Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Information security maturity level). Showing records 1 – 30 of 71221 total matches.

[1] [2] [3] [4] [5] … [2375]

Search Limiters

Last 2 Years | English Only

Degrees

Languages

Country

▼ Search Limiters


University of South Africa

1. Chisanga, Emmanuel. Towards a conceptual framework for information security digital divide.

Degree: 2016, University of South Africa

 In the 21st century, information security has become the heartbeat of any organisation. One of the best-known methods of tightening and continuously improving security on… (more)

Subjects/Keywords: Capability maturity; Digital divide; Information security; Information systems; Critical success factors; Information security digital divide; Information security maturity level; Frameworks; Benchmarking

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chisanga, E. (2016). Towards a conceptual framework for information security digital divide. (Masters Thesis). University of South Africa. Retrieved from http://hdl.handle.net/10500/23367

Chicago Manual of Style (16th Edition):

Chisanga, Emmanuel. “Towards a conceptual framework for information security digital divide.” 2016. Masters Thesis, University of South Africa. Accessed April 08, 2020. http://hdl.handle.net/10500/23367.

MLA Handbook (7th Edition):

Chisanga, Emmanuel. “Towards a conceptual framework for information security digital divide.” 2016. Web. 08 Apr 2020.

Vancouver:

Chisanga E. Towards a conceptual framework for information security digital divide. [Internet] [Masters thesis]. University of South Africa; 2016. [cited 2020 Apr 08]. Available from: http://hdl.handle.net/10500/23367.

Council of Science Editors:

Chisanga E. Towards a conceptual framework for information security digital divide. [Masters Thesis]. University of South Africa; 2016. Available from: http://hdl.handle.net/10500/23367


Universiteit Utrecht

2. Roeling, M.H.F. Towards an aligned organization on information security.

Degree: 2012, Universiteit Utrecht

Information Security is mainly a topic that is considered to be Information Technology related. However, for successfully implementing information security, an organization’s information security program… (more)

Subjects/Keywords: Information Security; Security; Maturity Model; Maturity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Roeling, M. H. F. (2012). Towards an aligned organization on information security. (Masters Thesis). Universiteit Utrecht. Retrieved from http://dspace.library.uu.nl:8080/handle/1874/255403

Chicago Manual of Style (16th Edition):

Roeling, M H F. “Towards an aligned organization on information security.” 2012. Masters Thesis, Universiteit Utrecht. Accessed April 08, 2020. http://dspace.library.uu.nl:8080/handle/1874/255403.

MLA Handbook (7th Edition):

Roeling, M H F. “Towards an aligned organization on information security.” 2012. Web. 08 Apr 2020.

Vancouver:

Roeling MHF. Towards an aligned organization on information security. [Internet] [Masters thesis]. Universiteit Utrecht; 2012. [cited 2020 Apr 08]. Available from: http://dspace.library.uu.nl:8080/handle/1874/255403.

Council of Science Editors:

Roeling MHF. Towards an aligned organization on information security. [Masters Thesis]. Universiteit Utrecht; 2012. Available from: http://dspace.library.uu.nl:8080/handle/1874/255403


NSYSU

3. Tsao, Yu-Jen. The effect of Information Security Management System in Hospitals on the Maturity of Information Security.

Degree: Master, Information Management, 2017, NSYSU

 In recent years, with the advancement and development of information technology, the issue of information security has become the most important of hospitals. Taking the… (more)

Subjects/Keywords: Conflict; Information Security Policy; Information Security Maturity; Information Security Management System; Coordination Mechanism; Information Security Management Acceptance

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tsao, Y. (2017). The effect of Information Security Management System in Hospitals on the Maturity of Information Security. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0717117-212100

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tsao, Yu-Jen. “The effect of Information Security Management System in Hospitals on the Maturity of Information Security.” 2017. Thesis, NSYSU. Accessed April 08, 2020. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0717117-212100.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tsao, Yu-Jen. “The effect of Information Security Management System in Hospitals on the Maturity of Information Security.” 2017. Web. 08 Apr 2020.

Vancouver:

Tsao Y. The effect of Information Security Management System in Hospitals on the Maturity of Information Security. [Internet] [Thesis]. NSYSU; 2017. [cited 2020 Apr 08]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0717117-212100.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tsao Y. The effect of Information Security Management System in Hospitals on the Maturity of Information Security. [Thesis]. NSYSU; 2017. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0717117-212100

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

4. Thiago Dalpoz e Britto. Levantamento e diagnóstico de maturidade da governança da segurança da informação na administração direta federal brasileira.

Degree: 2011, Universidade Católica de Brasilia

O presente trabalho de pesquisa discute a Governança da Segurança de Informação (GovSI), bem como suas melhores práticas, processos e políticas de alinhamento da Segurança… (more)

Subjects/Keywords: sistemas de recuperação da informação; segurança; gestão do conhecimento; administração pública; administração de risco; CIENCIA DA COMPUTACAO; information security governance; risk management; maturity level; federal public direct administration; CIENCIA DA COMPUTACAO

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Britto, T. D. e. (2011). Levantamento e diagnóstico de maturidade da governança da segurança da informação na administração direta federal brasileira. (Masters Thesis). Universidade Católica de Brasilia. Retrieved from http://www.bdtd.ucb.br/tede/tde_busca/arquivo.php?codArquivo=1429

Chicago Manual of Style (16th Edition):

Britto, Thiago Dalpoz e. “Levantamento e diagnóstico de maturidade da governança da segurança da informação na administração direta federal brasileira.” 2011. Masters Thesis, Universidade Católica de Brasilia. Accessed April 08, 2020. http://www.bdtd.ucb.br/tede/tde_busca/arquivo.php?codArquivo=1429.

MLA Handbook (7th Edition):

Britto, Thiago Dalpoz e. “Levantamento e diagnóstico de maturidade da governança da segurança da informação na administração direta federal brasileira.” 2011. Web. 08 Apr 2020.

Vancouver:

Britto TDe. Levantamento e diagnóstico de maturidade da governança da segurança da informação na administração direta federal brasileira. [Internet] [Masters thesis]. Universidade Católica de Brasilia; 2011. [cited 2020 Apr 08]. Available from: http://www.bdtd.ucb.br/tede/tde_busca/arquivo.php?codArquivo=1429.

Council of Science Editors:

Britto TDe. Levantamento e diagnóstico de maturidade da governança da segurança da informação na administração direta federal brasileira. [Masters Thesis]. Universidade Católica de Brasilia; 2011. Available from: http://www.bdtd.ucb.br/tede/tde_busca/arquivo.php?codArquivo=1429


Luleå University of Technology

5. Charif, Bilal. Security Concerns on Adoption of Cloud Computing.

Degree: 2014, Luleå University of Technology

This project aims to investigate the status of cloud computing among business and government organizations, and to understand the security concerns of organizations regarding… (more)

Subjects/Keywords: Technology; Information Security; Cloud Computing; Adoption; Service Level Agreement; Teknik

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Charif, B. (2014). Security Concerns on Adoption of Cloud Computing. (Thesis). Luleå University of Technology. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-57677

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Charif, Bilal. “Security Concerns on Adoption of Cloud Computing.” 2014. Thesis, Luleå University of Technology. Accessed April 08, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-57677.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Charif, Bilal. “Security Concerns on Adoption of Cloud Computing.” 2014. Web. 08 Apr 2020.

Vancouver:

Charif B. Security Concerns on Adoption of Cloud Computing. [Internet] [Thesis]. Luleå University of Technology; 2014. [cited 2020 Apr 08]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-57677.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Charif B. Security Concerns on Adoption of Cloud Computing. [Thesis]. Luleå University of Technology; 2014. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-57677

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

6. Halldén, John. Mognadsgrad och förbättringsförslag av acceptanstester inom Trafikverkets verksamheter baserat på TMM.

Degree: Information Systems, 2019, Dalarna University

I nuläget utförs acceptanstester på Trafikverket utan att veta testprocessens styrkor och svagheter. Denna fallstudie tar genom Test Maturity Model (TMM) fram en mognadsgrad… (more)

Subjects/Keywords: TMM; Acceptance testing; Trafikverket; maturity level; case study; TMM; Acceptanstest; Trafikverket; Mognadsgrad; Fallstudie; Information Systems; Systemvetenskap, informationssystem och informatik

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Halldén, J. (2019). Mognadsgrad och förbättringsförslag av acceptanstester inom Trafikverkets verksamheter baserat på TMM. (Thesis). Dalarna University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:du-30403

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Halldén, John. “Mognadsgrad och förbättringsförslag av acceptanstester inom Trafikverkets verksamheter baserat på TMM.” 2019. Thesis, Dalarna University. Accessed April 08, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:du-30403.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Halldén, John. “Mognadsgrad och förbättringsförslag av acceptanstester inom Trafikverkets verksamheter baserat på TMM.” 2019. Web. 08 Apr 2020.

Vancouver:

Halldén J. Mognadsgrad och förbättringsförslag av acceptanstester inom Trafikverkets verksamheter baserat på TMM. [Internet] [Thesis]. Dalarna University; 2019. [cited 2020 Apr 08]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:du-30403.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Halldén J. Mognadsgrad och förbättringsförslag av acceptanstester inom Trafikverkets verksamheter baserat på TMM. [Thesis]. Dalarna University; 2019. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:du-30403

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Universiteit Utrecht

7. Slot, G.C.A. Towards Rule-based Information Security Maturity.

Degree: 2015, Universiteit Utrecht

 There is a growing need for information security. Not complying with the demand of having high level information security will affect the market position of… (more)

Subjects/Keywords: Organizational Characteristics; Number of Employees; Revenue; Sector; Information Security; Focus Area Maturity Model; ISFAM; Rule-based Approach.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Slot, G. C. A. (2015). Towards Rule-based Information Security Maturity. (Masters Thesis). Universiteit Utrecht. Retrieved from http://dspace.library.uu.nl:8080/handle/1874/315919

Chicago Manual of Style (16th Edition):

Slot, G C A. “Towards Rule-based Information Security Maturity.” 2015. Masters Thesis, Universiteit Utrecht. Accessed April 08, 2020. http://dspace.library.uu.nl:8080/handle/1874/315919.

MLA Handbook (7th Edition):

Slot, G C A. “Towards Rule-based Information Security Maturity.” 2015. Web. 08 Apr 2020.

Vancouver:

Slot GCA. Towards Rule-based Information Security Maturity. [Internet] [Masters thesis]. Universiteit Utrecht; 2015. [cited 2020 Apr 08]. Available from: http://dspace.library.uu.nl:8080/handle/1874/315919.

Council of Science Editors:

Slot GCA. Towards Rule-based Information Security Maturity. [Masters Thesis]. Universiteit Utrecht; 2015. Available from: http://dspace.library.uu.nl:8080/handle/1874/315919

8. Os, Rob Van. SOC-CMM: Designing and Evaluating a Tool for Measurement of Capability Maturity in Security Operations Centers.

Degree: Computer Science, 2016, Luleå University of Technology

  This thesis addresses the research gap that exists in the area of capability maturity measurement for Security Operations Centers (SOCs). This gap is due… (more)

Subjects/Keywords: Security Operations Center; SOC; Capability; Maturity; SOC-CMM; Computer and Information Sciences; Data- och informationsvetenskap; Social Sciences; Samhällsvetenskap

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Os, R. V. (2016). SOC-CMM: Designing and Evaluating a Tool for Measurement of Capability Maturity in Security Operations Centers. (Thesis). Luleå University of Technology. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-59591

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Os, Rob Van. “SOC-CMM: Designing and Evaluating a Tool for Measurement of Capability Maturity in Security Operations Centers.” 2016. Thesis, Luleå University of Technology. Accessed April 08, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-59591.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Os, Rob Van. “SOC-CMM: Designing and Evaluating a Tool for Measurement of Capability Maturity in Security Operations Centers.” 2016. Web. 08 Apr 2020.

Vancouver:

Os RV. SOC-CMM: Designing and Evaluating a Tool for Measurement of Capability Maturity in Security Operations Centers. [Internet] [Thesis]. Luleå University of Technology; 2016. [cited 2020 Apr 08]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-59591.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Os RV. SOC-CMM: Designing and Evaluating a Tool for Measurement of Capability Maturity in Security Operations Centers. [Thesis]. Luleå University of Technology; 2016. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-59591

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Illinois – Urbana-Champaign

9. Garcia, Gustavo. Measuring progress and defining productivity in model-based engineering.

Degree: MS, Civil Engineering, 2017, University of Illinois – Urbana-Champaign

 Have you ever walked into a model review session or looked into a model and wondered about the level of maturity towards the deliverables? Over… (more)

Subjects/Keywords: Model Maturity Index (MMI); Model-based engineering; Model Maturity Risk Index (MMRI) Toolkit; Model execution plans (ModelXP); Model Maturity Risk Index (MRI) Toolkit; Progress; Productivity; Construction Industry Institute (CII); Building Information Modeling (BIM); Level of Development (LoD)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Garcia, G. (2017). Measuring progress and defining productivity in model-based engineering. (Thesis). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/98307

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Garcia, Gustavo. “Measuring progress and defining productivity in model-based engineering.” 2017. Thesis, University of Illinois – Urbana-Champaign. Accessed April 08, 2020. http://hdl.handle.net/2142/98307.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Garcia, Gustavo. “Measuring progress and defining productivity in model-based engineering.” 2017. Web. 08 Apr 2020.

Vancouver:

Garcia G. Measuring progress and defining productivity in model-based engineering. [Internet] [Thesis]. University of Illinois – Urbana-Champaign; 2017. [cited 2020 Apr 08]. Available from: http://hdl.handle.net/2142/98307.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Garcia G. Measuring progress and defining productivity in model-based engineering. [Thesis]. University of Illinois – Urbana-Champaign; 2017. Available from: http://hdl.handle.net/2142/98307

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Waterloo

10. Alaboodi, Saad Saleh. Towards evaluating security implementations using the Information Security Maturity Model (ISMM).

Degree: 2007, University of Waterloo

Information security is a common and ever-present concern for both private and public sector organizations. Information security protects information from a wide range of threats,… (more)

Subjects/Keywords: maturity model; information security; IT security; security processes; attack model; optimal security; cost of information security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alaboodi, S. S. (2007). Towards evaluating security implementations using the Information Security Maturity Model (ISMM). (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/3049

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Alaboodi, Saad Saleh. “Towards evaluating security implementations using the Information Security Maturity Model (ISMM).” 2007. Thesis, University of Waterloo. Accessed April 08, 2020. http://hdl.handle.net/10012/3049.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Alaboodi, Saad Saleh. “Towards evaluating security implementations using the Information Security Maturity Model (ISMM).” 2007. Web. 08 Apr 2020.

Vancouver:

Alaboodi SS. Towards evaluating security implementations using the Information Security Maturity Model (ISMM). [Internet] [Thesis]. University of Waterloo; 2007. [cited 2020 Apr 08]. Available from: http://hdl.handle.net/10012/3049.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Alaboodi SS. Towards evaluating security implementations using the Information Security Maturity Model (ISMM). [Thesis]. University of Waterloo; 2007. Available from: http://hdl.handle.net/10012/3049

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Eastern Michigan University

11. Sanga, Sushma. The effect of electronic devices self-efficacy, electronic devices usage and information security awareness on identity-theft anxiety level.

Degree: PhD, College of Technology, 2016, Eastern Michigan University

  Identity-theft means stealing someone’s personal information and using it without his or her permission. Each year, millions of Americans are becoming the victims of… (more)

Subjects/Keywords: Anxiety Level; Electronic Devices Usage; Identity-theft; Information Security Awareness; Self-Efficacy; Technology and Innovation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sanga, S. (2016). The effect of electronic devices self-efficacy, electronic devices usage and information security awareness on identity-theft anxiety level. (Doctoral Dissertation). Eastern Michigan University. Retrieved from https://commons.emich.edu/theses/879

Chicago Manual of Style (16th Edition):

Sanga, Sushma. “The effect of electronic devices self-efficacy, electronic devices usage and information security awareness on identity-theft anxiety level.” 2016. Doctoral Dissertation, Eastern Michigan University. Accessed April 08, 2020. https://commons.emich.edu/theses/879.

MLA Handbook (7th Edition):

Sanga, Sushma. “The effect of electronic devices self-efficacy, electronic devices usage and information security awareness on identity-theft anxiety level.” 2016. Web. 08 Apr 2020.

Vancouver:

Sanga S. The effect of electronic devices self-efficacy, electronic devices usage and information security awareness on identity-theft anxiety level. [Internet] [Doctoral dissertation]. Eastern Michigan University; 2016. [cited 2020 Apr 08]. Available from: https://commons.emich.edu/theses/879.

Council of Science Editors:

Sanga S. The effect of electronic devices self-efficacy, electronic devices usage and information security awareness on identity-theft anxiety level. [Doctoral Dissertation]. Eastern Michigan University; 2016. Available from: https://commons.emich.edu/theses/879


NSYSU

12. Lin, Yan-Ye. A Study of The Effect of Information Security Advocacy.

Degree: Master, Information Management, 2018, NSYSU

 The purposes of this study have three. First, we want to discover how different illustration of information security messages affects people attitude toward compliance intention.… (more)

Subjects/Keywords: Protection motivation theory; Regulatory focus theory; Information security advocacy; Construal-level theory

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lin, Y. (2018). A Study of The Effect of Information Security Advocacy. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0523118-000816

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lin, Yan-Ye. “A Study of The Effect of Information Security Advocacy.” 2018. Thesis, NSYSU. Accessed April 08, 2020. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0523118-000816.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lin, Yan-Ye. “A Study of The Effect of Information Security Advocacy.” 2018. Web. 08 Apr 2020.

Vancouver:

Lin Y. A Study of The Effect of Information Security Advocacy. [Internet] [Thesis]. NSYSU; 2018. [cited 2020 Apr 08]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0523118-000816.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lin Y. A Study of The Effect of Information Security Advocacy. [Thesis]. NSYSU; 2018. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0523118-000816

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Western Kentucky University

13. Burchett, Ian. Quantifying Computer Network Security.

Degree: MS, Department of Mathematics and Computer Science, 2011, Western Kentucky University

  Simplifying network security data to the point that it is readily accessible and usable by a wider audience is increasingly becoming important, as networks… (more)

Subjects/Keywords: computer networks; NVD; CVSS; network security data; security risk level; Computer Sciences; Databases and Information Systems; OS and Networks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Burchett, I. (2011). Quantifying Computer Network Security. (Masters Thesis). Western Kentucky University. Retrieved from https://digitalcommons.wku.edu/theses/1118

Chicago Manual of Style (16th Edition):

Burchett, Ian. “Quantifying Computer Network Security.” 2011. Masters Thesis, Western Kentucky University. Accessed April 08, 2020. https://digitalcommons.wku.edu/theses/1118.

MLA Handbook (7th Edition):

Burchett, Ian. “Quantifying Computer Network Security.” 2011. Web. 08 Apr 2020.

Vancouver:

Burchett I. Quantifying Computer Network Security. [Internet] [Masters thesis]. Western Kentucky University; 2011. [cited 2020 Apr 08]. Available from: https://digitalcommons.wku.edu/theses/1118.

Council of Science Editors:

Burchett I. Quantifying Computer Network Security. [Masters Thesis]. Western Kentucky University; 2011. Available from: https://digitalcommons.wku.edu/theses/1118


University of Tasmania

14. Kim, TH. A study on security level management model for information system.

Degree: 2011, University of Tasmania

 The attempts to protect information and Information System (IS) from the threats are progressing variously and systematically, and the necessity to build security countermeasures by… (more)

Subjects/Keywords: security level; threat level; asset level; security countermeasure

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kim, T. (2011). A study on security level management model for information system. (Thesis). University of Tasmania. Retrieved from https://eprints.utas.edu.au/12481/2/KIM_thesis.pdf

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kim, TH. “A study on security level management model for information system.” 2011. Thesis, University of Tasmania. Accessed April 08, 2020. https://eprints.utas.edu.au/12481/2/KIM_thesis.pdf.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kim, TH. “A study on security level management model for information system.” 2011. Web. 08 Apr 2020.

Vancouver:

Kim T. A study on security level management model for information system. [Internet] [Thesis]. University of Tasmania; 2011. [cited 2020 Apr 08]. Available from: https://eprints.utas.edu.au/12481/2/KIM_thesis.pdf.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kim T. A study on security level management model for information system. [Thesis]. University of Tasmania; 2011. Available from: https://eprints.utas.edu.au/12481/2/KIM_thesis.pdf

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

15. Maurício Machado Paranhos. Framework de segurança da informação para medição do nível de maturidade das organizações.

Degree: 2010, Universidade Católica de Brasilia

A segurança da informação nas organizações, em muitos casos, passa a ser algo que viabiliza ou inviabiliza um negócio, já que protege o principal ativo… (more)

Subjects/Keywords: redes de computação; sistemas de recuperação da informação; organização; tecnologia da informação; framework; programa de computador; CIENCIA DA INFORMACAO; governance; framework; information security; maturity; CIENCIA DA INFORMACAO

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Paranhos, M. M. (2010). Framework de segurança da informação para medição do nível de maturidade das organizações. (Masters Thesis). Universidade Católica de Brasilia. Retrieved from http://www.bdtd.ucb.br/tede/tde_busca/arquivo.php?codArquivo=1417

Chicago Manual of Style (16th Edition):

Paranhos, Maurício Machado. “Framework de segurança da informação para medição do nível de maturidade das organizações.” 2010. Masters Thesis, Universidade Católica de Brasilia. Accessed April 08, 2020. http://www.bdtd.ucb.br/tede/tde_busca/arquivo.php?codArquivo=1417.

MLA Handbook (7th Edition):

Paranhos, Maurício Machado. “Framework de segurança da informação para medição do nível de maturidade das organizações.” 2010. Web. 08 Apr 2020.

Vancouver:

Paranhos MM. Framework de segurança da informação para medição do nível de maturidade das organizações. [Internet] [Masters thesis]. Universidade Católica de Brasilia; 2010. [cited 2020 Apr 08]. Available from: http://www.bdtd.ucb.br/tede/tde_busca/arquivo.php?codArquivo=1417.

Council of Science Editors:

Paranhos MM. Framework de segurança da informação para medição do nível de maturidade das organizações. [Masters Thesis]. Universidade Católica de Brasilia; 2010. Available from: http://www.bdtd.ucb.br/tede/tde_busca/arquivo.php?codArquivo=1417


California State University – San Bernardino

16. Panossian, Garo. MULTI-LEVEL SECURE DATA DISSEMINATION.

Degree: MSin Information Systems and Technology, Information and Decision Sciences, 2019, California State University – San Bernardino

  Multi-level security is prevalent within the military; however, the private sector has not yet invested in the approach. As big data, Internet of things,… (more)

Subjects/Keywords: multi-level security; Computer Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Panossian, G. (2019). MULTI-LEVEL SECURE DATA DISSEMINATION. (Thesis). California State University – San Bernardino. Retrieved from https://scholarworks.lib.csusb.edu/etd/946

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Panossian, Garo. “MULTI-LEVEL SECURE DATA DISSEMINATION.” 2019. Thesis, California State University – San Bernardino. Accessed April 08, 2020. https://scholarworks.lib.csusb.edu/etd/946.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Panossian, Garo. “MULTI-LEVEL SECURE DATA DISSEMINATION.” 2019. Web. 08 Apr 2020.

Vancouver:

Panossian G. MULTI-LEVEL SECURE DATA DISSEMINATION. [Internet] [Thesis]. California State University – San Bernardino; 2019. [cited 2020 Apr 08]. Available from: https://scholarworks.lib.csusb.edu/etd/946.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Panossian G. MULTI-LEVEL SECURE DATA DISSEMINATION. [Thesis]. California State University – San Bernardino; 2019. Available from: https://scholarworks.lib.csusb.edu/etd/946

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Nairobi

17. Mulievi, Amos M. Information security policy framework for a manufacturing firm .

Degree: 2009, University of Nairobi

Information and the supporting processes, systems, and networks are important business assets. Defining, achieving, maintaining, and improving information security is essential to maintain competitive edge,… (more)

Subjects/Keywords: Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mulievi, A. M. (2009). Information security policy framework for a manufacturing firm . (Thesis). University of Nairobi. Retrieved from http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/21667

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Mulievi, Amos M. “Information security policy framework for a manufacturing firm .” 2009. Thesis, University of Nairobi. Accessed April 08, 2020. http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/21667.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Mulievi, Amos M. “Information security policy framework for a manufacturing firm .” 2009. Web. 08 Apr 2020.

Vancouver:

Mulievi AM. Information security policy framework for a manufacturing firm . [Internet] [Thesis]. University of Nairobi; 2009. [cited 2020 Apr 08]. Available from: http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/21667.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Mulievi AM. Information security policy framework for a manufacturing firm . [Thesis]. University of Nairobi; 2009. Available from: http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/21667

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

18. Aljuhani, Ahamed. Mitigation of Application Layer DDoS Flood Attack Against Web Servers.

Degree: 2020, The Catholic University of America

The application-layer distributed denial of service (App-DDoS) attack is one of the most menacing types of cyberattacks that circumvent web servers. As attackers have developed… (more)

Subjects/Keywords: Information security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Aljuhani, A. (2020). Mitigation of Application Layer DDoS Flood Attack Against Web Servers. (Thesis). The Catholic University of America. Retrieved from http://hdl.handle.net/1961/cuislandora:213981

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Aljuhani, Ahamed. “Mitigation of Application Layer DDoS Flood Attack Against Web Servers.” 2020. Thesis, The Catholic University of America. Accessed April 08, 2020. http://hdl.handle.net/1961/cuislandora:213981.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Aljuhani, Ahamed. “Mitigation of Application Layer DDoS Flood Attack Against Web Servers.” 2020. Web. 08 Apr 2020.

Vancouver:

Aljuhani A. Mitigation of Application Layer DDoS Flood Attack Against Web Servers. [Internet] [Thesis]. The Catholic University of America; 2020. [cited 2020 Apr 08]. Available from: http://hdl.handle.net/1961/cuislandora:213981.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Aljuhani A. Mitigation of Application Layer DDoS Flood Attack Against Web Servers. [Thesis]. The Catholic University of America; 2020. Available from: http://hdl.handle.net/1961/cuislandora:213981

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Universiteit Utrecht

19. Pietzka, K. MD3M Master Data Management Maturity Assessment - Developing an Assessment to Evaluate an Organization's MDM Maturity.

Degree: 2012, Universiteit Utrecht

 This research deals with assessing the master data maturity of an organization. It presents a thorough literature study on the main concepts and best practices… (more)

Subjects/Keywords: Master Data Management; Maturity Assessment; Information Management

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pietzka, K. (2012). MD3M Master Data Management Maturity Assessment - Developing an Assessment to Evaluate an Organization's MDM Maturity. (Masters Thesis). Universiteit Utrecht. Retrieved from http://dspace.library.uu.nl:8080/handle/1874/255375

Chicago Manual of Style (16th Edition):

Pietzka, K. “MD3M Master Data Management Maturity Assessment - Developing an Assessment to Evaluate an Organization's MDM Maturity.” 2012. Masters Thesis, Universiteit Utrecht. Accessed April 08, 2020. http://dspace.library.uu.nl:8080/handle/1874/255375.

MLA Handbook (7th Edition):

Pietzka, K. “MD3M Master Data Management Maturity Assessment - Developing an Assessment to Evaluate an Organization's MDM Maturity.” 2012. Web. 08 Apr 2020.

Vancouver:

Pietzka K. MD3M Master Data Management Maturity Assessment - Developing an Assessment to Evaluate an Organization's MDM Maturity. [Internet] [Masters thesis]. Universiteit Utrecht; 2012. [cited 2020 Apr 08]. Available from: http://dspace.library.uu.nl:8080/handle/1874/255375.

Council of Science Editors:

Pietzka K. MD3M Master Data Management Maturity Assessment - Developing an Assessment to Evaluate an Organization's MDM Maturity. [Masters Thesis]. Universiteit Utrecht; 2012. Available from: http://dspace.library.uu.nl:8080/handle/1874/255375


Universiteit Utrecht

20. Hermanns, T.I. Towards an IT maturity model for general practice information systems.

Degree: 2014, Universiteit Utrecht

Information technology within general practices has the potential to improve care subsantially. It is however unclear how these benefits can be realized. This research explores… (more)

Subjects/Keywords: General practice information system; maturity model; primary care, general practice, maturity, focus area maturity model, information technology

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hermanns, T. I. (2014). Towards an IT maturity model for general practice information systems. (Masters Thesis). Universiteit Utrecht. Retrieved from http://dspace.library.uu.nl:8080/handle/1874/294630

Chicago Manual of Style (16th Edition):

Hermanns, T I. “Towards an IT maturity model for general practice information systems.” 2014. Masters Thesis, Universiteit Utrecht. Accessed April 08, 2020. http://dspace.library.uu.nl:8080/handle/1874/294630.

MLA Handbook (7th Edition):

Hermanns, T I. “Towards an IT maturity model for general practice information systems.” 2014. Web. 08 Apr 2020.

Vancouver:

Hermanns TI. Towards an IT maturity model for general practice information systems. [Internet] [Masters thesis]. Universiteit Utrecht; 2014. [cited 2020 Apr 08]. Available from: http://dspace.library.uu.nl:8080/handle/1874/294630.

Council of Science Editors:

Hermanns TI. Towards an IT maturity model for general practice information systems. [Masters Thesis]. Universiteit Utrecht; 2014. Available from: http://dspace.library.uu.nl:8080/handle/1874/294630


University of Cincinnati

21. Hausrath, Nathaniel L. Methods for Hospital Network and Computer Security.

Degree: MS, Engineering and Applied Science: Computer Science, 2011, University of Cincinnati

 Hospital IT security presents many unique challenges that must be solved by the entire organization. Network and computer threats can cause thousands of dollars in… (more)

Subjects/Keywords: Information Technology; hospital it Security; information security; network security; computer security; hospital information security; security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hausrath, N. L. (2011). Methods for Hospital Network and Computer Security. (Masters Thesis). University of Cincinnati. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=ucin1303845234

Chicago Manual of Style (16th Edition):

Hausrath, Nathaniel L. “Methods for Hospital Network and Computer Security.” 2011. Masters Thesis, University of Cincinnati. Accessed April 08, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1303845234.

MLA Handbook (7th Edition):

Hausrath, Nathaniel L. “Methods for Hospital Network and Computer Security.” 2011. Web. 08 Apr 2020.

Vancouver:

Hausrath NL. Methods for Hospital Network and Computer Security. [Internet] [Masters thesis]. University of Cincinnati; 2011. [cited 2020 Apr 08]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ucin1303845234.

Council of Science Editors:

Hausrath NL. Methods for Hospital Network and Computer Security. [Masters Thesis]. University of Cincinnati; 2011. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ucin1303845234


University of Pretoria

22. Bhana, Heena. The mining sector’s response to environmental sustainability.

Degree: Gordon Institute of Business Science (GIBS), 2011, University of Pretoria

 Recent environmental catastrophes such as the Deepwater Horizon oil spill by BP in the Gulf of Mexico and the rising acid mine water in Johannesburg,… (more)

Subjects/Keywords: UCTD; Maturity level; Sustainability; Environmental; Mining sector; South africa

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bhana, H. (2011). The mining sector’s response to environmental sustainability. (Masters Thesis). University of Pretoria. Retrieved from http://hdl.handle.net/2263/23768

Chicago Manual of Style (16th Edition):

Bhana, Heena. “The mining sector’s response to environmental sustainability.” 2011. Masters Thesis, University of Pretoria. Accessed April 08, 2020. http://hdl.handle.net/2263/23768.

MLA Handbook (7th Edition):

Bhana, Heena. “The mining sector’s response to environmental sustainability.” 2011. Web. 08 Apr 2020.

Vancouver:

Bhana H. The mining sector’s response to environmental sustainability. [Internet] [Masters thesis]. University of Pretoria; 2011. [cited 2020 Apr 08]. Available from: http://hdl.handle.net/2263/23768.

Council of Science Editors:

Bhana H. The mining sector’s response to environmental sustainability. [Masters Thesis]. University of Pretoria; 2011. Available from: http://hdl.handle.net/2263/23768


University of Pretoria

23. [No author]. The mining sector’s response to environmental sustainability .

Degree: 2011, University of Pretoria

 Recent environmental catastrophes such as the Deepwater Horizon oil spill by BP in the Gulf of Mexico and the rising acid mine water in Johannesburg,… (more)

Subjects/Keywords: UCTD; Maturity level; Sustainability; Environmental; Mining sector; South africa

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

author], [. (2011). The mining sector’s response to environmental sustainability . (Masters Thesis). University of Pretoria. Retrieved from http://upetd.up.ac.za/thesis/available/etd-04042011-160555/

Chicago Manual of Style (16th Edition):

author], [No. “The mining sector’s response to environmental sustainability .” 2011. Masters Thesis, University of Pretoria. Accessed April 08, 2020. http://upetd.up.ac.za/thesis/available/etd-04042011-160555/.

MLA Handbook (7th Edition):

author], [No. “The mining sector’s response to environmental sustainability .” 2011. Web. 08 Apr 2020.

Vancouver:

author] [. The mining sector’s response to environmental sustainability . [Internet] [Masters thesis]. University of Pretoria; 2011. [cited 2020 Apr 08]. Available from: http://upetd.up.ac.za/thesis/available/etd-04042011-160555/.

Council of Science Editors:

author] [. The mining sector’s response to environmental sustainability . [Masters Thesis]. University of Pretoria; 2011. Available from: http://upetd.up.ac.za/thesis/available/etd-04042011-160555/


Louisiana State University

24. Pu, Shuaihua. Effects of plant maturity and bacterial inoculum level on the surface contamination and internalization of Escherichia coli O157:H7 in growing spinach.

Degree: MS, Life Sciences, 2009, Louisiana State University

 The incidence of foodborne outbreaks linked to fresh produce has increased in the United States. Particularly noteworthy was the 2006 Escherichia coli O157:H7 outbreak associated… (more)

Subjects/Keywords: surface contamination; internalization; Escherichia coli O157:H7; inoculum level; maturity; spinach

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pu, S. (2009). Effects of plant maturity and bacterial inoculum level on the surface contamination and internalization of Escherichia coli O157:H7 in growing spinach. (Masters Thesis). Louisiana State University. Retrieved from etd-08162009-211103 ; https://digitalcommons.lsu.edu/gradschool_theses/4057

Chicago Manual of Style (16th Edition):

Pu, Shuaihua. “Effects of plant maturity and bacterial inoculum level on the surface contamination and internalization of Escherichia coli O157:H7 in growing spinach.” 2009. Masters Thesis, Louisiana State University. Accessed April 08, 2020. etd-08162009-211103 ; https://digitalcommons.lsu.edu/gradschool_theses/4057.

MLA Handbook (7th Edition):

Pu, Shuaihua. “Effects of plant maturity and bacterial inoculum level on the surface contamination and internalization of Escherichia coli O157:H7 in growing spinach.” 2009. Web. 08 Apr 2020.

Vancouver:

Pu S. Effects of plant maturity and bacterial inoculum level on the surface contamination and internalization of Escherichia coli O157:H7 in growing spinach. [Internet] [Masters thesis]. Louisiana State University; 2009. [cited 2020 Apr 08]. Available from: etd-08162009-211103 ; https://digitalcommons.lsu.edu/gradschool_theses/4057.

Council of Science Editors:

Pu S. Effects of plant maturity and bacterial inoculum level on the surface contamination and internalization of Escherichia coli O157:H7 in growing spinach. [Masters Thesis]. Louisiana State University; 2009. Available from: etd-08162009-211103 ; https://digitalcommons.lsu.edu/gradschool_theses/4057

25. Garrett, Keith. Vulnerabililty Analysis of Multi-Factor Authentication Protocols.

Degree: 2016, University of North Florida

 In this thesis, the author hypothesizes that the use of computationally intensive mathematical operations in password authentication protocols can lead to security vulnerabilities in those… (more)

Subjects/Keywords: clogging attack security; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Garrett, K. (2016). Vulnerabililty Analysis of Multi-Factor Authentication Protocols. (Thesis). University of North Florida. Retrieved from https://digitalcommons.unf.edu/etd/715

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Garrett, Keith. “Vulnerabililty Analysis of Multi-Factor Authentication Protocols.” 2016. Thesis, University of North Florida. Accessed April 08, 2020. https://digitalcommons.unf.edu/etd/715.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Garrett, Keith. “Vulnerabililty Analysis of Multi-Factor Authentication Protocols.” 2016. Web. 08 Apr 2020.

Vancouver:

Garrett K. Vulnerabililty Analysis of Multi-Factor Authentication Protocols. [Internet] [Thesis]. University of North Florida; 2016. [cited 2020 Apr 08]. Available from: https://digitalcommons.unf.edu/etd/715.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Garrett K. Vulnerabililty Analysis of Multi-Factor Authentication Protocols. [Thesis]. University of North Florida; 2016. Available from: https://digitalcommons.unf.edu/etd/715

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Wollongong

26. Saad Alarifi, Abdulaziz. Assessing and mitigating information security risk in Saudi Arabia.

Degree: PhD, 2013, University of Wollongong

  While the Web, cell phone ‘apps’ and cloud computing put a world of information at our fingertips, that information is under constant threat from… (more)

Subjects/Keywords: information security; information security awareness; information systems; information security management

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Saad Alarifi, A. (2013). Assessing and mitigating information security risk in Saudi Arabia. (Doctoral Dissertation). University of Wollongong. Retrieved from 0806 INFORMATION SYSTEMS, 080609 Information Systems Management ; https://ro.uow.edu.au/theses/4317

Chicago Manual of Style (16th Edition):

Saad Alarifi, Abdulaziz. “Assessing and mitigating information security risk in Saudi Arabia.” 2013. Doctoral Dissertation, University of Wollongong. Accessed April 08, 2020. 0806 INFORMATION SYSTEMS, 080609 Information Systems Management ; https://ro.uow.edu.au/theses/4317.

MLA Handbook (7th Edition):

Saad Alarifi, Abdulaziz. “Assessing and mitigating information security risk in Saudi Arabia.” 2013. Web. 08 Apr 2020.

Vancouver:

Saad Alarifi A. Assessing and mitigating information security risk in Saudi Arabia. [Internet] [Doctoral dissertation]. University of Wollongong; 2013. [cited 2020 Apr 08]. Available from: 0806 INFORMATION SYSTEMS, 080609 Information Systems Management ; https://ro.uow.edu.au/theses/4317.

Council of Science Editors:

Saad Alarifi A. Assessing and mitigating information security risk in Saudi Arabia. [Doctoral Dissertation]. University of Wollongong; 2013. Available from: 0806 INFORMATION SYSTEMS, 080609 Information Systems Management ; https://ro.uow.edu.au/theses/4317


Brno University of Technology

27. Kubík, Lukáš. Informační bezpečnost jako jeden z ukazatelů hodnocení výkonnosti v energetické společnosti .

Degree: 2017, Brno University of Technology

 Diplomová práce se zabývá hodnocením stavu informační bezpečnosti a jeho využitím jako ukazatele podnikové výkonnosti v energetické společnosti. Kapitola analýza problému a současné situace předkládá… (more)

Subjects/Keywords: Bezpečnost informací; Systém řízení informační bezpečnosti; ISMS; Kybernetická bezpečnost; ČSN ISO/IEC 27001; ČSN ISO/IEC 27002; Podniková výkonnost; Řízení rizik; Metrika; Model zralosti; Information Security; Information Security Management System; ISMS; Cyber Security; ČSN ISO/IEC 27001; ČSN ISO/IEC 27002; Corporate Performance; Risk Management; Measure; Maturity Model

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kubík, L. (2017). Informační bezpečnost jako jeden z ukazatelů hodnocení výkonnosti v energetické společnosti . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/66150

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kubík, Lukáš. “Informační bezpečnost jako jeden z ukazatelů hodnocení výkonnosti v energetické společnosti .” 2017. Thesis, Brno University of Technology. Accessed April 08, 2020. http://hdl.handle.net/11012/66150.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kubík, Lukáš. “Informační bezpečnost jako jeden z ukazatelů hodnocení výkonnosti v energetické společnosti .” 2017. Web. 08 Apr 2020.

Vancouver:

Kubík L. Informační bezpečnost jako jeden z ukazatelů hodnocení výkonnosti v energetické společnosti . [Internet] [Thesis]. Brno University of Technology; 2017. [cited 2020 Apr 08]. Available from: http://hdl.handle.net/11012/66150.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kubík L. Informační bezpečnost jako jeden z ukazatelů hodnocení výkonnosti v energetické společnosti . [Thesis]. Brno University of Technology; 2017. Available from: http://hdl.handle.net/11012/66150

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Colorado

28. Dixon, Bryan Charles. Exploring Low Profile Techniques for Malicious Code Detection on Smartphones.

Degree: PhD, Computer Science, 2013, University of Colorado

  In recent years there has been a growing number of viruses, rootkits, and malware designed to gain access to system resources and information stored… (more)

Subjects/Keywords: Mobile Security; Security; Computer Sciences; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dixon, B. C. (2013). Exploring Low Profile Techniques for Malicious Code Detection on Smartphones. (Doctoral Dissertation). University of Colorado. Retrieved from https://scholar.colorado.edu/csci_gradetds/69

Chicago Manual of Style (16th Edition):

Dixon, Bryan Charles. “Exploring Low Profile Techniques for Malicious Code Detection on Smartphones.” 2013. Doctoral Dissertation, University of Colorado. Accessed April 08, 2020. https://scholar.colorado.edu/csci_gradetds/69.

MLA Handbook (7th Edition):

Dixon, Bryan Charles. “Exploring Low Profile Techniques for Malicious Code Detection on Smartphones.” 2013. Web. 08 Apr 2020.

Vancouver:

Dixon BC. Exploring Low Profile Techniques for Malicious Code Detection on Smartphones. [Internet] [Doctoral dissertation]. University of Colorado; 2013. [cited 2020 Apr 08]. Available from: https://scholar.colorado.edu/csci_gradetds/69.

Council of Science Editors:

Dixon BC. Exploring Low Profile Techniques for Malicious Code Detection on Smartphones. [Doctoral Dissertation]. University of Colorado; 2013. Available from: https://scholar.colorado.edu/csci_gradetds/69


University of Plymouth

29. Talib, Shuhaili. Personalising information security education.

Degree: PhD, 2014, University of Plymouth

 Whilst technological solutions go a long way in providing protection for users online, it has been long understood that the individual also plays a pivotal… (more)

Subjects/Keywords: 005.8; Information security awareness; Information security education

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Talib, S. (2014). Personalising information security education. (Doctoral Dissertation). University of Plymouth. Retrieved from http://hdl.handle.net/10026.1/2896

Chicago Manual of Style (16th Edition):

Talib, Shuhaili. “Personalising information security education.” 2014. Doctoral Dissertation, University of Plymouth. Accessed April 08, 2020. http://hdl.handle.net/10026.1/2896.

MLA Handbook (7th Edition):

Talib, Shuhaili. “Personalising information security education.” 2014. Web. 08 Apr 2020.

Vancouver:

Talib S. Personalising information security education. [Internet] [Doctoral dissertation]. University of Plymouth; 2014. [cited 2020 Apr 08]. Available from: http://hdl.handle.net/10026.1/2896.

Council of Science Editors:

Talib S. Personalising information security education. [Doctoral Dissertation]. University of Plymouth; 2014. Available from: http://hdl.handle.net/10026.1/2896

30. Kirkham, Andrew Nicholas. Evaluating the Gasday Security Policy Through Penetration Testing and Application of the Nist Cybersecurity Framework.

Degree: 2016, Marquette University

 This thesis explores cybersecurity from the perspective of the Marquette University GasDay lab. We analyze three different areas of cybersecurity in three independent chapters. Our… (more)

Subjects/Keywords: cybersecurity; information security; penetration testing; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kirkham, A. N. (2016). Evaluating the Gasday Security Policy Through Penetration Testing and Application of the Nist Cybersecurity Framework. (Thesis). Marquette University. Retrieved from https://epublications.marquette.edu/theses_open/342

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kirkham, Andrew Nicholas. “Evaluating the Gasday Security Policy Through Penetration Testing and Application of the Nist Cybersecurity Framework.” 2016. Thesis, Marquette University. Accessed April 08, 2020. https://epublications.marquette.edu/theses_open/342.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kirkham, Andrew Nicholas. “Evaluating the Gasday Security Policy Through Penetration Testing and Application of the Nist Cybersecurity Framework.” 2016. Web. 08 Apr 2020.

Vancouver:

Kirkham AN. Evaluating the Gasday Security Policy Through Penetration Testing and Application of the Nist Cybersecurity Framework. [Internet] [Thesis]. Marquette University; 2016. [cited 2020 Apr 08]. Available from: https://epublications.marquette.edu/theses_open/342.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kirkham AN. Evaluating the Gasday Security Policy Through Penetration Testing and Application of the Nist Cybersecurity Framework. [Thesis]. Marquette University; 2016. Available from: https://epublications.marquette.edu/theses_open/342

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2] [3] [4] [5] … [2375]

.