Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Information security). Showing records 1 – 30 of 1614 total matches.

[1] [2] [3] [4] [5] … [54]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Languages

Country

▼ Search Limiters


University of Nairobi

1. Mulievi, Amos M. Information security policy framework for a manufacturing firm .

Degree: 2009, University of Nairobi

Information and the supporting processes, systems, and networks are important business assets. Defining, achieving, maintaining, and improving information security is essential to maintain competitive edge,… (more)

Subjects/Keywords: Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mulievi, A. M. (2009). Information security policy framework for a manufacturing firm . (Thesis). University of Nairobi. Retrieved from http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/21667

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Mulievi, Amos M. “Information security policy framework for a manufacturing firm .” 2009. Thesis, University of Nairobi. Accessed April 21, 2019. http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/21667.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Mulievi, Amos M. “Information security policy framework for a manufacturing firm .” 2009. Web. 21 Apr 2019.

Vancouver:

Mulievi AM. Information security policy framework for a manufacturing firm . [Internet] [Thesis]. University of Nairobi; 2009. [cited 2019 Apr 21]. Available from: http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/21667.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Mulievi AM. Information security policy framework for a manufacturing firm . [Thesis]. University of Nairobi; 2009. Available from: http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/21667

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


KTH

2. Farnian, Adnan. Assessing The Relative Importance of Information Security Governance Processes on Reducing Negative Impacts From Information Security Incidents.

Degree: Industrial Information and Control Systems, 2010, KTH

  Today the extent and value of electronic data is constantly growing. Dealing across the internet depends on how secure consumers believe their personal data… (more)

Subjects/Keywords: Information Technology; Information Security; Information Security Governance

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Farnian, A. (2010). Assessing The Relative Importance of Information Security Governance Processes on Reducing Negative Impacts From Information Security Incidents. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-81417

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Farnian, Adnan. “Assessing The Relative Importance of Information Security Governance Processes on Reducing Negative Impacts From Information Security Incidents.” 2010. Thesis, KTH. Accessed April 21, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-81417.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Farnian, Adnan. “Assessing The Relative Importance of Information Security Governance Processes on Reducing Negative Impacts From Information Security Incidents.” 2010. Web. 21 Apr 2019.

Vancouver:

Farnian A. Assessing The Relative Importance of Information Security Governance Processes on Reducing Negative Impacts From Information Security Incidents. [Internet] [Thesis]. KTH; 2010. [cited 2019 Apr 21]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-81417.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Farnian A. Assessing The Relative Importance of Information Security Governance Processes on Reducing Negative Impacts From Information Security Incidents. [Thesis]. KTH; 2010. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-81417

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Cincinnati

3. Hausrath, Nathaniel L. Methods for Hospital Network and Computer Security.

Degree: MS, Engineering and Applied Science: Computer Science, 2011, University of Cincinnati

 Hospital IT security presents many unique challenges that must be solved by the entire organization. Network and computer threats can cause thousands of dollars in… (more)

Subjects/Keywords: Information Technology; hospital it Security; information security; network security; computer security; hospital information security; security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hausrath, N. L. (2011). Methods for Hospital Network and Computer Security. (Masters Thesis). University of Cincinnati. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=ucin1303845234

Chicago Manual of Style (16th Edition):

Hausrath, Nathaniel L. “Methods for Hospital Network and Computer Security.” 2011. Masters Thesis, University of Cincinnati. Accessed April 21, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1303845234.

MLA Handbook (7th Edition):

Hausrath, Nathaniel L. “Methods for Hospital Network and Computer Security.” 2011. Web. 21 Apr 2019.

Vancouver:

Hausrath NL. Methods for Hospital Network and Computer Security. [Internet] [Masters thesis]. University of Cincinnati; 2011. [cited 2019 Apr 21]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ucin1303845234.

Council of Science Editors:

Hausrath NL. Methods for Hospital Network and Computer Security. [Masters Thesis]. University of Cincinnati; 2011. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ucin1303845234

4. Garrett, Keith. Vulnerabililty Analysis of Multi-Factor Authentication Protocols.

Degree: 2016, University of North Florida

 In this thesis, the author hypothesizes that the use of computationally intensive mathematical operations in password authentication protocols can lead to security vulnerabilities in those… (more)

Subjects/Keywords: clogging attack security; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Garrett, K. (2016). Vulnerabililty Analysis of Multi-Factor Authentication Protocols. (Thesis). University of North Florida. Retrieved from https://digitalcommons.unf.edu/etd/715

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Garrett, Keith. “Vulnerabililty Analysis of Multi-Factor Authentication Protocols.” 2016. Thesis, University of North Florida. Accessed April 21, 2019. https://digitalcommons.unf.edu/etd/715.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Garrett, Keith. “Vulnerabililty Analysis of Multi-Factor Authentication Protocols.” 2016. Web. 21 Apr 2019.

Vancouver:

Garrett K. Vulnerabililty Analysis of Multi-Factor Authentication Protocols. [Internet] [Thesis]. University of North Florida; 2016. [cited 2019 Apr 21]. Available from: https://digitalcommons.unf.edu/etd/715.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Garrett K. Vulnerabililty Analysis of Multi-Factor Authentication Protocols. [Thesis]. University of North Florida; 2016. Available from: https://digitalcommons.unf.edu/etd/715

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Wollongong

5. Saad Alarifi, Abdulaziz. Assessing and mitigating information security risk in Saudi Arabia.

Degree: PhD, 2013, University of Wollongong

  While the Web, cell phone ‘apps’ and cloud computing put a world of information at our fingertips, that information is under constant threat from… (more)

Subjects/Keywords: information security; information security awareness; information systems; information security management

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Saad Alarifi, A. (2013). Assessing and mitigating information security risk in Saudi Arabia. (Doctoral Dissertation). University of Wollongong. Retrieved from 0806 INFORMATION SYSTEMS, 080609 Information Systems Management ; http://ro.uow.edu.au/theses/4317

Chicago Manual of Style (16th Edition):

Saad Alarifi, Abdulaziz. “Assessing and mitigating information security risk in Saudi Arabia.” 2013. Doctoral Dissertation, University of Wollongong. Accessed April 21, 2019. 0806 INFORMATION SYSTEMS, 080609 Information Systems Management ; http://ro.uow.edu.au/theses/4317.

MLA Handbook (7th Edition):

Saad Alarifi, Abdulaziz. “Assessing and mitigating information security risk in Saudi Arabia.” 2013. Web. 21 Apr 2019.

Vancouver:

Saad Alarifi A. Assessing and mitigating information security risk in Saudi Arabia. [Internet] [Doctoral dissertation]. University of Wollongong; 2013. [cited 2019 Apr 21]. Available from: 0806 INFORMATION SYSTEMS, 080609 Information Systems Management ; http://ro.uow.edu.au/theses/4317.

Council of Science Editors:

Saad Alarifi A. Assessing and mitigating information security risk in Saudi Arabia. [Doctoral Dissertation]. University of Wollongong; 2013. Available from: 0806 INFORMATION SYSTEMS, 080609 Information Systems Management ; http://ro.uow.edu.au/theses/4317


University of Colorado

6. Dixon, Bryan Charles. Exploring Low Profile Techniques for Malicious Code Detection on Smartphones.

Degree: PhD, Computer Science, 2013, University of Colorado

  In recent years there has been a growing number of viruses, rootkits, and malware designed to gain access to system resources and information stored… (more)

Subjects/Keywords: Mobile Security; Security; Computer Sciences; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dixon, B. C. (2013). Exploring Low Profile Techniques for Malicious Code Detection on Smartphones. (Doctoral Dissertation). University of Colorado. Retrieved from http://scholar.colorado.edu/csci_gradetds/69

Chicago Manual of Style (16th Edition):

Dixon, Bryan Charles. “Exploring Low Profile Techniques for Malicious Code Detection on Smartphones.” 2013. Doctoral Dissertation, University of Colorado. Accessed April 21, 2019. http://scholar.colorado.edu/csci_gradetds/69.

MLA Handbook (7th Edition):

Dixon, Bryan Charles. “Exploring Low Profile Techniques for Malicious Code Detection on Smartphones.” 2013. Web. 21 Apr 2019.

Vancouver:

Dixon BC. Exploring Low Profile Techniques for Malicious Code Detection on Smartphones. [Internet] [Doctoral dissertation]. University of Colorado; 2013. [cited 2019 Apr 21]. Available from: http://scholar.colorado.edu/csci_gradetds/69.

Council of Science Editors:

Dixon BC. Exploring Low Profile Techniques for Malicious Code Detection on Smartphones. [Doctoral Dissertation]. University of Colorado; 2013. Available from: http://scholar.colorado.edu/csci_gradetds/69


University of Plymouth

7. Talib, Shuhaili. Personalising information security education.

Degree: PhD, 2014, University of Plymouth

 Whilst technological solutions go a long way in providing protection for users online, it has been long understood that the individual also plays a pivotal… (more)

Subjects/Keywords: 005.8; Information security awareness; Information security education

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Talib, S. (2014). Personalising information security education. (Doctoral Dissertation). University of Plymouth. Retrieved from http://hdl.handle.net/10026.1/2896

Chicago Manual of Style (16th Edition):

Talib, Shuhaili. “Personalising information security education.” 2014. Doctoral Dissertation, University of Plymouth. Accessed April 21, 2019. http://hdl.handle.net/10026.1/2896.

MLA Handbook (7th Edition):

Talib, Shuhaili. “Personalising information security education.” 2014. Web. 21 Apr 2019.

Vancouver:

Talib S. Personalising information security education. [Internet] [Doctoral dissertation]. University of Plymouth; 2014. [cited 2019 Apr 21]. Available from: http://hdl.handle.net/10026.1/2896.

Council of Science Editors:

Talib S. Personalising information security education. [Doctoral Dissertation]. University of Plymouth; 2014. Available from: http://hdl.handle.net/10026.1/2896

8. Kirkham, Andrew Nicholas. Evaluating the Gasday Security Policy Through Penetration Testing and Application of the Nist Cybersecurity Framework.

Degree: 2016, Marquette University

 This thesis explores cybersecurity from the perspective of the Marquette University GasDay lab. We analyze three different areas of cybersecurity in three independent chapters. Our… (more)

Subjects/Keywords: cybersecurity; information security; penetration testing; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kirkham, A. N. (2016). Evaluating the Gasday Security Policy Through Penetration Testing and Application of the Nist Cybersecurity Framework. (Thesis). Marquette University. Retrieved from https://epublications.marquette.edu/theses_open/342

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kirkham, Andrew Nicholas. “Evaluating the Gasday Security Policy Through Penetration Testing and Application of the Nist Cybersecurity Framework.” 2016. Thesis, Marquette University. Accessed April 21, 2019. https://epublications.marquette.edu/theses_open/342.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kirkham, Andrew Nicholas. “Evaluating the Gasday Security Policy Through Penetration Testing and Application of the Nist Cybersecurity Framework.” 2016. Web. 21 Apr 2019.

Vancouver:

Kirkham AN. Evaluating the Gasday Security Policy Through Penetration Testing and Application of the Nist Cybersecurity Framework. [Internet] [Thesis]. Marquette University; 2016. [cited 2019 Apr 21]. Available from: https://epublications.marquette.edu/theses_open/342.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kirkham AN. Evaluating the Gasday Security Policy Through Penetration Testing and Application of the Nist Cybersecurity Framework. [Thesis]. Marquette University; 2016. Available from: https://epublications.marquette.edu/theses_open/342

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Nairobi

9. Abass, Jabir S. A Survey Of Implementation Of Information Security Awareness Programs By Financial Institutions In Kenya .

Degree: 2009, University of Nairobi

 The need for ICT in financial institutions is increasingly inevitable given that the number of transactions is high, customers are many and spread. In such… (more)

Subjects/Keywords: Information Security Awareness

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Abass, J. S. (2009). A Survey Of Implementation Of Information Security Awareness Programs By Financial Institutions In Kenya . (Thesis). University of Nairobi. Retrieved from http://hdl.handle.net/11295/96497

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Abass, Jabir S. “A Survey Of Implementation Of Information Security Awareness Programs By Financial Institutions In Kenya .” 2009. Thesis, University of Nairobi. Accessed April 21, 2019. http://hdl.handle.net/11295/96497.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Abass, Jabir S. “A Survey Of Implementation Of Information Security Awareness Programs By Financial Institutions In Kenya .” 2009. Web. 21 Apr 2019.

Vancouver:

Abass JS. A Survey Of Implementation Of Information Security Awareness Programs By Financial Institutions In Kenya . [Internet] [Thesis]. University of Nairobi; 2009. [cited 2019 Apr 21]. Available from: http://hdl.handle.net/11295/96497.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Abass JS. A Survey Of Implementation Of Information Security Awareness Programs By Financial Institutions In Kenya . [Thesis]. University of Nairobi; 2009. Available from: http://hdl.handle.net/11295/96497

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Hawaii – Manoa

10. Aurigemma, Salvatore. From the weakest link to the best defense : exploring the factors that affect employee intention to comply with information security policies.

Degree: 2016, University of Hawaii – Manoa

Ph.D. University of Hawaii at Manoa 2013.

Information and information systems have become embedded in the fabric of contemporary organizations throughout the world. As the… (more)

Subjects/Keywords: information security policies

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Aurigemma, S. (2016). From the weakest link to the best defense : exploring the factors that affect employee intention to comply with information security policies. (Thesis). University of Hawaii – Manoa. Retrieved from http://hdl.handle.net/10125/101889

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Aurigemma, Salvatore. “From the weakest link to the best defense : exploring the factors that affect employee intention to comply with information security policies.” 2016. Thesis, University of Hawaii – Manoa. Accessed April 21, 2019. http://hdl.handle.net/10125/101889.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Aurigemma, Salvatore. “From the weakest link to the best defense : exploring the factors that affect employee intention to comply with information security policies.” 2016. Web. 21 Apr 2019.

Vancouver:

Aurigemma S. From the weakest link to the best defense : exploring the factors that affect employee intention to comply with information security policies. [Internet] [Thesis]. University of Hawaii – Manoa; 2016. [cited 2019 Apr 21]. Available from: http://hdl.handle.net/10125/101889.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Aurigemma S. From the weakest link to the best defense : exploring the factors that affect employee intention to comply with information security policies. [Thesis]. University of Hawaii – Manoa; 2016. Available from: http://hdl.handle.net/10125/101889

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


McMaster University

11. Tu, Zhiling. Information Security Management: A Critical Success Factors Analysis.

Degree: PhD, 2015, McMaster University

Information security has been a crucial strategic issue in organizational management. Information security management (ISM) is a systematic process of effectively coping with information security(more)

Subjects/Keywords: Information Security Management

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tu, Z. (2015). Information Security Management: A Critical Success Factors Analysis. (Doctoral Dissertation). McMaster University. Retrieved from http://hdl.handle.net/11375/18168

Chicago Manual of Style (16th Edition):

Tu, Zhiling. “Information Security Management: A Critical Success Factors Analysis.” 2015. Doctoral Dissertation, McMaster University. Accessed April 21, 2019. http://hdl.handle.net/11375/18168.

MLA Handbook (7th Edition):

Tu, Zhiling. “Information Security Management: A Critical Success Factors Analysis.” 2015. Web. 21 Apr 2019.

Vancouver:

Tu Z. Information Security Management: A Critical Success Factors Analysis. [Internet] [Doctoral dissertation]. McMaster University; 2015. [cited 2019 Apr 21]. Available from: http://hdl.handle.net/11375/18168.

Council of Science Editors:

Tu Z. Information Security Management: A Critical Success Factors Analysis. [Doctoral Dissertation]. McMaster University; 2015. Available from: http://hdl.handle.net/11375/18168


University of Melbourne

12. Onibere, Mazino. Information security manager as a strategist.

Degree: 2015, University of Melbourne

 The modern organisation operates within a highly complex and sophisticated security threat landscape that exposes its information infrastructure to a range of security risks. This… (more)

Subjects/Keywords: information security strategy; information security management; information security strategic challenges; information security strategist

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Onibere, M. (2015). Information security manager as a strategist. (Masters Thesis). University of Melbourne. Retrieved from http://hdl.handle.net/11343/56595

Chicago Manual of Style (16th Edition):

Onibere, Mazino. “Information security manager as a strategist.” 2015. Masters Thesis, University of Melbourne. Accessed April 21, 2019. http://hdl.handle.net/11343/56595.

MLA Handbook (7th Edition):

Onibere, Mazino. “Information security manager as a strategist.” 2015. Web. 21 Apr 2019.

Vancouver:

Onibere M. Information security manager as a strategist. [Internet] [Masters thesis]. University of Melbourne; 2015. [cited 2019 Apr 21]. Available from: http://hdl.handle.net/11343/56595.

Council of Science Editors:

Onibere M. Information security manager as a strategist. [Masters Thesis]. University of Melbourne; 2015. Available from: http://hdl.handle.net/11343/56595


University of Texas – Austin

13. Rueda, Daniel F. Healthcare is the most breached industry : how do we change that?.

Degree: Information, 2017, University of Texas – Austin

 Healthcare is the most breached industry in the United States. Health records are now fetching more money on the black market than credit card numbers.… (more)

Subjects/Keywords: Healthcare; Information security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rueda, D. F. (2017). Healthcare is the most breached industry : how do we change that?. (Thesis). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/63766

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Rueda, Daniel F. “Healthcare is the most breached industry : how do we change that?.” 2017. Thesis, University of Texas – Austin. Accessed April 21, 2019. http://hdl.handle.net/2152/63766.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Rueda, Daniel F. “Healthcare is the most breached industry : how do we change that?.” 2017. Web. 21 Apr 2019.

Vancouver:

Rueda DF. Healthcare is the most breached industry : how do we change that?. [Internet] [Thesis]. University of Texas – Austin; 2017. [cited 2019 Apr 21]. Available from: http://hdl.handle.net/2152/63766.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Rueda DF. Healthcare is the most breached industry : how do we change that?. [Thesis]. University of Texas – Austin; 2017. Available from: http://hdl.handle.net/2152/63766

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Loughborough University

14. Al-Hamar, Aisha. Enhancing information security in organisations in Qatar.

Degree: PhD, 2018, Loughborough University

 Due to the universal use of technology and its pervasive connection to the world, organisations have become more exposed to frequent and various threats. Therefore,… (more)

Subjects/Keywords: Information security; Information security policy; Information security awareness; Information security management system; Information security culture; Qatar National Information Assurance policy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Al-Hamar, A. (2018). Enhancing information security in organisations in Qatar. (Doctoral Dissertation). Loughborough University. Retrieved from https://dspace.lboro.ac.uk/2134/33541 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.747959

Chicago Manual of Style (16th Edition):

Al-Hamar, Aisha. “Enhancing information security in organisations in Qatar.” 2018. Doctoral Dissertation, Loughborough University. Accessed April 21, 2019. https://dspace.lboro.ac.uk/2134/33541 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.747959.

MLA Handbook (7th Edition):

Al-Hamar, Aisha. “Enhancing information security in organisations in Qatar.” 2018. Web. 21 Apr 2019.

Vancouver:

Al-Hamar A. Enhancing information security in organisations in Qatar. [Internet] [Doctoral dissertation]. Loughborough University; 2018. [cited 2019 Apr 21]. Available from: https://dspace.lboro.ac.uk/2134/33541 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.747959.

Council of Science Editors:

Al-Hamar A. Enhancing information security in organisations in Qatar. [Doctoral Dissertation]. Loughborough University; 2018. Available from: https://dspace.lboro.ac.uk/2134/33541 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.747959


University of Melbourne

15. MAYNARD, SEAN. Strategic information security policy quality assessment: a multiple constituency perspective.

Degree: 2010, University of Melbourne

 An integral part of any information security management program is the information security policy. The purpose of an information security policy is to define the… (more)

Subjects/Keywords: information security management; information security policy; information security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

MAYNARD, S. (2010). Strategic information security policy quality assessment: a multiple constituency perspective. (Doctoral Dissertation). University of Melbourne. Retrieved from http://hdl.handle.net/11343/42194

Chicago Manual of Style (16th Edition):

MAYNARD, SEAN. “Strategic information security policy quality assessment: a multiple constituency perspective.” 2010. Doctoral Dissertation, University of Melbourne. Accessed April 21, 2019. http://hdl.handle.net/11343/42194.

MLA Handbook (7th Edition):

MAYNARD, SEAN. “Strategic information security policy quality assessment: a multiple constituency perspective.” 2010. Web. 21 Apr 2019.

Vancouver:

MAYNARD S. Strategic information security policy quality assessment: a multiple constituency perspective. [Internet] [Doctoral dissertation]. University of Melbourne; 2010. [cited 2019 Apr 21]. Available from: http://hdl.handle.net/11343/42194.

Council of Science Editors:

MAYNARD S. Strategic information security policy quality assessment: a multiple constituency perspective. [Doctoral Dissertation]. University of Melbourne; 2010. Available from: http://hdl.handle.net/11343/42194

16. Korovessis, Peter. Establishing an information security awareness and culture.

Degree: PhD, 2015, University of Plymouth

 In today’s business environment all business operations are enabled by technology. Its always on and connected nature has brought new business possibilities but at the… (more)

Subjects/Keywords: 005.8; information security awareness; information security culture; information security surveys; information security practices; information security toolkit

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Korovessis, P. (2015). Establishing an information security awareness and culture. (Doctoral Dissertation). University of Plymouth. Retrieved from http://hdl.handle.net/10026.1/3836

Chicago Manual of Style (16th Edition):

Korovessis, Peter. “Establishing an information security awareness and culture.” 2015. Doctoral Dissertation, University of Plymouth. Accessed April 21, 2019. http://hdl.handle.net/10026.1/3836.

MLA Handbook (7th Edition):

Korovessis, Peter. “Establishing an information security awareness and culture.” 2015. Web. 21 Apr 2019.

Vancouver:

Korovessis P. Establishing an information security awareness and culture. [Internet] [Doctoral dissertation]. University of Plymouth; 2015. [cited 2019 Apr 21]. Available from: http://hdl.handle.net/10026.1/3836.

Council of Science Editors:

Korovessis P. Establishing an information security awareness and culture. [Doctoral Dissertation]. University of Plymouth; 2015. Available from: http://hdl.handle.net/10026.1/3836


Loughborough University

17. Alkahtani, Hend K. Raising the information security awareness level in Saudi Arabian organizations through an effective, culturally aware information security framework.

Degree: PhD, 2018, Loughborough University

 The focus of the research is to improve the security of information systems in Saudi Arabian knowledge-intensive organisations by raising the awareness level among all… (more)

Subjects/Keywords: Information systems; Information security; Security awareness; Saudi Arabian culture; Security policy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alkahtani, H. K. (2018). Raising the information security awareness level in Saudi Arabian organizations through an effective, culturally aware information security framework. (Doctoral Dissertation). Loughborough University. Retrieved from https://dspace.lboro.ac.uk/2134/28120 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.740230

Chicago Manual of Style (16th Edition):

Alkahtani, Hend K. “Raising the information security awareness level in Saudi Arabian organizations through an effective, culturally aware information security framework.” 2018. Doctoral Dissertation, Loughborough University. Accessed April 21, 2019. https://dspace.lboro.ac.uk/2134/28120 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.740230.

MLA Handbook (7th Edition):

Alkahtani, Hend K. “Raising the information security awareness level in Saudi Arabian organizations through an effective, culturally aware information security framework.” 2018. Web. 21 Apr 2019.

Vancouver:

Alkahtani HK. Raising the information security awareness level in Saudi Arabian organizations through an effective, culturally aware information security framework. [Internet] [Doctoral dissertation]. Loughborough University; 2018. [cited 2019 Apr 21]. Available from: https://dspace.lboro.ac.uk/2134/28120 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.740230.

Council of Science Editors:

Alkahtani HK. Raising the information security awareness level in Saudi Arabian organizations through an effective, culturally aware information security framework. [Doctoral Dissertation]. Loughborough University; 2018. Available from: https://dspace.lboro.ac.uk/2134/28120 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.740230


University of Arkansas

18. Yaseen, Qussai. Mitigating Insider Threat in Relational Database Systems.

Degree: PhD, 2012, University of Arkansas

  The dissertation concentrates on addressing the factors and capabilities that enable insiders to violate systems security. It focuses on modeling the accumulative knowledge that… (more)

Subjects/Keywords: Applied sciences; Information security; Insider threat; Relational database; Security; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yaseen, Q. (2012). Mitigating Insider Threat in Relational Database Systems. (Doctoral Dissertation). University of Arkansas. Retrieved from https://scholarworks.uark.edu/etd/370

Chicago Manual of Style (16th Edition):

Yaseen, Qussai. “Mitigating Insider Threat in Relational Database Systems.” 2012. Doctoral Dissertation, University of Arkansas. Accessed April 21, 2019. https://scholarworks.uark.edu/etd/370.

MLA Handbook (7th Edition):

Yaseen, Qussai. “Mitigating Insider Threat in Relational Database Systems.” 2012. Web. 21 Apr 2019.

Vancouver:

Yaseen Q. Mitigating Insider Threat in Relational Database Systems. [Internet] [Doctoral dissertation]. University of Arkansas; 2012. [cited 2019 Apr 21]. Available from: https://scholarworks.uark.edu/etd/370.

Council of Science Editors:

Yaseen Q. Mitigating Insider Threat in Relational Database Systems. [Doctoral Dissertation]. University of Arkansas; 2012. Available from: https://scholarworks.uark.edu/etd/370


University of Sydney

19. Soyref, Maxim. The holistic management of information security processes .

Degree: 2014, University of Sydney

 Title: The holistic management of information security processes Keywords: cybersecurity, information security, strategy, security process, security governance, security management This research examines information security management… (more)

Subjects/Keywords: Cybersecurity; Information security; Strategy; Security process; Security governance; Security management

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Soyref, M. (2014). The holistic management of information security processes . (Thesis). University of Sydney. Retrieved from http://hdl.handle.net/2123/13373

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Soyref, Maxim. “The holistic management of information security processes .” 2014. Thesis, University of Sydney. Accessed April 21, 2019. http://hdl.handle.net/2123/13373.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Soyref, Maxim. “The holistic management of information security processes .” 2014. Web. 21 Apr 2019.

Vancouver:

Soyref M. The holistic management of information security processes . [Internet] [Thesis]. University of Sydney; 2014. [cited 2019 Apr 21]. Available from: http://hdl.handle.net/2123/13373.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Soyref M. The holistic management of information security processes . [Thesis]. University of Sydney; 2014. Available from: http://hdl.handle.net/2123/13373

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Southern Cross University

20. Ong, Lean-Ping. Awareness of information security risks : an investigation of people aspects (a study in Malaysia).

Degree: 2015, Southern Cross University

 The rapid advances in technology in this millennium pose growing information security risks. Information security breaches can result in data or information loss, damaged reputations,… (more)

Subjects/Keywords: information security; information security awareness; information security risk; people aspects; Business; Information Security; Management Information Systems; Social Psychology

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ong, L. (2015). Awareness of information security risks : an investigation of people aspects (a study in Malaysia). (Thesis). Southern Cross University. Retrieved from http://epubs.scu.edu.au/theses/449

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ong, Lean-Ping. “Awareness of information security risks : an investigation of people aspects (a study in Malaysia).” 2015. Thesis, Southern Cross University. Accessed April 21, 2019. http://epubs.scu.edu.au/theses/449.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ong, Lean-Ping. “Awareness of information security risks : an investigation of people aspects (a study in Malaysia).” 2015. Web. 21 Apr 2019.

Vancouver:

Ong L. Awareness of information security risks : an investigation of people aspects (a study in Malaysia). [Internet] [Thesis]. Southern Cross University; 2015. [cited 2019 Apr 21]. Available from: http://epubs.scu.edu.au/theses/449.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ong L. Awareness of information security risks : an investigation of people aspects (a study in Malaysia). [Thesis]. Southern Cross University; 2015. Available from: http://epubs.scu.edu.au/theses/449

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Wollongong

21. Elashry, Ibrahim. Pairing-free identity-based cryptography.

Degree: PhD, 2015, University of Wollongong

  Identity-based cryptography (IBC) is considered nowadays as the evolution of public key cryptography because it completely eliminates the use of digital certificates by representing… (more)

Subjects/Keywords: Information security-cryptography; key exchange; network security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Elashry, I. (2015). Pairing-free identity-based cryptography. (Doctoral Dissertation). University of Wollongong. Retrieved from ; http://ro.uow.edu.au/theses/4409

Chicago Manual of Style (16th Edition):

Elashry, Ibrahim. “Pairing-free identity-based cryptography.” 2015. Doctoral Dissertation, University of Wollongong. Accessed April 21, 2019. ; http://ro.uow.edu.au/theses/4409.

MLA Handbook (7th Edition):

Elashry, Ibrahim. “Pairing-free identity-based cryptography.” 2015. Web. 21 Apr 2019.

Vancouver:

Elashry I. Pairing-free identity-based cryptography. [Internet] [Doctoral dissertation]. University of Wollongong; 2015. [cited 2019 Apr 21]. Available from: ; http://ro.uow.edu.au/theses/4409.

Council of Science Editors:

Elashry I. Pairing-free identity-based cryptography. [Doctoral Dissertation]. University of Wollongong; 2015. Available from: ; http://ro.uow.edu.au/theses/4409


California State University – Sacramento

22. Song, Chunhui. SQL injection attacks and countermeasures.

Degree: MS, Computer Science, 2010, California State University – Sacramento

 SQL injection has become a predominant type of attacks that target web applications. It allows attackers to obtain unauthorized access to the back-end database by… (more)

Subjects/Keywords: Web database security; Database vulnerability; Information security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Song, C. (2010). SQL injection attacks and countermeasures. (Masters Thesis). California State University – Sacramento. Retrieved from http://hdl.handle.net/10211.9/560

Chicago Manual of Style (16th Edition):

Song, Chunhui. “SQL injection attacks and countermeasures.” 2010. Masters Thesis, California State University – Sacramento. Accessed April 21, 2019. http://hdl.handle.net/10211.9/560.

MLA Handbook (7th Edition):

Song, Chunhui. “SQL injection attacks and countermeasures.” 2010. Web. 21 Apr 2019.

Vancouver:

Song C. SQL injection attacks and countermeasures. [Internet] [Masters thesis]. California State University – Sacramento; 2010. [cited 2019 Apr 21]. Available from: http://hdl.handle.net/10211.9/560.

Council of Science Editors:

Song C. SQL injection attacks and countermeasures. [Masters Thesis]. California State University – Sacramento; 2010. Available from: http://hdl.handle.net/10211.9/560


Universiteit Utrecht

23. Roeling, M.H.F. Towards an aligned organization on information security.

Degree: 2012, Universiteit Utrecht

Information Security is mainly a topic that is considered to be Information Technology related. However, for successfully implementing information security, an organization’s information security program… (more)

Subjects/Keywords: Information Security; Security; Maturity Model; Maturity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Roeling, M. H. F. (2012). Towards an aligned organization on information security. (Masters Thesis). Universiteit Utrecht. Retrieved from http://dspace.library.uu.nl:8080/handle/1874/255403

Chicago Manual of Style (16th Edition):

Roeling, M H F. “Towards an aligned organization on information security.” 2012. Masters Thesis, Universiteit Utrecht. Accessed April 21, 2019. http://dspace.library.uu.nl:8080/handle/1874/255403.

MLA Handbook (7th Edition):

Roeling, M H F. “Towards an aligned organization on information security.” 2012. Web. 21 Apr 2019.

Vancouver:

Roeling MHF. Towards an aligned organization on information security. [Internet] [Masters thesis]. Universiteit Utrecht; 2012. [cited 2019 Apr 21]. Available from: http://dspace.library.uu.nl:8080/handle/1874/255403.

Council of Science Editors:

Roeling MHF. Towards an aligned organization on information security. [Masters Thesis]. Universiteit Utrecht; 2012. Available from: http://dspace.library.uu.nl:8080/handle/1874/255403


Edith Cowan University

24. Coole, Michael P. Theory of entropic security decay: The gradual degradation in effectiveness of commissioned security systems.

Degree: 2010, Edith Cowan University

 As a quantitative auditing tool for Physical Protection Systems (PPS) the Estimated Adversary Sequence Interruption (EASI) model has been available for many years. Nevertheless, once… (more)

Subjects/Keywords: Computer security; computer networks; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Coole, M. P. (2010). Theory of entropic security decay: The gradual degradation in effectiveness of commissioned security systems. (Thesis). Edith Cowan University. Retrieved from http://ro.ecu.edu.au/theses/372

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Coole, Michael P. “Theory of entropic security decay: The gradual degradation in effectiveness of commissioned security systems.” 2010. Thesis, Edith Cowan University. Accessed April 21, 2019. http://ro.ecu.edu.au/theses/372.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Coole, Michael P. “Theory of entropic security decay: The gradual degradation in effectiveness of commissioned security systems.” 2010. Web. 21 Apr 2019.

Vancouver:

Coole MP. Theory of entropic security decay: The gradual degradation in effectiveness of commissioned security systems. [Internet] [Thesis]. Edith Cowan University; 2010. [cited 2019 Apr 21]. Available from: http://ro.ecu.edu.au/theses/372.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Coole MP. Theory of entropic security decay: The gradual degradation in effectiveness of commissioned security systems. [Thesis]. Edith Cowan University; 2010. Available from: http://ro.ecu.edu.au/theses/372

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of South Africa

25. Nkwana, Mokata Johannes. Protection of security information within government departments in South Africa.

Degree: 2015, University of South Africa

 The protection of security information in government departments requires the active engagement of executive management to assess emerging threats and provide strong security risk control… (more)

Subjects/Keywords: Government departments; Information security; Protective security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nkwana, M. J. (2015). Protection of security information within government departments in South Africa. (Masters Thesis). University of South Africa. Retrieved from http://hdl.handle.net/10500/19897

Chicago Manual of Style (16th Edition):

Nkwana, Mokata Johannes. “Protection of security information within government departments in South Africa.” 2015. Masters Thesis, University of South Africa. Accessed April 21, 2019. http://hdl.handle.net/10500/19897.

MLA Handbook (7th Edition):

Nkwana, Mokata Johannes. “Protection of security information within government departments in South Africa.” 2015. Web. 21 Apr 2019.

Vancouver:

Nkwana MJ. Protection of security information within government departments in South Africa. [Internet] [Masters thesis]. University of South Africa; 2015. [cited 2019 Apr 21]. Available from: http://hdl.handle.net/10500/19897.

Council of Science Editors:

Nkwana MJ. Protection of security information within government departments in South Africa. [Masters Thesis]. University of South Africa; 2015. Available from: http://hdl.handle.net/10500/19897


University of Central Florida

26. Glaspie, Henry. Assessment of Information Security Culture in Higher Education.

Degree: 2018, University of Central Florida

Information security programs are instituted by organizations to provide guidance to their users who handle their data and systems. The main goal of these programs… (more)

Subjects/Keywords: Defense and Security Studies; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Glaspie, H. (2018). Assessment of Information Security Culture in Higher Education. (Doctoral Dissertation). University of Central Florida. Retrieved from http://stars.library.ucf.edu/etd/6009

Chicago Manual of Style (16th Edition):

Glaspie, Henry. “Assessment of Information Security Culture in Higher Education.” 2018. Doctoral Dissertation, University of Central Florida. Accessed April 21, 2019. http://stars.library.ucf.edu/etd/6009.

MLA Handbook (7th Edition):

Glaspie, Henry. “Assessment of Information Security Culture in Higher Education.” 2018. Web. 21 Apr 2019.

Vancouver:

Glaspie H. Assessment of Information Security Culture in Higher Education. [Internet] [Doctoral dissertation]. University of Central Florida; 2018. [cited 2019 Apr 21]. Available from: http://stars.library.ucf.edu/etd/6009.

Council of Science Editors:

Glaspie H. Assessment of Information Security Culture in Higher Education. [Doctoral Dissertation]. University of Central Florida; 2018. Available from: http://stars.library.ucf.edu/etd/6009


University of Johannesburg

27. Muchenje, Tonderai. An analysis of the impact of emerging technology on organisations’ internal controls.

Degree: 2013, University of Johannesburg

M.Comm. (Computer Auditing)

This study presents an evaluation of emerging information communication technology (ICT) solutions to the security internal control systems in South African organisations.… (more)

Subjects/Keywords: Computer auditing; Information security; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Muchenje, T. (2013). An analysis of the impact of emerging technology on organisations’ internal controls. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/8597

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Muchenje, Tonderai. “An analysis of the impact of emerging technology on organisations’ internal controls.” 2013. Thesis, University of Johannesburg. Accessed April 21, 2019. http://hdl.handle.net/10210/8597.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Muchenje, Tonderai. “An analysis of the impact of emerging technology on organisations’ internal controls.” 2013. Web. 21 Apr 2019.

Vancouver:

Muchenje T. An analysis of the impact of emerging technology on organisations’ internal controls. [Internet] [Thesis]. University of Johannesburg; 2013. [cited 2019 Apr 21]. Available from: http://hdl.handle.net/10210/8597.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Muchenje T. An analysis of the impact of emerging technology on organisations’ internal controls. [Thesis]. University of Johannesburg; 2013. Available from: http://hdl.handle.net/10210/8597

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Arkansas

28. Moccaro, Matthew Francis. Mobile Banking Security Using GPS and LDPC Codes.

Degree: MSCmpE, 2014, University of Arkansas

  Mobile Banking is becoming a major part of our world's financial system. Being able to manage one's finances on a mobile device can provide… (more)

Subjects/Keywords: Banking; Location; Mobile; Privacy; Security; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Moccaro, M. F. (2014). Mobile Banking Security Using GPS and LDPC Codes. (Masters Thesis). University of Arkansas. Retrieved from https://scholarworks.uark.edu/etd/2314

Chicago Manual of Style (16th Edition):

Moccaro, Matthew Francis. “Mobile Banking Security Using GPS and LDPC Codes.” 2014. Masters Thesis, University of Arkansas. Accessed April 21, 2019. https://scholarworks.uark.edu/etd/2314.

MLA Handbook (7th Edition):

Moccaro, Matthew Francis. “Mobile Banking Security Using GPS and LDPC Codes.” 2014. Web. 21 Apr 2019.

Vancouver:

Moccaro MF. Mobile Banking Security Using GPS and LDPC Codes. [Internet] [Masters thesis]. University of Arkansas; 2014. [cited 2019 Apr 21]. Available from: https://scholarworks.uark.edu/etd/2314.

Council of Science Editors:

Moccaro MF. Mobile Banking Security Using GPS and LDPC Codes. [Masters Thesis]. University of Arkansas; 2014. Available from: https://scholarworks.uark.edu/etd/2314


University of Arkansas

29. Fuentes Tello, Victor. Enforcing database security on cloud using a trusted third party based model.

Degree: MS, 2017, University of Arkansas

  Cloud computing offers a considerable number of advantages to clients and organizations that use several capabilities to store sensitive data, interact with applications, or… (more)

Subjects/Keywords: Cloud computing; Database; Security; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Fuentes Tello, V. (2017). Enforcing database security on cloud using a trusted third party based model. (Masters Thesis). University of Arkansas. Retrieved from https://scholarworks.uark.edu/etd/2438

Chicago Manual of Style (16th Edition):

Fuentes Tello, Victor. “Enforcing database security on cloud using a trusted third party based model.” 2017. Masters Thesis, University of Arkansas. Accessed April 21, 2019. https://scholarworks.uark.edu/etd/2438.

MLA Handbook (7th Edition):

Fuentes Tello, Victor. “Enforcing database security on cloud using a trusted third party based model.” 2017. Web. 21 Apr 2019.

Vancouver:

Fuentes Tello V. Enforcing database security on cloud using a trusted third party based model. [Internet] [Masters thesis]. University of Arkansas; 2017. [cited 2019 Apr 21]. Available from: https://scholarworks.uark.edu/etd/2438.

Council of Science Editors:

Fuentes Tello V. Enforcing database security on cloud using a trusted third party based model. [Masters Thesis]. University of Arkansas; 2017. Available from: https://scholarworks.uark.edu/etd/2438


RMIT University

30. Al-Kalbani, A. A compliance based framework for information security in e-government in Oman.

Degree: 2017, RMIT University

 The development of electronic government (e-government) in Oman has created new means for public organizations to deliver services, engage citizens, and improve workflows between public… (more)

Subjects/Keywords: Fields of Research; Information Security; E-Government; Information Security Compliance; Organizational Security Culture; Information Security Processes; Security Technologies; Environment Pressures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Al-Kalbani, A. (2017). A compliance based framework for information security in e-government in Oman. (Thesis). RMIT University. Retrieved from http://researchbank.rmit.edu.au/view/rmit:162062

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Al-Kalbani, A. “A compliance based framework for information security in e-government in Oman.” 2017. Thesis, RMIT University. Accessed April 21, 2019. http://researchbank.rmit.edu.au/view/rmit:162062.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Al-Kalbani, A. “A compliance based framework for information security in e-government in Oman.” 2017. Web. 21 Apr 2019.

Vancouver:

Al-Kalbani A. A compliance based framework for information security in e-government in Oman. [Internet] [Thesis]. RMIT University; 2017. [cited 2019 Apr 21]. Available from: http://researchbank.rmit.edu.au/view/rmit:162062.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Al-Kalbani A. A compliance based framework for information security in e-government in Oman. [Thesis]. RMIT University; 2017. Available from: http://researchbank.rmit.edu.au/view/rmit:162062

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2] [3] [4] [5] … [54]

.