državno upravo. Informacijski sistemi v državni upravi morajo namreč zaradi svoje… (more)

Subjects/Keywords: informacijski sistem; varnost; upravljanje; SUIV; državna uprava; information system; security; management; ISMS; public administration

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tomažič, S. (2012). MODEL SISTEMA ZA UPRAVLJANJE INFORMACIJSKE VARNOSTI V DRŽAVNI UPRAVI. (Masters Thesis). Univerza v Mariboru. Retrieved from https://dk.um.si/IzpisGradiva.php?id=21863 ; https://dk.um.si/Dokument.php?id=27959&dn= ; https://plus.si.cobiss.net/opac7/bib/7017747?lang=sl

Chicago Manual of Style (16th Edition):

Tomažič, Samo. “MODEL SISTEMA ZA UPRAVLJANJE INFORMACIJSKE VARNOSTI V DRŽAVNI UPRAVI.” 2012. Masters Thesis, Univerza v Mariboru. Accessed January 25, 2020. https://dk.um.si/IzpisGradiva.php?id=21863 ; https://dk.um.si/Dokument.php?id=27959&dn= ; https://plus.si.cobiss.net/opac7/bib/7017747?lang=sl.

MLA Handbook (7th Edition):

Tomažič, Samo. “MODEL SISTEMA ZA UPRAVLJANJE INFORMACIJSKE VARNOSTI V DRŽAVNI UPRAVI.” 2012. Web. 25 Jan 2020.

Vancouver:

Tomažič S. MODEL SISTEMA ZA UPRAVLJANJE INFORMACIJSKE VARNOSTI V DRŽAVNI UPRAVI. [Internet] [Masters thesis]. Univerza v Mariboru; 2012. [cited 2020 Jan 25]. Available from: https://dk.um.si/IzpisGradiva.php?id=21863 ; https://dk.um.si/Dokument.php?id=27959&dn= ; https://plus.si.cobiss.net/opac7/bib/7017747?lang=sl.

Council of Science Editors:

Tomažič S. MODEL SISTEMA ZA UPRAVLJANJE INFORMACIJSKE VARNOSTI V DRŽAVNI UPRAVI. [Masters Thesis]. Univerza v Mariboru; 2012. Available from: https://dk.um.si/IzpisGradiva.php?id=21863 ; https://dk.um.si/Dokument.php?id=27959&dn= ; https://plus.si.cobiss.net/opac7/bib/7017747?lang=sl


KTH

17. ÖBERG, MIKAELA. A Study of the Implementation, Maintenance and Continual Improvement of an Information Security Management System.

Degree: Sustainability and Industrial Dynamics, 2016, KTH

  The high adoption rate of cloud computing technology is changing the strategic, operational and functional aspects of businesses. Though, as cloud computing is seeing… (more)

Subjects/Keywords: information security management system; cloud computing; awareness; tools; Economics and Business; Ekonomi och näringsliv

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

ÖBERG, M. (2016). A Study of the Implementation, Maintenance and Continual Improvement of an Information Security Management System. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-199084

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

ÖBERG, MIKAELA. “A Study of the Implementation, Maintenance and Continual Improvement of an Information Security Management System.” 2016. Thesis, KTH. Accessed January 25, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-199084.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

ÖBERG, MIKAELA. “A Study of the Implementation, Maintenance and Continual Improvement of an Information Security Management System.” 2016. Web. 25 Jan 2020.

Vancouver:

ÖBERG M. A Study of the Implementation, Maintenance and Continual Improvement of an Information Security Management System. [Internet] [Thesis]. KTH; 2016. [cited 2020 Jan 25]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-199084.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

ÖBERG M. A Study of the Implementation, Maintenance and Continual Improvement of an Information Security Management System. [Thesis]. KTH; 2016. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-199084

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Univerzitet u Beogradu

18. Marković-Petrović, Jasna D., 1968-. Procena bezbednosnog rizika u industrijskim sistemima daljinskog upravljanja.

Degree: Saobraćajni fakultet, 2019, Univerzitet u Beogradu

Saobraćajno inženjerstvo - Informaciono-komunikacione tehnologije /

Funkcija daljinskog upravljanja industrijskim sistemom postavlja specifične zahteve za informacionu i komunikacionu infrastrukturu, koja treba da obezbedi procesiranje i… (more)

Subjects/Keywords: industrial control system; Internet protocol; information security; security risk; risk management; risk assessment; denial of service; intrusion detection; intrusion prevention

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Marković-Petrović, Jasna D., 1. (2019). Procena bezbednosnog rizika u industrijskim sistemima daljinskog upravljanja. (Thesis). Univerzitet u Beogradu. Retrieved from https://fedorabg.bg.ac.rs/fedora/get/o:19201/bdef:Content/get

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Marković-Petrović, Jasna D., 1968-. “Procena bezbednosnog rizika u industrijskim sistemima daljinskog upravljanja.” 2019. Thesis, Univerzitet u Beogradu. Accessed January 25, 2020. https://fedorabg.bg.ac.rs/fedora/get/o:19201/bdef:Content/get.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Marković-Petrović, Jasna D., 1968-. “Procena bezbednosnog rizika u industrijskim sistemima daljinskog upravljanja.” 2019. Web. 25 Jan 2020.

Vancouver:

Marković-Petrović, Jasna D. 1. Procena bezbednosnog rizika u industrijskim sistemima daljinskog upravljanja. [Internet] [Thesis]. Univerzitet u Beogradu; 2019. [cited 2020 Jan 25]. Available from: https://fedorabg.bg.ac.rs/fedora/get/o:19201/bdef:Content/get.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Marković-Petrović, Jasna D. 1. Procena bezbednosnog rizika u industrijskim sistemima daljinskog upravljanja. [Thesis]. Univerzitet u Beogradu; 2019. Available from: https://fedorabg.bg.ac.rs/fedora/get/o:19201/bdef:Content/get

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Queensland University of Technology

19. Alfawaz, Salahuddin M. Information security management : a case study of an information security culture.

Degree: 2011, Queensland University of Technology

 This thesis argues that in order to establish a sound information security culture it is necessary to look at organisation's information security systems in a… (more)

Subjects/Keywords: information security; management; culture

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alfawaz, S. M. (2011). Information security management : a case study of an information security culture. (Thesis). Queensland University of Technology. Retrieved from https://eprints.qut.edu.au/41777/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Alfawaz, Salahuddin M. “Information security management : a case study of an information security culture.” 2011. Thesis, Queensland University of Technology. Accessed January 25, 2020. https://eprints.qut.edu.au/41777/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Alfawaz, Salahuddin M. “Information security management : a case study of an information security culture.” 2011. Web. 25 Jan 2020.

Vancouver:

Alfawaz SM. Information security management : a case study of an information security culture. [Internet] [Thesis]. Queensland University of Technology; 2011. [cited 2020 Jan 25]. Available from: https://eprints.qut.edu.au/41777/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Alfawaz SM. Information security management : a case study of an information security culture. [Thesis]. Queensland University of Technology; 2011. Available from: https://eprints.qut.edu.au/41777/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Nairobi

20. Ogero, Diana Kerubo. Influence of project management information system on project performance in the construction industry: a case of Nairobi County, Kenya .

Degree: 2014, University of Nairobi

 Construction projects are commonly acknowledged as successful when they are completed on time, within budget, and in accordance with specifications and to stakeholders’ satisfaction. Many… (more)

Subjects/Keywords: Management Information System

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ogero, D. K. (2014). Influence of project management information system on project performance in the construction industry: a case of Nairobi County, Kenya . (Thesis). University of Nairobi. Retrieved from http://hdl.handle.net/11295/75944

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ogero, Diana Kerubo. “Influence of project management information system on project performance in the construction industry: a case of Nairobi County, Kenya .” 2014. Thesis, University of Nairobi. Accessed January 25, 2020. http://hdl.handle.net/11295/75944.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ogero, Diana Kerubo. “Influence of project management information system on project performance in the construction industry: a case of Nairobi County, Kenya .” 2014. Web. 25 Jan 2020.

Vancouver:

Ogero DK. Influence of project management information system on project performance in the construction industry: a case of Nairobi County, Kenya . [Internet] [Thesis]. University of Nairobi; 2014. [cited 2020 Jan 25]. Available from: http://hdl.handle.net/11295/75944.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ogero DK. Influence of project management information system on project performance in the construction industry: a case of Nairobi County, Kenya . [Thesis]. University of Nairobi; 2014. Available from: http://hdl.handle.net/11295/75944

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

21. Dočekal, Petr. Návrh zavedení bezpečnostních opatření v souladu s ISMS pro obchodní společnost .

Degree: 2018, Brno University of Technology

 Diplomová práce se zaměřuje na oblast bezpečnostních opatření v souladu se systémem řízení bezpečnosti informací. Představuje základní teoretická východiska problematiky informační a kybernetické bezpečnosti a… (more)

Subjects/Keywords: informační bezpečnost; kybernetická bezpečnost; systém řízení bezpečnosti informací; ISO/IEC 27000; analýza rizik; opatření; information security; cyber security; information security management system; ISO/IEC 27000; risk analysis; countermeasure

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dočekal, P. (2018). Návrh zavedení bezpečnostních opatření v souladu s ISMS pro obchodní společnost . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/82260

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Dočekal, Petr. “Návrh zavedení bezpečnostních opatření v souladu s ISMS pro obchodní společnost .” 2018. Thesis, Brno University of Technology. Accessed January 25, 2020. http://hdl.handle.net/11012/82260.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Dočekal, Petr. “Návrh zavedení bezpečnostních opatření v souladu s ISMS pro obchodní společnost .” 2018. Web. 25 Jan 2020.

Vancouver:

Dočekal P. Návrh zavedení bezpečnostních opatření v souladu s ISMS pro obchodní společnost . [Internet] [Thesis]. Brno University of Technology; 2018. [cited 2020 Jan 25]. Available from: http://hdl.handle.net/11012/82260.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Dočekal P. Návrh zavedení bezpečnostních opatření v souladu s ISMS pro obchodní společnost . [Thesis]. Brno University of Technology; 2018. Available from: http://hdl.handle.net/11012/82260

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Sydney

22. Soyref, Maxim. The holistic management of information security processes .

Degree: 2014, University of Sydney

 Title: The holistic management of information security processes Keywords: cybersecurity, information security, strategy, security process, security governance, security management This research examines information security management(more)

Subjects/Keywords: Cybersecurity; Information security; Strategy; Security process; Security governance; Security management

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Soyref, M. (2014). The holistic management of information security processes . (Thesis). University of Sydney. Retrieved from http://hdl.handle.net/2123/13373

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Soyref, Maxim. “The holistic management of information security processes .” 2014. Thesis, University of Sydney. Accessed January 25, 2020. http://hdl.handle.net/2123/13373.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Soyref, Maxim. “The holistic management of information security processes .” 2014. Web. 25 Jan 2020.

Vancouver:

Soyref M. The holistic management of information security processes . [Internet] [Thesis]. University of Sydney; 2014. [cited 2020 Jan 25]. Available from: http://hdl.handle.net/2123/13373.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Soyref M. The holistic management of information security processes . [Thesis]. University of Sydney; 2014. Available from: http://hdl.handle.net/2123/13373

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

23. Bou Nassar, Pascal. Gestion de la sécurité dans une infrastructure de services dynamique : Une approche par gestion des risques : Security management in a dynamic services' infrastructure : A risk management approach.

Degree: Docteur es, Informatique, 2012, INSA Lyon

Les changements de contexte économiques imposent de nouvelles stratégies organisationnelles aux entreprises : recentrages métier et développement de stratégies de collaboration interentreprises. Ces tendances du… (more)

Subjects/Keywords: Informatique; Système d'information; Architecture orientée services; Sécurité; Gestion de la sécurité; Gestion des risques; Information Technology; Information system; Service-oriented architecture; Security; Security management; Risk management; 658.478 072

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bou Nassar, P. (2012). Gestion de la sécurité dans une infrastructure de services dynamique : Une approche par gestion des risques : Security management in a dynamic services' infrastructure : A risk management approach. (Doctoral Dissertation). INSA Lyon. Retrieved from http://www.theses.fr/2012ISAL0102

Chicago Manual of Style (16th Edition):

Bou Nassar, Pascal. “Gestion de la sécurité dans une infrastructure de services dynamique : Une approche par gestion des risques : Security management in a dynamic services' infrastructure : A risk management approach.” 2012. Doctoral Dissertation, INSA Lyon. Accessed January 25, 2020. http://www.theses.fr/2012ISAL0102.

MLA Handbook (7th Edition):

Bou Nassar, Pascal. “Gestion de la sécurité dans une infrastructure de services dynamique : Une approche par gestion des risques : Security management in a dynamic services' infrastructure : A risk management approach.” 2012. Web. 25 Jan 2020.

Vancouver:

Bou Nassar P. Gestion de la sécurité dans une infrastructure de services dynamique : Une approche par gestion des risques : Security management in a dynamic services' infrastructure : A risk management approach. [Internet] [Doctoral dissertation]. INSA Lyon; 2012. [cited 2020 Jan 25]. Available from: http://www.theses.fr/2012ISAL0102.

Council of Science Editors:

Bou Nassar P. Gestion de la sécurité dans une infrastructure de services dynamique : Une approche par gestion des risques : Security management in a dynamic services' infrastructure : A risk management approach. [Doctoral Dissertation]. INSA Lyon; 2012. Available from: http://www.theses.fr/2012ISAL0102


Universidade Federal da Bahia

24. Bianka Capelato Lucas. A segurança da informação em organizações de Salvador.

Degree: 2005, Universidade Federal da Bahia

Atualmente, a informação é tratada como um ativo pelas organizações. E como qualquer outro ativo importante para os negócios, ela precisa ser devidamente protegida para… (more)

Subjects/Keywords: CIENCIA DA INFORMACAO; informação; seguraça da informação; organizações; security of the information; system of management of security of the information; technology of the information

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lucas, B. C. (2005). A segurança da informação em organizações de Salvador. (Thesis). Universidade Federal da Bahia. Retrieved from http://www.bibliotecadigital.ufba.br/tde_busca/arquivo.php?codArquivo=1160

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lucas, Bianka Capelato. “A segurança da informação em organizações de Salvador.” 2005. Thesis, Universidade Federal da Bahia. Accessed January 25, 2020. http://www.bibliotecadigital.ufba.br/tde_busca/arquivo.php?codArquivo=1160.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lucas, Bianka Capelato. “A segurança da informação em organizações de Salvador.” 2005. Web. 25 Jan 2020.

Vancouver:

Lucas BC. A segurança da informação em organizações de Salvador. [Internet] [Thesis]. Universidade Federal da Bahia; 2005. [cited 2020 Jan 25]. Available from: http://www.bibliotecadigital.ufba.br/tde_busca/arquivo.php?codArquivo=1160.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lucas BC. A segurança da informação em organizações de Salvador. [Thesis]. Universidade Federal da Bahia; 2005. Available from: http://www.bibliotecadigital.ufba.br/tde_busca/arquivo.php?codArquivo=1160

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Univerzitet u Beogradu

25. Теpavac, Dejan N., 1976-. Заштита пословних информација у функцији националне безбедности.

Degree: Fakultet bezbednosti, 2018, Univerzitet u Beogradu

Društvene nauke / Studije bezbednosti Social sciences / security studies

Поуздане информације представљају основ смисленог људског деловања, успостављања међуљудских, међународних и пословних односа. Информације посебно… (more)

Subjects/Keywords: National security; business information; information security; information and communication system; human security; indicators; protection.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Теpavac, Dejan N., 1. (2018). Заштита пословних информација у функцији националне безбедности. (Thesis). Univerzitet u Beogradu. Retrieved from https://fedorabg.bg.ac.rs/fedora/get/o:18442/bdef:Content/get

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Теpavac, Dejan N., 1976-. “Заштита пословних информација у функцији националне безбедности.” 2018. Thesis, Univerzitet u Beogradu. Accessed January 25, 2020. https://fedorabg.bg.ac.rs/fedora/get/o:18442/bdef:Content/get.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Теpavac, Dejan N., 1976-. “Заштита пословних информација у функцији националне безбедности.” 2018. Web. 25 Jan 2020.

Vancouver:

Теpavac, Dejan N. 1. Заштита пословних информација у функцији националне безбедности. [Internet] [Thesis]. Univerzitet u Beogradu; 2018. [cited 2020 Jan 25]. Available from: https://fedorabg.bg.ac.rs/fedora/get/o:18442/bdef:Content/get.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Теpavac, Dejan N. 1. Заштита пословних информација у функцији националне безбедности. [Thesis]. Univerzitet u Beogradu; 2018. Available from: https://fedorabg.bg.ac.rs/fedora/get/o:18442/bdef:Content/get

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Plymouth

26. Alotaibi, Mutlaq. A model for monitoring end-user security policy compliance.

Degree: PhD, 2017, University of Plymouth

 Organisations increasingly perceive their employees as a great asset that needs to be cared for; however, at the same time, they view employees as one… (more)

Subjects/Keywords: 004.01; Information security policy; user behaviour; information security management; Compliance management

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alotaibi, M. (2017). A model for monitoring end-user security policy compliance. (Doctoral Dissertation). University of Plymouth. Retrieved from http://hdl.handle.net/10026.1/10237

Chicago Manual of Style (16th Edition):

Alotaibi, Mutlaq. “A model for monitoring end-user security policy compliance.” 2017. Doctoral Dissertation, University of Plymouth. Accessed January 25, 2020. http://hdl.handle.net/10026.1/10237.

MLA Handbook (7th Edition):

Alotaibi, Mutlaq. “A model for monitoring end-user security policy compliance.” 2017. Web. 25 Jan 2020.

Vancouver:

Alotaibi M. A model for monitoring end-user security policy compliance. [Internet] [Doctoral dissertation]. University of Plymouth; 2017. [cited 2020 Jan 25]. Available from: http://hdl.handle.net/10026.1/10237.

Council of Science Editors:

Alotaibi M. A model for monitoring end-user security policy compliance. [Doctoral Dissertation]. University of Plymouth; 2017. Available from: http://hdl.handle.net/10026.1/10237


Brno University of Technology

27. Malá, Eva. Posouzení informačního systému firmy a návrh změn .

Degree: 2013, Brno University of Technology

 Tato diplomová práce se zabývá posouzením informačních systémů vybrané firmy a návrhu jeho změn. Obsahem první části je vysvětlení základních pojmů používaných v této problematice.… (more)

Subjects/Keywords: Informační systém; účetní systém; bezpečnost; analýza HOS8; Zefis; efektivnost; software; management; orgware; informační strategie; Information system; accounting system; security; HOS8 analysis; Zefis; efficiency; software; management; orgware; information strategy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Malá, E. (2013). Posouzení informačního systému firmy a návrh změn . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/25631

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Malá, Eva. “Posouzení informačního systému firmy a návrh změn .” 2013. Thesis, Brno University of Technology. Accessed January 25, 2020. http://hdl.handle.net/11012/25631.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Malá, Eva. “Posouzení informačního systému firmy a návrh změn .” 2013. Web. 25 Jan 2020.

Vancouver:

Malá E. Posouzení informačního systému firmy a návrh změn . [Internet] [Thesis]. Brno University of Technology; 2013. [cited 2020 Jan 25]. Available from: http://hdl.handle.net/11012/25631.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Malá E. Posouzení informačního systému firmy a návrh změn . [Thesis]. Brno University of Technology; 2013. Available from: http://hdl.handle.net/11012/25631

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Southern Cross University

28. Ong, Lean-Ping. Awareness of information security risks : an investigation of people aspects (a study in Malaysia).

Degree: 2015, Southern Cross University

 The rapid advances in technology in this millennium pose growing information security risks. Information security breaches can result in data or information loss, damaged reputations,… (more)

Subjects/Keywords: information security; information security awareness; information security risk; people aspects; Business; Information Security; Management Information Systems; Social Psychology

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ong, L. (2015). Awareness of information security risks : an investigation of people aspects (a study in Malaysia). (Thesis). Southern Cross University. Retrieved from http://epubs.scu.edu.au/theses/449

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ong, Lean-Ping. “Awareness of information security risks : an investigation of people aspects (a study in Malaysia).” 2015. Thesis, Southern Cross University. Accessed January 25, 2020. http://epubs.scu.edu.au/theses/449.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ong, Lean-Ping. “Awareness of information security risks : an investigation of people aspects (a study in Malaysia).” 2015. Web. 25 Jan 2020.

Vancouver:

Ong L. Awareness of information security risks : an investigation of people aspects (a study in Malaysia). [Internet] [Thesis]. Southern Cross University; 2015. [cited 2020 Jan 25]. Available from: http://epubs.scu.edu.au/theses/449.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ong L. Awareness of information security risks : an investigation of people aspects (a study in Malaysia). [Thesis]. Southern Cross University; 2015. Available from: http://epubs.scu.edu.au/theses/449

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Utah State University

29. Houghton, Robert F. The Chain-Link Fence Model: A Framework for Creating Security Procedures.

Degree: PhD, Management Information Systems, 2013, Utah State University

 A long standing problem in information technology security is how to help reduce the security footprint. Many specific proposals exist to address specific problems in… (more)

Subjects/Keywords: Computer Security; Framework Creation; IS Security; Security Framework; Security Model; Security Procedures; Business; Information Security; Management Information Systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Houghton, R. F. (2013). The Chain-Link Fence Model: A Framework for Creating Security Procedures. (Doctoral Dissertation). Utah State University. Retrieved from https://digitalcommons.usu.edu/etd/1967

Chicago Manual of Style (16th Edition):

Houghton, Robert F. “The Chain-Link Fence Model: A Framework for Creating Security Procedures.” 2013. Doctoral Dissertation, Utah State University. Accessed January 25, 2020. https://digitalcommons.usu.edu/etd/1967.

MLA Handbook (7th Edition):

Houghton, Robert F. “The Chain-Link Fence Model: A Framework for Creating Security Procedures.” 2013. Web. 25 Jan 2020.

Vancouver:

Houghton RF. The Chain-Link Fence Model: A Framework for Creating Security Procedures. [Internet] [Doctoral dissertation]. Utah State University; 2013. [cited 2020 Jan 25]. Available from: https://digitalcommons.usu.edu/etd/1967.

Council of Science Editors:

Houghton RF. The Chain-Link Fence Model: A Framework for Creating Security Procedures. [Doctoral Dissertation]. Utah State University; 2013. Available from: https://digitalcommons.usu.edu/etd/1967


University of New South Wales

30. Fleming, Richard F. Towards the analysis of information environment resilience for real enterprises.

Degree: Electrical Engineering, 2010, University of New South Wales

 The combination of national and corporate focus on critical infrastructure protection, and increasing complexity of information systems underlying business processes, make resilience a high priority… (more)

Subjects/Keywords: Information technology : security measures; Information resources management; Information technology : management

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Fleming, R. F. (2010). Towards the analysis of information environment resilience for real enterprises. (Doctoral Dissertation). University of New South Wales. Retrieved from http://handle.unsw.edu.au/1959.4/50352 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:9233/SOURCE1?view=true

Chicago Manual of Style (16th Edition):

Fleming, Richard F. “Towards the analysis of information environment resilience for real enterprises.” 2010. Doctoral Dissertation, University of New South Wales. Accessed January 25, 2020. http://handle.unsw.edu.au/1959.4/50352 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:9233/SOURCE1?view=true.

MLA Handbook (7th Edition):

Fleming, Richard F. “Towards the analysis of information environment resilience for real enterprises.” 2010. Web. 25 Jan 2020.

Vancouver:

Fleming RF. Towards the analysis of information environment resilience for real enterprises. [Internet] [Doctoral dissertation]. University of New South Wales; 2010. [cited 2020 Jan 25]. Available from: http://handle.unsw.edu.au/1959.4/50352 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:9233/SOURCE1?view=true.

Council of Science Editors:

Fleming RF. Towards the analysis of information environment resilience for real enterprises. [Doctoral Dissertation]. University of New South Wales; 2010. Available from: http://handle.unsw.edu.au/1959.4/50352 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:9233/SOURCE1?view=true

[1] [2] [3] [4] [5] … [6174]

.