Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Information Security Policy). Showing records 1 – 30 of 98 total matches.

[1] [2] [3] [4]

Search Limiters

Last 2 Years | English Only

Levels

Languages

Country

▼ Search Limiters


Loughborough University

1. Al-Hamar, Aisha. Enhancing information security in organisations in Qatar.

Degree: PhD, 2018, Loughborough University

 Due to the universal use of technology and its pervasive connection to the world, organisations have become more exposed to frequent and various threats. Therefore,… (more)

Subjects/Keywords: Information security; Information security policy; Information security awareness; Information security management system; Information security culture; Qatar National Information Assurance policy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Al-Hamar, A. (2018). Enhancing information security in organisations in Qatar. (Doctoral Dissertation). Loughborough University. Retrieved from https://dspace.lboro.ac.uk/2134/33541 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.747959

Chicago Manual of Style (16th Edition):

Al-Hamar, Aisha. “Enhancing information security in organisations in Qatar.” 2018. Doctoral Dissertation, Loughborough University. Accessed February 21, 2020. https://dspace.lboro.ac.uk/2134/33541 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.747959.

MLA Handbook (7th Edition):

Al-Hamar, Aisha. “Enhancing information security in organisations in Qatar.” 2018. Web. 21 Feb 2020.

Vancouver:

Al-Hamar A. Enhancing information security in organisations in Qatar. [Internet] [Doctoral dissertation]. Loughborough University; 2018. [cited 2020 Feb 21]. Available from: https://dspace.lboro.ac.uk/2134/33541 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.747959.

Council of Science Editors:

Al-Hamar A. Enhancing information security in organisations in Qatar. [Doctoral Dissertation]. Loughborough University; 2018. Available from: https://dspace.lboro.ac.uk/2134/33541 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.747959


Loughborough University

2. Al-Hamar, Aisha. Enhancing information security in organisations in Qatar.

Degree: PhD, 2018, Loughborough University

 Due to the universal use of technology and its pervasive connection to the world, organisations have become more exposed to frequent and various threats. Therefore,… (more)

Subjects/Keywords: Information security; Information security policy; Information security awareness; Information security management system; Information security culture; Qatar National Information Assurance policy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Al-Hamar, A. (2018). Enhancing information security in organisations in Qatar. (Doctoral Dissertation). Loughborough University. Retrieved from http://hdl.handle.net/2134/33541

Chicago Manual of Style (16th Edition):

Al-Hamar, Aisha. “Enhancing information security in organisations in Qatar.” 2018. Doctoral Dissertation, Loughborough University. Accessed February 21, 2020. http://hdl.handle.net/2134/33541.

MLA Handbook (7th Edition):

Al-Hamar, Aisha. “Enhancing information security in organisations in Qatar.” 2018. Web. 21 Feb 2020.

Vancouver:

Al-Hamar A. Enhancing information security in organisations in Qatar. [Internet] [Doctoral dissertation]. Loughborough University; 2018. [cited 2020 Feb 21]. Available from: http://hdl.handle.net/2134/33541.

Council of Science Editors:

Al-Hamar A. Enhancing information security in organisations in Qatar. [Doctoral Dissertation]. Loughborough University; 2018. Available from: http://hdl.handle.net/2134/33541


University of Melbourne

3. MAYNARD, SEAN. Strategic information security policy quality assessment: a multiple constituency perspective.

Degree: 2010, University of Melbourne

 An integral part of any information security management program is the information security policy. The purpose of an information security policy is to define the… (more)

Subjects/Keywords: information security management; information security policy; information security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

MAYNARD, S. (2010). Strategic information security policy quality assessment: a multiple constituency perspective. (Doctoral Dissertation). University of Melbourne. Retrieved from http://hdl.handle.net/11343/42194

Chicago Manual of Style (16th Edition):

MAYNARD, SEAN. “Strategic information security policy quality assessment: a multiple constituency perspective.” 2010. Doctoral Dissertation, University of Melbourne. Accessed February 21, 2020. http://hdl.handle.net/11343/42194.

MLA Handbook (7th Edition):

MAYNARD, SEAN. “Strategic information security policy quality assessment: a multiple constituency perspective.” 2010. Web. 21 Feb 2020.

Vancouver:

MAYNARD S. Strategic information security policy quality assessment: a multiple constituency perspective. [Internet] [Doctoral dissertation]. University of Melbourne; 2010. [cited 2020 Feb 21]. Available from: http://hdl.handle.net/11343/42194.

Council of Science Editors:

MAYNARD S. Strategic information security policy quality assessment: a multiple constituency perspective. [Doctoral Dissertation]. University of Melbourne; 2010. Available from: http://hdl.handle.net/11343/42194


Loughborough University

4. Alkahtani, Hend K. Raising the information security awareness level in Saudi Arabian organizations through an effective, culturally aware information security framework.

Degree: PhD, 2018, Loughborough University

 The focus of the research is to improve the security of information systems in Saudi Arabian knowledge-intensive organisations by raising the awareness level among all… (more)

Subjects/Keywords: Information systems; Information security; Security awareness; Saudi Arabian culture; Security policy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alkahtani, H. K. (2018). Raising the information security awareness level in Saudi Arabian organizations through an effective, culturally aware information security framework. (Doctoral Dissertation). Loughborough University. Retrieved from https://dspace.lboro.ac.uk/2134/28120 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.740230

Chicago Manual of Style (16th Edition):

Alkahtani, Hend K. “Raising the information security awareness level in Saudi Arabian organizations through an effective, culturally aware information security framework.” 2018. Doctoral Dissertation, Loughborough University. Accessed February 21, 2020. https://dspace.lboro.ac.uk/2134/28120 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.740230.

MLA Handbook (7th Edition):

Alkahtani, Hend K. “Raising the information security awareness level in Saudi Arabian organizations through an effective, culturally aware information security framework.” 2018. Web. 21 Feb 2020.

Vancouver:

Alkahtani HK. Raising the information security awareness level in Saudi Arabian organizations through an effective, culturally aware information security framework. [Internet] [Doctoral dissertation]. Loughborough University; 2018. [cited 2020 Feb 21]. Available from: https://dspace.lboro.ac.uk/2134/28120 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.740230.

Council of Science Editors:

Alkahtani HK. Raising the information security awareness level in Saudi Arabian organizations through an effective, culturally aware information security framework. [Doctoral Dissertation]. Loughborough University; 2018. Available from: https://dspace.lboro.ac.uk/2134/28120 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.740230


Loughborough University

5. Alkahtani, Hend K. Raising the information security awareness level in Saudi Arabian organizations through an effective, culturally aware information security framework.

Degree: PhD, 2018, Loughborough University

 The focus of the research is to improve the security of information systems in Saudi Arabian knowledge-intensive organisations by raising the awareness level among all… (more)

Subjects/Keywords: Information systems; Information security; Security awareness; Saudi Arabian culture; Security policy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alkahtani, H. K. (2018). Raising the information security awareness level in Saudi Arabian organizations through an effective, culturally aware information security framework. (Doctoral Dissertation). Loughborough University. Retrieved from http://hdl.handle.net/2134/28120

Chicago Manual of Style (16th Edition):

Alkahtani, Hend K. “Raising the information security awareness level in Saudi Arabian organizations through an effective, culturally aware information security framework.” 2018. Doctoral Dissertation, Loughborough University. Accessed February 21, 2020. http://hdl.handle.net/2134/28120.

MLA Handbook (7th Edition):

Alkahtani, Hend K. “Raising the information security awareness level in Saudi Arabian organizations through an effective, culturally aware information security framework.” 2018. Web. 21 Feb 2020.

Vancouver:

Alkahtani HK. Raising the information security awareness level in Saudi Arabian organizations through an effective, culturally aware information security framework. [Internet] [Doctoral dissertation]. Loughborough University; 2018. [cited 2020 Feb 21]. Available from: http://hdl.handle.net/2134/28120.

Council of Science Editors:

Alkahtani HK. Raising the information security awareness level in Saudi Arabian organizations through an effective, culturally aware information security framework. [Doctoral Dissertation]. Loughborough University; 2018. Available from: http://hdl.handle.net/2134/28120


NSYSU

6. Huang, Hong-Wei. Understanding the Impact of Psychological Ownership on Information Security Compliance Behavior.

Degree: Master, Information Management, 2015, NSYSU

 The most common approach taken by organization to insure information security is to punish deviating behaviors. However, recently studies argue the need to pay attention… (more)

Subjects/Keywords: psychological ownership; information security self-efficacy; information security policy compliance

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Huang, H. (2015). Understanding the Impact of Psychological Ownership on Information Security Compliance Behavior. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0703115-194053

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Huang, Hong-Wei. “Understanding the Impact of Psychological Ownership on Information Security Compliance Behavior.” 2015. Thesis, NSYSU. Accessed February 21, 2020. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0703115-194053.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Huang, Hong-Wei. “Understanding the Impact of Psychological Ownership on Information Security Compliance Behavior.” 2015. Web. 21 Feb 2020.

Vancouver:

Huang H. Understanding the Impact of Psychological Ownership on Information Security Compliance Behavior. [Internet] [Thesis]. NSYSU; 2015. [cited 2020 Feb 21]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0703115-194053.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Huang H. Understanding the Impact of Psychological Ownership on Information Security Compliance Behavior. [Thesis]. NSYSU; 2015. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0703115-194053

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Plymouth

7. Alotaibi, Mutlaq. A model for monitoring end-user security policy compliance.

Degree: PhD, 2017, University of Plymouth

 Organisations increasingly perceive their employees as a great asset that needs to be cared for; however, at the same time, they view employees as one… (more)

Subjects/Keywords: 004.01; Information security policy; user behaviour; information security management; Compliance management

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alotaibi, M. (2017). A model for monitoring end-user security policy compliance. (Doctoral Dissertation). University of Plymouth. Retrieved from http://hdl.handle.net/10026.1/10237

Chicago Manual of Style (16th Edition):

Alotaibi, Mutlaq. “A model for monitoring end-user security policy compliance.” 2017. Doctoral Dissertation, University of Plymouth. Accessed February 21, 2020. http://hdl.handle.net/10026.1/10237.

MLA Handbook (7th Edition):

Alotaibi, Mutlaq. “A model for monitoring end-user security policy compliance.” 2017. Web. 21 Feb 2020.

Vancouver:

Alotaibi M. A model for monitoring end-user security policy compliance. [Internet] [Doctoral dissertation]. University of Plymouth; 2017. [cited 2020 Feb 21]. Available from: http://hdl.handle.net/10026.1/10237.

Council of Science Editors:

Alotaibi M. A model for monitoring end-user security policy compliance. [Doctoral Dissertation]. University of Plymouth; 2017. Available from: http://hdl.handle.net/10026.1/10237


NSYSU

8. Tsao, Yu-Jen. The effect of Information Security Management System in Hospitals on the Maturity of Information Security.

Degree: Master, Information Management, 2017, NSYSU

 In recent years, with the advancement and development of information technology, the issue of information security has become the most important of hospitals. Taking the… (more)

Subjects/Keywords: Conflict; Information Security Policy; Information Security Maturity; Information Security Management System; Coordination Mechanism; Information Security Management Acceptance

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tsao, Y. (2017). The effect of Information Security Management System in Hospitals on the Maturity of Information Security. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0717117-212100

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tsao, Yu-Jen. “The effect of Information Security Management System in Hospitals on the Maturity of Information Security.” 2017. Thesis, NSYSU. Accessed February 21, 2020. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0717117-212100.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tsao, Yu-Jen. “The effect of Information Security Management System in Hospitals on the Maturity of Information Security.” 2017. Web. 21 Feb 2020.

Vancouver:

Tsao Y. The effect of Information Security Management System in Hospitals on the Maturity of Information Security. [Internet] [Thesis]. NSYSU; 2017. [cited 2020 Feb 21]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0717117-212100.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tsao Y. The effect of Information Security Management System in Hospitals on the Maturity of Information Security. [Thesis]. NSYSU; 2017. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0717117-212100

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

9. Flowers, Jim David. Explaining policy differences as a function of diverse governance institutions.

Degree: PhD, Public Policy, 2016, Georgia Tech

 This study asks the question: “How does the structure of cybersecurity policy relate to differences in structure of policy governance of universities and colleges?” The… (more)

Subjects/Keywords: Public policy; Institutional analysis; Information security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Flowers, J. D. (2016). Explaining policy differences as a function of diverse governance institutions. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/54971

Chicago Manual of Style (16th Edition):

Flowers, Jim David. “Explaining policy differences as a function of diverse governance institutions.” 2016. Doctoral Dissertation, Georgia Tech. Accessed February 21, 2020. http://hdl.handle.net/1853/54971.

MLA Handbook (7th Edition):

Flowers, Jim David. “Explaining policy differences as a function of diverse governance institutions.” 2016. Web. 21 Feb 2020.

Vancouver:

Flowers JD. Explaining policy differences as a function of diverse governance institutions. [Internet] [Doctoral dissertation]. Georgia Tech; 2016. [cited 2020 Feb 21]. Available from: http://hdl.handle.net/1853/54971.

Council of Science Editors:

Flowers JD. Explaining policy differences as a function of diverse governance institutions. [Doctoral Dissertation]. Georgia Tech; 2016. Available from: http://hdl.handle.net/1853/54971


Georgia State University

10. Flowers, Jim. Explaining Policy Differences As A Function of Diverse Governance Institutions.

Degree: PhD, Public Management and Policy, 2016, Georgia State University

  An examination of policies and policy governance structures at four research universities demonstrated the utility of integrating an “ideal” model for cyber security governance… (more)

Subjects/Keywords: Information Security; Institutional Analysis; Policy Structure

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Flowers, J. (2016). Explaining Policy Differences As A Function of Diverse Governance Institutions. (Doctoral Dissertation). Georgia State University. Retrieved from https://scholarworks.gsu.edu/pmap_diss/56

Chicago Manual of Style (16th Edition):

Flowers, Jim. “Explaining Policy Differences As A Function of Diverse Governance Institutions.” 2016. Doctoral Dissertation, Georgia State University. Accessed February 21, 2020. https://scholarworks.gsu.edu/pmap_diss/56.

MLA Handbook (7th Edition):

Flowers, Jim. “Explaining Policy Differences As A Function of Diverse Governance Institutions.” 2016. Web. 21 Feb 2020.

Vancouver:

Flowers J. Explaining Policy Differences As A Function of Diverse Governance Institutions. [Internet] [Doctoral dissertation]. Georgia State University; 2016. [cited 2020 Feb 21]. Available from: https://scholarworks.gsu.edu/pmap_diss/56.

Council of Science Editors:

Flowers J. Explaining Policy Differences As A Function of Diverse Governance Institutions. [Doctoral Dissertation]. Georgia State University; 2016. Available from: https://scholarworks.gsu.edu/pmap_diss/56


Georgia State University

11. Sarkar, Sumantra. New Perspectives on Implementing Health Information Technology.

Degree: PhD, Computer Information Systems, 2014, Georgia State University

  The importance of studying challenges in implementing information technology solutions in health care organizations is highlighted by the huge investments in health care information(more)

Subjects/Keywords: routines; process; activity theory; information security; information security policy; compliance behavior; policy violation; pseudo-compliance

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sarkar, S. (2014). New Perspectives on Implementing Health Information Technology. (Doctoral Dissertation). Georgia State University. Retrieved from https://scholarworks.gsu.edu/cis_diss/54

Chicago Manual of Style (16th Edition):

Sarkar, Sumantra. “New Perspectives on Implementing Health Information Technology.” 2014. Doctoral Dissertation, Georgia State University. Accessed February 21, 2020. https://scholarworks.gsu.edu/cis_diss/54.

MLA Handbook (7th Edition):

Sarkar, Sumantra. “New Perspectives on Implementing Health Information Technology.” 2014. Web. 21 Feb 2020.

Vancouver:

Sarkar S. New Perspectives on Implementing Health Information Technology. [Internet] [Doctoral dissertation]. Georgia State University; 2014. [cited 2020 Feb 21]. Available from: https://scholarworks.gsu.edu/cis_diss/54.

Council of Science Editors:

Sarkar S. New Perspectives on Implementing Health Information Technology. [Doctoral Dissertation]. Georgia State University; 2014. Available from: https://scholarworks.gsu.edu/cis_diss/54


Linnaeus University

12. Kayahan, Hüseyin. INTRUSION EXECUTION SYSTEMS : Prototype: IMPETUS.

Degree: Computer Science, 2013, Linnaeus University

  In nature, it is inspiring to observe such an extensive variety of defensive skills distributed among species. The speed of an antelope, and the… (more)

Subjects/Keywords: information security; network security; negligence; vigilance; information security; security policy; security wheel; windmill model; impetus; ies; Computer Sciences; Datavetenskap (datalogi)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kayahan, H. (2013). INTRUSION EXECUTION SYSTEMS : Prototype: IMPETUS. (Thesis). Linnaeus University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-29546

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kayahan, Hüseyin. “INTRUSION EXECUTION SYSTEMS : Prototype: IMPETUS.” 2013. Thesis, Linnaeus University. Accessed February 21, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-29546.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kayahan, Hüseyin. “INTRUSION EXECUTION SYSTEMS : Prototype: IMPETUS.” 2013. Web. 21 Feb 2020.

Vancouver:

Kayahan H. INTRUSION EXECUTION SYSTEMS : Prototype: IMPETUS. [Internet] [Thesis]. Linnaeus University; 2013. [cited 2020 Feb 21]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-29546.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kayahan H. INTRUSION EXECUTION SYSTEMS : Prototype: IMPETUS. [Thesis]. Linnaeus University; 2013. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-29546

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Ottawa

13. Runsewe, Olubisi Atinuke. A Policy-Based Management Framework for Cloud Computing Security .

Degree: 2014, University of Ottawa

 Cloud Computing has changed how computing is done as applications and services are being consumed from the cloud. It has attracted a lot of attention… (more)

Subjects/Keywords: Policy-Based Management; Cloud Computing Security; Access Control; Enterprise Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Runsewe, O. A. (2014). A Policy-Based Management Framework for Cloud Computing Security . (Thesis). University of Ottawa. Retrieved from http://hdl.handle.net/10393/31503

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Runsewe, Olubisi Atinuke. “A Policy-Based Management Framework for Cloud Computing Security .” 2014. Thesis, University of Ottawa. Accessed February 21, 2020. http://hdl.handle.net/10393/31503.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Runsewe, Olubisi Atinuke. “A Policy-Based Management Framework for Cloud Computing Security .” 2014. Web. 21 Feb 2020.

Vancouver:

Runsewe OA. A Policy-Based Management Framework for Cloud Computing Security . [Internet] [Thesis]. University of Ottawa; 2014. [cited 2020 Feb 21]. Available from: http://hdl.handle.net/10393/31503.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Runsewe OA. A Policy-Based Management Framework for Cloud Computing Security . [Thesis]. University of Ottawa; 2014. Available from: http://hdl.handle.net/10393/31503

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of South Africa

14. Snyman, Mmabatho Charity. Awareness and training: the influence on end-user' attitude towards information security policy compliance.

Degree: 2017, University of South Africa

 Research accentuates that end-users‘ noncompliance with information security policy (ISP) is a key concern for government just as it is for the private sector. Although… (more)

Subjects/Keywords: Attitudes; Information security; Information security policy; Awareness training; Intentions to comply; Information security compliance; Self-efficacy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Snyman, M. C. (2017). Awareness and training: the influence on end-user' attitude towards information security policy compliance. (Masters Thesis). University of South Africa. Retrieved from http://hdl.handle.net/10500/24107

Chicago Manual of Style (16th Edition):

Snyman, Mmabatho Charity. “Awareness and training: the influence on end-user' attitude towards information security policy compliance.” 2017. Masters Thesis, University of South Africa. Accessed February 21, 2020. http://hdl.handle.net/10500/24107.

MLA Handbook (7th Edition):

Snyman, Mmabatho Charity. “Awareness and training: the influence on end-user' attitude towards information security policy compliance.” 2017. Web. 21 Feb 2020.

Vancouver:

Snyman MC. Awareness and training: the influence on end-user' attitude towards information security policy compliance. [Internet] [Masters thesis]. University of South Africa; 2017. [cited 2020 Feb 21]. Available from: http://hdl.handle.net/10500/24107.

Council of Science Editors:

Snyman MC. Awareness and training: the influence on end-user' attitude towards information security policy compliance. [Masters Thesis]. University of South Africa; 2017. Available from: http://hdl.handle.net/10500/24107


San Jose State University

15. Palesha, Kushal. Policy-agnostic programming on the client-side.

Degree: MS, Computer Science, 2017, San Jose State University

  Browser security has become a major concern especially due to web pages becoming more complex. These web applications handle a lot of information, including… (more)

Subjects/Keywords: Policy Agnostic Programming; Faceted Values; Information Flow Security; Information Security; Programming Languages and Compilers

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Palesha, K. (2017). Policy-agnostic programming on the client-side. (Masters Thesis). San Jose State University. Retrieved from https://doi.org/10.31979/etd.a3ax-ktzr ; https://scholarworks.sjsu.edu/etd_projects/518

Chicago Manual of Style (16th Edition):

Palesha, Kushal. “Policy-agnostic programming on the client-side.” 2017. Masters Thesis, San Jose State University. Accessed February 21, 2020. https://doi.org/10.31979/etd.a3ax-ktzr ; https://scholarworks.sjsu.edu/etd_projects/518.

MLA Handbook (7th Edition):

Palesha, Kushal. “Policy-agnostic programming on the client-side.” 2017. Web. 21 Feb 2020.

Vancouver:

Palesha K. Policy-agnostic programming on the client-side. [Internet] [Masters thesis]. San Jose State University; 2017. [cited 2020 Feb 21]. Available from: https://doi.org/10.31979/etd.a3ax-ktzr ; https://scholarworks.sjsu.edu/etd_projects/518.

Council of Science Editors:

Palesha K. Policy-agnostic programming on the client-side. [Masters Thesis]. San Jose State University; 2017. Available from: https://doi.org/10.31979/etd.a3ax-ktzr ; https://scholarworks.sjsu.edu/etd_projects/518


Baylor University

16. [No author]. The downsides of information systems security policy compliance efforts : toward a Theory of Unintended Reversed Security Action and Productivity (TURSAP).

Degree: 2016, Baylor University

 Modern organizations face significant information security violations from inside the organizations to which they respond with various managerial techniques. It is widely believed in IS… (more)

Subjects/Keywords: Information systems security. Productivity. Policy compliance. Security risk. Information systems theory. Downsides of IS security measures.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

author], [. (2016). The downsides of information systems security policy compliance efforts : toward a Theory of Unintended Reversed Security Action and Productivity (TURSAP). (Thesis). Baylor University. Retrieved from http://hdl.handle.net/2104/9652

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

author], [No. “The downsides of information systems security policy compliance efforts : toward a Theory of Unintended Reversed Security Action and Productivity (TURSAP). ” 2016. Thesis, Baylor University. Accessed February 21, 2020. http://hdl.handle.net/2104/9652.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

author], [No. “The downsides of information systems security policy compliance efforts : toward a Theory of Unintended Reversed Security Action and Productivity (TURSAP). ” 2016. Web. 21 Feb 2020.

Vancouver:

author] [. The downsides of information systems security policy compliance efforts : toward a Theory of Unintended Reversed Security Action and Productivity (TURSAP). [Internet] [Thesis]. Baylor University; 2016. [cited 2020 Feb 21]. Available from: http://hdl.handle.net/2104/9652.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

author] [. The downsides of information systems security policy compliance efforts : toward a Theory of Unintended Reversed Security Action and Productivity (TURSAP). [Thesis]. Baylor University; 2016. Available from: http://hdl.handle.net/2104/9652

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


UCLA

17. Chamberland, Kristen. Contextualizing Institutional IT Policy: A Historical Narrative of UCLA’s Policymaking Environment.

Degree: Information Studies, 2016, UCLA

Information technology (IT) policymaking in higher education is often an ad hoc process,responding to crises, rather than taking a proactive approach based on a clear… (more)

Subjects/Keywords: Information science; data governance; data security; information privacy; information technology policy; institutional values; stakeholder relationships

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chamberland, K. (2016). Contextualizing Institutional IT Policy: A Historical Narrative of UCLA’s Policymaking Environment. (Thesis). UCLA. Retrieved from http://www.escholarship.org/uc/item/0160r7kr

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chamberland, Kristen. “Contextualizing Institutional IT Policy: A Historical Narrative of UCLA’s Policymaking Environment.” 2016. Thesis, UCLA. Accessed February 21, 2020. http://www.escholarship.org/uc/item/0160r7kr.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chamberland, Kristen. “Contextualizing Institutional IT Policy: A Historical Narrative of UCLA’s Policymaking Environment.” 2016. Web. 21 Feb 2020.

Vancouver:

Chamberland K. Contextualizing Institutional IT Policy: A Historical Narrative of UCLA’s Policymaking Environment. [Internet] [Thesis]. UCLA; 2016. [cited 2020 Feb 21]. Available from: http://www.escholarship.org/uc/item/0160r7kr.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chamberland K. Contextualizing Institutional IT Policy: A Historical Narrative of UCLA’s Policymaking Environment. [Thesis]. UCLA; 2016. Available from: http://www.escholarship.org/uc/item/0160r7kr

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


East Carolina University

18. Vail, John Edwards. Small Business Information Security.

Degree: 2012, East Carolina University

 Small businesses account for over fifty percent of the Gross National Product of the U.S. economy; and the security of their information systems is critical… (more)

Subjects/Keywords: Information technology; Information security; Information technology management; Information technology policy; IT due diligence; IT governance; Small business information security; Small business – Technological innovations; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Vail, J. E. (2012). Small Business Information Security. (Thesis). East Carolina University. Retrieved from http://hdl.handle.net/10342/3889

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Vail, John Edwards. “Small Business Information Security.” 2012. Thesis, East Carolina University. Accessed February 21, 2020. http://hdl.handle.net/10342/3889.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Vail, John Edwards. “Small Business Information Security.” 2012. Web. 21 Feb 2020.

Vancouver:

Vail JE. Small Business Information Security. [Internet] [Thesis]. East Carolina University; 2012. [cited 2020 Feb 21]. Available from: http://hdl.handle.net/10342/3889.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Vail JE. Small Business Information Security. [Thesis]. East Carolina University; 2012. Available from: http://hdl.handle.net/10342/3889

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


De Montfort University

19. Aldajani, Mouhamad. Electronic patient record security policy in Saudi Arabia National Health Service.

Degree: PhD, 2012, De Montfort University

 Saudi Arabia is in the process of implementing Electronic Patient Records (EPR) throughout its National Health services. One of the key challenges during the adoption… (more)

Subjects/Keywords: 600; information security; access control policy; EPR; Saudi Arabia

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Aldajani, M. (2012). Electronic patient record security policy in Saudi Arabia National Health Service. (Doctoral Dissertation). De Montfort University. Retrieved from http://hdl.handle.net/2086/6016

Chicago Manual of Style (16th Edition):

Aldajani, Mouhamad. “Electronic patient record security policy in Saudi Arabia National Health Service.” 2012. Doctoral Dissertation, De Montfort University. Accessed February 21, 2020. http://hdl.handle.net/2086/6016.

MLA Handbook (7th Edition):

Aldajani, Mouhamad. “Electronic patient record security policy in Saudi Arabia National Health Service.” 2012. Web. 21 Feb 2020.

Vancouver:

Aldajani M. Electronic patient record security policy in Saudi Arabia National Health Service. [Internet] [Doctoral dissertation]. De Montfort University; 2012. [cited 2020 Feb 21]. Available from: http://hdl.handle.net/2086/6016.

Council of Science Editors:

Aldajani M. Electronic patient record security policy in Saudi Arabia National Health Service. [Doctoral Dissertation]. De Montfort University; 2012. Available from: http://hdl.handle.net/2086/6016


Linnaeus University

20. Aliti, Admirim. Employees' Role in Improving Information Systems Security.

Degree: Physics and Mathematics, 2011, Linnaeus University

Information security is one of the most essential concerns in today’s organizations. IT departments in larger organizations are tasked to implement security, by both… (more)

Subjects/Keywords: Information security; information security policy; human factor in organizations; employees' role; information security human management model; Information Systems; Systemvetenskap, informationssystem och informatik

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Aliti, A. (2011). Employees' Role in Improving Information Systems Security. (Thesis). Linnaeus University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-13769

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Aliti, Admirim. “Employees' Role in Improving Information Systems Security.” 2011. Thesis, Linnaeus University. Accessed February 21, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-13769.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Aliti, Admirim. “Employees' Role in Improving Information Systems Security.” 2011. Web. 21 Feb 2020.

Vancouver:

Aliti A. Employees' Role in Improving Information Systems Security. [Internet] [Thesis]. Linnaeus University; 2011. [cited 2020 Feb 21]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-13769.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Aliti A. Employees' Role in Improving Information Systems Security. [Thesis]. Linnaeus University; 2011. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-13769

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of North Texas

21. Hanus, Bartlomiej T. The Impact of Information Security Awareness on Compliance with Information Security Policies: a Phishing Perspective.

Degree: 2014, University of North Texas

 This research seeks to derive and examine a multidimensional definition of information security awareness, investigate its antecedents, and analyze its effects on compliance with organizational… (more)

Subjects/Keywords: security awareness; policy compliance; phishing; threat avoidance; information security; Data protection.; Computer networks  – Security measures.; Phishing  – Case studies.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hanus, B. T. (2014). The Impact of Information Security Awareness on Compliance with Information Security Policies: a Phishing Perspective. (Thesis). University of North Texas. Retrieved from https://digital.library.unt.edu/ark:/67531/metadc699974/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hanus, Bartlomiej T. “The Impact of Information Security Awareness on Compliance with Information Security Policies: a Phishing Perspective.” 2014. Thesis, University of North Texas. Accessed February 21, 2020. https://digital.library.unt.edu/ark:/67531/metadc699974/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hanus, Bartlomiej T. “The Impact of Information Security Awareness on Compliance with Information Security Policies: a Phishing Perspective.” 2014. Web. 21 Feb 2020.

Vancouver:

Hanus BT. The Impact of Information Security Awareness on Compliance with Information Security Policies: a Phishing Perspective. [Internet] [Thesis]. University of North Texas; 2014. [cited 2020 Feb 21]. Available from: https://digital.library.unt.edu/ark:/67531/metadc699974/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hanus BT. The Impact of Information Security Awareness on Compliance with Information Security Policies: a Phishing Perspective. [Thesis]. University of North Texas; 2014. Available from: https://digital.library.unt.edu/ark:/67531/metadc699974/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

22. Pereira, Rute Conceição Vieira. Segurança da Informação na Escola Pública.

Degree: 2012, Instituto Politécnico do Porto

A função da escola é promover a aprendizagem nos jovens e estimular o acesso ao conhecimento. A utilização das TI proporciona um acesso mais rápido… (more)

Subjects/Keywords: Escola; Tecnologias da informação; Política; Segurança da Informação; School; Information Technologies; Policy; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pereira, R. C. V. (2012). Segurança da Informação na Escola Pública. (Thesis). Instituto Politécnico do Porto. Retrieved from http://www.rcaap.pt/detail.jsp?id=oai:recipp.ipp.pt:10400.22/6526

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Pereira, Rute Conceição Vieira. “Segurança da Informação na Escola Pública.” 2012. Thesis, Instituto Politécnico do Porto. Accessed February 21, 2020. http://www.rcaap.pt/detail.jsp?id=oai:recipp.ipp.pt:10400.22/6526.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Pereira, Rute Conceição Vieira. “Segurança da Informação na Escola Pública.” 2012. Web. 21 Feb 2020.

Vancouver:

Pereira RCV. Segurança da Informação na Escola Pública. [Internet] [Thesis]. Instituto Politécnico do Porto; 2012. [cited 2020 Feb 21]. Available from: http://www.rcaap.pt/detail.jsp?id=oai:recipp.ipp.pt:10400.22/6526.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Pereira RCV. Segurança da Informação na Escola Pública. [Thesis]. Instituto Politécnico do Porto; 2012. Available from: http://www.rcaap.pt/detail.jsp?id=oai:recipp.ipp.pt:10400.22/6526

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Oulu

23. Vance, A. (Anthony). Why do employees violate is security policies?:insights from multiple theoretical perspectives.

Degree: 2010, University of Oulu

 Abstract Employee violations of IS security policies is recognized as a key concern for organizations. Although interest in IS security has risen in recent years,… (more)

Subjects/Keywords: computer abuse; deterrence theory; information security; information security policy; neutralization theory; protection motivation theory; rational choice theory

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Vance, A. (. (2010). Why do employees violate is security policies?:insights from multiple theoretical perspectives. (Doctoral Dissertation). University of Oulu. Retrieved from http://urn.fi/urn:isbn:9789514262876

Chicago Manual of Style (16th Edition):

Vance, A (Anthony). “Why do employees violate is security policies?:insights from multiple theoretical perspectives.” 2010. Doctoral Dissertation, University of Oulu. Accessed February 21, 2020. http://urn.fi/urn:isbn:9789514262876.

MLA Handbook (7th Edition):

Vance, A (Anthony). “Why do employees violate is security policies?:insights from multiple theoretical perspectives.” 2010. Web. 21 Feb 2020.

Vancouver:

Vance A(. Why do employees violate is security policies?:insights from multiple theoretical perspectives. [Internet] [Doctoral dissertation]. University of Oulu; 2010. [cited 2020 Feb 21]. Available from: http://urn.fi/urn:isbn:9789514262876.

Council of Science Editors:

Vance A(. Why do employees violate is security policies?:insights from multiple theoretical perspectives. [Doctoral Dissertation]. University of Oulu; 2010. Available from: http://urn.fi/urn:isbn:9789514262876


Brno University of Technology

24. Solár, Matúš. Zvýšení bezpečnosti informačního systému obecního úřadu .

Degree: 2015, Brno University of Technology

 Táto bakalárska práca sa zaoberá a analyzuje problematiku v prostredí bezpečnosti informačných systémov. Navrhuje možné riešenie, jeho praktickú implementáciu, zvýšenia bezpečnosti v reálnom prostredí štátnej… (more)

Subjects/Keywords: bezpečnosť; bezpečnostná politika; bezpečnosť dát; bezpečnosť informácií; bezpečnostné smernice; zálohovanie dát; riadenie bezpečnosti; security; security policy; data security; information security; security guidelines; data backup; safety control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Solár, M. (2015). Zvýšení bezpečnosti informačního systému obecního úřadu . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/40928

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Solár, Matúš. “Zvýšení bezpečnosti informačního systému obecního úřadu .” 2015. Thesis, Brno University of Technology. Accessed February 21, 2020. http://hdl.handle.net/11012/40928.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Solár, Matúš. “Zvýšení bezpečnosti informačního systému obecního úřadu .” 2015. Web. 21 Feb 2020.

Vancouver:

Solár M. Zvýšení bezpečnosti informačního systému obecního úřadu . [Internet] [Thesis]. Brno University of Technology; 2015. [cited 2020 Feb 21]. Available from: http://hdl.handle.net/11012/40928.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Solár M. Zvýšení bezpečnosti informačního systému obecního úřadu . [Thesis]. Brno University of Technology; 2015. Available from: http://hdl.handle.net/11012/40928

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

25. Zajíček, Juraj. Návrh vybraných částí bezpečnosti ICT .

Degree: 2016, Brno University of Technology

 Bakalářská práce je zaměřena na oblast bezpečnosti informačních a komunikačních technologií v konkrétní firmě. Jde o zastoupení společnosti na Slovensku a v České republice. Konkrétně… (more)

Subjects/Keywords: Bezpečnostní politika; školení informační bezpečnosti; bezpečnost informací; informační a komunikační technologie; Security policy; information security training; information security; information and communication technologies

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zajíček, J. (2016). Návrh vybraných částí bezpečnosti ICT . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/61397

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Zajíček, Juraj. “Návrh vybraných částí bezpečnosti ICT .” 2016. Thesis, Brno University of Technology. Accessed February 21, 2020. http://hdl.handle.net/11012/61397.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Zajíček, Juraj. “Návrh vybraných částí bezpečnosti ICT .” 2016. Web. 21 Feb 2020.

Vancouver:

Zajíček J. Návrh vybraných částí bezpečnosti ICT . [Internet] [Thesis]. Brno University of Technology; 2016. [cited 2020 Feb 21]. Available from: http://hdl.handle.net/11012/61397.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Zajíček J. Návrh vybraných částí bezpečnosti ICT . [Thesis]. Brno University of Technology; 2016. Available from: http://hdl.handle.net/11012/61397

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

26. Priesnitz, Pavel. Informační bezpečnost v malém podniku .

Degree: 2014, Brno University of Technology

 Cílem této diplomové práce je popis zavedení systému bezpečnosti informací do specifického malého podniku. Teoretická část práce shrnuje poznatky a informace o normách a metodikách,… (more)

Subjects/Keywords: bezpečnost informací; ISMS; ISO/IEC 27001; analýza rizik; bezpečnostní rizika informací; politika bezpečnosti; information security; ISMS; ISO/IEC 27001; risk analysis; information security risks; security policy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Priesnitz, P. (2014). Informační bezpečnost v malém podniku . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/32355

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Priesnitz, Pavel. “Informační bezpečnost v malém podniku .” 2014. Thesis, Brno University of Technology. Accessed February 21, 2020. http://hdl.handle.net/11012/32355.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Priesnitz, Pavel. “Informační bezpečnost v malém podniku .” 2014. Web. 21 Feb 2020.

Vancouver:

Priesnitz P. Informační bezpečnost v malém podniku . [Internet] [Thesis]. Brno University of Technology; 2014. [cited 2020 Feb 21]. Available from: http://hdl.handle.net/11012/32355.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Priesnitz P. Informační bezpečnost v malém podniku . [Thesis]. Brno University of Technology; 2014. Available from: http://hdl.handle.net/11012/32355

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Universidade Federal de Santa Maria

27. Cristiane Ellwanger. O IMPACTO DA UTILIZAÇÃO DE TÉCNICAS DE ENDOMARKETING NA EFETIVIDADE DAS POLÍTICAS DE SEGURANÇA DA INFORMAÇÃO.

Degree: 2009, Universidade Federal de Santa Maria

Protecting the information resources has been a big challenge to organizations. The constitution of an information security policy PSI can solve part of problems related… (more)

Subjects/Keywords: segurança; recursos humanos; endomarketing; política de segurança da informação; ENGENHARIA DE PRODUCAO; endomarketing; information security policy; human resources; security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ellwanger, C. (2009). O IMPACTO DA UTILIZAÇÃO DE TÉCNICAS DE ENDOMARKETING NA EFETIVIDADE DAS POLÍTICAS DE SEGURANÇA DA INFORMAÇÃO. (Thesis). Universidade Federal de Santa Maria. Retrieved from http://coralx.ufsm.br/tede/tde_busca/arquivo.php?codArquivo=2609

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ellwanger, Cristiane. “O IMPACTO DA UTILIZAÇÃO DE TÉCNICAS DE ENDOMARKETING NA EFETIVIDADE DAS POLÍTICAS DE SEGURANÇA DA INFORMAÇÃO.” 2009. Thesis, Universidade Federal de Santa Maria. Accessed February 21, 2020. http://coralx.ufsm.br/tede/tde_busca/arquivo.php?codArquivo=2609.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ellwanger, Cristiane. “O IMPACTO DA UTILIZAÇÃO DE TÉCNICAS DE ENDOMARKETING NA EFETIVIDADE DAS POLÍTICAS DE SEGURANÇA DA INFORMAÇÃO.” 2009. Web. 21 Feb 2020.

Vancouver:

Ellwanger C. O IMPACTO DA UTILIZAÇÃO DE TÉCNICAS DE ENDOMARKETING NA EFETIVIDADE DAS POLÍTICAS DE SEGURANÇA DA INFORMAÇÃO. [Internet] [Thesis]. Universidade Federal de Santa Maria; 2009. [cited 2020 Feb 21]. Available from: http://coralx.ufsm.br/tede/tde_busca/arquivo.php?codArquivo=2609.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ellwanger C. O IMPACTO DA UTILIZAÇÃO DE TÉCNICAS DE ENDOMARKETING NA EFETIVIDADE DAS POLÍTICAS DE SEGURANÇA DA INFORMAÇÃO. [Thesis]. Universidade Federal de Santa Maria; 2009. Available from: http://coralx.ufsm.br/tede/tde_busca/arquivo.php?codArquivo=2609

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Bradford

28. Waly, Nesren Saleh. Organisational information security management : the impact of training and awareness : evaluating the socio-technical impact on organisational information security policy management.

Degree: PhD, 2013, University of Bradford

Security breaches have attracted attention from corporations and scholars alike. The major organisations are determined to stop security breaches as they are detrimental to their… (more)

Subjects/Keywords: 004; Information security; Human factors; Organisational factors; Training; Employee behaviour; Policy compliance

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Waly, N. S. (2013). Organisational information security management : the impact of training and awareness : evaluating the socio-technical impact on organisational information security policy management. (Doctoral Dissertation). University of Bradford. Retrieved from http://hdl.handle.net/10454/5666

Chicago Manual of Style (16th Edition):

Waly, Nesren Saleh. “Organisational information security management : the impact of training and awareness : evaluating the socio-technical impact on organisational information security policy management.” 2013. Doctoral Dissertation, University of Bradford. Accessed February 21, 2020. http://hdl.handle.net/10454/5666.

MLA Handbook (7th Edition):

Waly, Nesren Saleh. “Organisational information security management : the impact of training and awareness : evaluating the socio-technical impact on organisational information security policy management.” 2013. Web. 21 Feb 2020.

Vancouver:

Waly NS. Organisational information security management : the impact of training and awareness : evaluating the socio-technical impact on organisational information security policy management. [Internet] [Doctoral dissertation]. University of Bradford; 2013. [cited 2020 Feb 21]. Available from: http://hdl.handle.net/10454/5666.

Council of Science Editors:

Waly NS. Organisational information security management : the impact of training and awareness : evaluating the socio-technical impact on organisational information security policy management. [Doctoral Dissertation]. University of Bradford; 2013. Available from: http://hdl.handle.net/10454/5666


Seton Hall University

29. Rogers, Vaughn C. The History of Chinese Cybersecurity: Current Effects on Chinese Society Economy, and Foreign Relations.

Degree: MADI Diplomacy & International Relations, Diplomacy, 2016, Seton Hall University

  Chinese cybersecurity has become an infamous topic in the field of cybersecurity today, causing a great deal of controversy. The controversy stems from whether… (more)

Subjects/Keywords: China; cybersecurity; censorship; economy; society; foreign policy; Asian Studies; Chinese Studies; Information Security; International Relations

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rogers, V. C. (2016). The History of Chinese Cybersecurity: Current Effects on Chinese Society Economy, and Foreign Relations. (Doctoral Dissertation). Seton Hall University. Retrieved from http://scholarship.shu.edu/dissertations/2207

Chicago Manual of Style (16th Edition):

Rogers, Vaughn C. “The History of Chinese Cybersecurity: Current Effects on Chinese Society Economy, and Foreign Relations.” 2016. Doctoral Dissertation, Seton Hall University. Accessed February 21, 2020. http://scholarship.shu.edu/dissertations/2207.

MLA Handbook (7th Edition):

Rogers, Vaughn C. “The History of Chinese Cybersecurity: Current Effects on Chinese Society Economy, and Foreign Relations.” 2016. Web. 21 Feb 2020.

Vancouver:

Rogers VC. The History of Chinese Cybersecurity: Current Effects on Chinese Society Economy, and Foreign Relations. [Internet] [Doctoral dissertation]. Seton Hall University; 2016. [cited 2020 Feb 21]. Available from: http://scholarship.shu.edu/dissertations/2207.

Council of Science Editors:

Rogers VC. The History of Chinese Cybersecurity: Current Effects on Chinese Society Economy, and Foreign Relations. [Doctoral Dissertation]. Seton Hall University; 2016. Available from: http://scholarship.shu.edu/dissertations/2207


University of California – Berkeley

30. Thaw, David Bernard. Characterizing, Classifying, and Understanding Information Security Laws and Regulations: Considerations for Policymakers and Organizations Protecting Sensitive Information Assets.

Degree: Information Management & Systems, 2011, University of California – Berkeley

 Current scholarly understanding of information security regulation in the United States is limited. Several competing mechanisms exist, many of which are untested in the courts… (more)

Subjects/Keywords: Law; Information technology; Public policy; cybersecurity; law; organizational structure; privacy; regulation; security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Thaw, D. B. (2011). Characterizing, Classifying, and Understanding Information Security Laws and Regulations: Considerations for Policymakers and Organizations Protecting Sensitive Information Assets. (Thesis). University of California – Berkeley. Retrieved from http://www.escholarship.org/uc/item/6805w246

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Thaw, David Bernard. “Characterizing, Classifying, and Understanding Information Security Laws and Regulations: Considerations for Policymakers and Organizations Protecting Sensitive Information Assets.” 2011. Thesis, University of California – Berkeley. Accessed February 21, 2020. http://www.escholarship.org/uc/item/6805w246.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Thaw, David Bernard. “Characterizing, Classifying, and Understanding Information Security Laws and Regulations: Considerations for Policymakers and Organizations Protecting Sensitive Information Assets.” 2011. Web. 21 Feb 2020.

Vancouver:

Thaw DB. Characterizing, Classifying, and Understanding Information Security Laws and Regulations: Considerations for Policymakers and Organizations Protecting Sensitive Information Assets. [Internet] [Thesis]. University of California – Berkeley; 2011. [cited 2020 Feb 21]. Available from: http://www.escholarship.org/uc/item/6805w246.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Thaw DB. Characterizing, Classifying, and Understanding Information Security Laws and Regulations: Considerations for Policymakers and Organizations Protecting Sensitive Information Assets. [Thesis]. University of California – Berkeley; 2011. Available from: http://www.escholarship.org/uc/item/6805w246

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2] [3] [4]

.