Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Security policies). Showing records 1 – 30 of 139 total matches.

[1] [2] [3] [4] [5]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Languages

Country

▼ Search Limiters


University of Hawaii – Manoa

1. Aurigemma, Salvatore. From the weakest link to the best defense : exploring the factors that affect employee intention to comply with information security policies.

Degree: 2016, University of Hawaii – Manoa

Ph.D. University of Hawaii at Manoa 2013.

Information and information systems have become embedded in the fabric of contemporary organizations throughout the world. As the… (more)

Subjects/Keywords: information security policies

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Aurigemma, S. (2016). From the weakest link to the best defense : exploring the factors that affect employee intention to comply with information security policies. (Thesis). University of Hawaii – Manoa. Retrieved from http://hdl.handle.net/10125/101889

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Aurigemma, Salvatore. “From the weakest link to the best defense : exploring the factors that affect employee intention to comply with information security policies.” 2016. Thesis, University of Hawaii – Manoa. Accessed January 22, 2020. http://hdl.handle.net/10125/101889.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Aurigemma, Salvatore. “From the weakest link to the best defense : exploring the factors that affect employee intention to comply with information security policies.” 2016. Web. 22 Jan 2020.

Vancouver:

Aurigemma S. From the weakest link to the best defense : exploring the factors that affect employee intention to comply with information security policies. [Internet] [Thesis]. University of Hawaii – Manoa; 2016. [cited 2020 Jan 22]. Available from: http://hdl.handle.net/10125/101889.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Aurigemma S. From the weakest link to the best defense : exploring the factors that affect employee intention to comply with information security policies. [Thesis]. University of Hawaii – Manoa; 2016. Available from: http://hdl.handle.net/10125/101889

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


California State University – Sacramento

2. Shenoy, Shweta. Empirical analysis on the usability and security of passwords.

Degree: MS, Computer Science, 2019, California State University – Sacramento

Security and usability have been on the opposite ends of the spectrum; sometimes, to achieve one, the other must be compromised to some extent. Passwords… (more)

Subjects/Keywords: Passwords; Security; Usability; Usable security; Password policies

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shenoy, S. (2019). Empirical analysis on the usability and security of passwords. (Masters Thesis). California State University – Sacramento. Retrieved from http://hdl.handle.net/10211.3/210200

Chicago Manual of Style (16th Edition):

Shenoy, Shweta. “Empirical analysis on the usability and security of passwords.” 2019. Masters Thesis, California State University – Sacramento. Accessed January 22, 2020. http://hdl.handle.net/10211.3/210200.

MLA Handbook (7th Edition):

Shenoy, Shweta. “Empirical analysis on the usability and security of passwords.” 2019. Web. 22 Jan 2020.

Vancouver:

Shenoy S. Empirical analysis on the usability and security of passwords. [Internet] [Masters thesis]. California State University – Sacramento; 2019. [cited 2020 Jan 22]. Available from: http://hdl.handle.net/10211.3/210200.

Council of Science Editors:

Shenoy S. Empirical analysis on the usability and security of passwords. [Masters Thesis]. California State University – Sacramento; 2019. Available from: http://hdl.handle.net/10211.3/210200


University of Nairobi

3. Makumbi, Leonard Kaveke. An analysis of Information Technology (IT) security and the adoption of security policies: a case study of Kenyan small and medium enterprises (SMSES).

Degree: 2012, University of Nairobi

 Organizations of all sizes are now significantly reliant upon information technology and networks for the operation of their business activities. All therefore have a consequent… (more)

Subjects/Keywords: Small and Medium Enterprises; Security Policies

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Makumbi, L. K. (2012). An analysis of Information Technology (IT) security and the adoption of security policies: a case study of Kenyan small and medium enterprises (SMSES). (Thesis). University of Nairobi. Retrieved from http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/21465

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Makumbi, Leonard Kaveke. “An analysis of Information Technology (IT) security and the adoption of security policies: a case study of Kenyan small and medium enterprises (SMSES). ” 2012. Thesis, University of Nairobi. Accessed January 22, 2020. http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/21465.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Makumbi, Leonard Kaveke. “An analysis of Information Technology (IT) security and the adoption of security policies: a case study of Kenyan small and medium enterprises (SMSES). ” 2012. Web. 22 Jan 2020.

Vancouver:

Makumbi LK. An analysis of Information Technology (IT) security and the adoption of security policies: a case study of Kenyan small and medium enterprises (SMSES). [Internet] [Thesis]. University of Nairobi; 2012. [cited 2020 Jan 22]. Available from: http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/21465.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Makumbi LK. An analysis of Information Technology (IT) security and the adoption of security policies: a case study of Kenyan small and medium enterprises (SMSES). [Thesis]. University of Nairobi; 2012. Available from: http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/21465

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

4. Alzahrani, Ali Mousa G. Efficient enforcement of security policies in distributed systems.

Degree: PhD, 2013, De Montfort University

 Policy-based management (PBM) is an adaptable security policy mechanism in information systems (IS) that confirm only authorised users can access resources. A few decades ago,… (more)

Subjects/Keywords: 005.1; Security Policies; Policy-based Management

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alzahrani, A. M. G. (2013). Efficient enforcement of security policies in distributed systems. (Doctoral Dissertation). De Montfort University. Retrieved from http://hdl.handle.net/2086/9029

Chicago Manual of Style (16th Edition):

Alzahrani, Ali Mousa G. “Efficient enforcement of security policies in distributed systems.” 2013. Doctoral Dissertation, De Montfort University. Accessed January 22, 2020. http://hdl.handle.net/2086/9029.

MLA Handbook (7th Edition):

Alzahrani, Ali Mousa G. “Efficient enforcement of security policies in distributed systems.” 2013. Web. 22 Jan 2020.

Vancouver:

Alzahrani AMG. Efficient enforcement of security policies in distributed systems. [Internet] [Doctoral dissertation]. De Montfort University; 2013. [cited 2020 Jan 22]. Available from: http://hdl.handle.net/2086/9029.

Council of Science Editors:

Alzahrani AMG. Efficient enforcement of security policies in distributed systems. [Doctoral Dissertation]. De Montfort University; 2013. Available from: http://hdl.handle.net/2086/9029


KTH

5. Qureshi, Muhammad Sohail. Measuring Efficacy of Information Security Policies : A Case Study of UAE based company.

Degree: DSV, 2012, KTH

  Nowadays information security policies are operative in many organizations. Currently few organizations take the pain of verifying the efficacy of these policies. Different standards… (more)

Subjects/Keywords: Information security policies; ISO27004; KPIs; KRIs

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Qureshi, M. S. (2012). Measuring Efficacy of Information Security Policies : A Case Study of UAE based company. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-103475

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Qureshi, Muhammad Sohail. “Measuring Efficacy of Information Security Policies : A Case Study of UAE based company.” 2012. Thesis, KTH. Accessed January 22, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-103475.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Qureshi, Muhammad Sohail. “Measuring Efficacy of Information Security Policies : A Case Study of UAE based company.” 2012. Web. 22 Jan 2020.

Vancouver:

Qureshi MS. Measuring Efficacy of Information Security Policies : A Case Study of UAE based company. [Internet] [Thesis]. KTH; 2012. [cited 2020 Jan 22]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-103475.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Qureshi MS. Measuring Efficacy of Information Security Policies : A Case Study of UAE based company. [Thesis]. KTH; 2012. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-103475

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Newcastle

6. Chai, Xiao Hong Joanne. Encouraging employee compliance with information security policies in cloud computing in Hong Kong.

Degree: 2017, University of Newcastle

Professional Doctorate - Doctor of Business Administration (DBA)

Cloud computing with its ubiquitous, flexible and on-demand consumption model has been growing at an exponential rate… (more)

Subjects/Keywords: cloud security policies compliance; information security policies compliance; employee compliance; insider threats

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chai, X. H. J. (2017). Encouraging employee compliance with information security policies in cloud computing in Hong Kong. (Thesis). University of Newcastle. Retrieved from http://hdl.handle.net/1959.13/1337592

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chai, Xiao Hong Joanne. “Encouraging employee compliance with information security policies in cloud computing in Hong Kong.” 2017. Thesis, University of Newcastle. Accessed January 22, 2020. http://hdl.handle.net/1959.13/1337592.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chai, Xiao Hong Joanne. “Encouraging employee compliance with information security policies in cloud computing in Hong Kong.” 2017. Web. 22 Jan 2020.

Vancouver:

Chai XHJ. Encouraging employee compliance with information security policies in cloud computing in Hong Kong. [Internet] [Thesis]. University of Newcastle; 2017. [cited 2020 Jan 22]. Available from: http://hdl.handle.net/1959.13/1337592.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chai XHJ. Encouraging employee compliance with information security policies in cloud computing in Hong Kong. [Thesis]. University of Newcastle; 2017. Available from: http://hdl.handle.net/1959.13/1337592

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Luleå University of Technology

7. Laaksonen, Elina. Information Security Policies : A Frames of Reference Perspective.

Degree: 2011, Luleå University of Technology

Researchers and information security professionals share an understanding of information securitypolicies as the foundation of organizational information security. A major concern for informationsecurity professionals… (more)

Subjects/Keywords: Technology; Teknik; IS security; information security policies; information security management; frames of reference; interpretive research

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Laaksonen, E. (2011). Information Security Policies : A Frames of Reference Perspective. (Thesis). Luleå University of Technology. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-54400

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Laaksonen, Elina. “Information Security Policies : A Frames of Reference Perspective.” 2011. Thesis, Luleå University of Technology. Accessed January 22, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-54400.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Laaksonen, Elina. “Information Security Policies : A Frames of Reference Perspective.” 2011. Web. 22 Jan 2020.

Vancouver:

Laaksonen E. Information Security Policies : A Frames of Reference Perspective. [Internet] [Thesis]. Luleå University of Technology; 2011. [cited 2020 Jan 22]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-54400.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Laaksonen E. Information Security Policies : A Frames of Reference Perspective. [Thesis]. Luleå University of Technology; 2011. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-54400

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Boise State University

8. Shrestha, Roshan. Strong Mutation-Based Test Generation of XACML Policies.

Degree: 2018, Boise State University

 There exist various testing methods for XACML policies which vary in their overall fault detection ability and none of them can detect all the (killable)… (more)

Subjects/Keywords: strong mutation based test generation of XACML policies; fault detection conditions of XACML policies; testing method of XACML policies; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shrestha, R. (2018). Strong Mutation-Based Test Generation of XACML Policies. (Thesis). Boise State University. Retrieved from https://scholarworks.boisestate.edu/td/1502

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Shrestha, Roshan. “Strong Mutation-Based Test Generation of XACML Policies.” 2018. Thesis, Boise State University. Accessed January 22, 2020. https://scholarworks.boisestate.edu/td/1502.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Shrestha, Roshan. “Strong Mutation-Based Test Generation of XACML Policies.” 2018. Web. 22 Jan 2020.

Vancouver:

Shrestha R. Strong Mutation-Based Test Generation of XACML Policies. [Internet] [Thesis]. Boise State University; 2018. [cited 2020 Jan 22]. Available from: https://scholarworks.boisestate.edu/td/1502.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Shrestha R. Strong Mutation-Based Test Generation of XACML Policies. [Thesis]. Boise State University; 2018. Available from: https://scholarworks.boisestate.edu/td/1502

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

9. Suzzoni, Benjamin. Sécurité et politique. Du clivage au consensus ? : Security and politic. From cleavage to consensus ?.

Degree: Docteur es, Science politique, 2012, Paris 2

Cette thèse, qui s’inscrit dans le vaste domaine des politiques publiques de sécurité, a pour objet de montrer la manière dont la sécurité s’est construite,… (more)

Subjects/Keywords: Sécurité; Politiques de sécurité; Idéologie; Realpolitik; Security; Public policies on security; Ideology; Realpolitik

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Suzzoni, B. (2012). Sécurité et politique. Du clivage au consensus ? : Security and politic. From cleavage to consensus ?. (Doctoral Dissertation). Paris 2. Retrieved from http://www.theses.fr/2012PA020030

Chicago Manual of Style (16th Edition):

Suzzoni, Benjamin. “Sécurité et politique. Du clivage au consensus ? : Security and politic. From cleavage to consensus ?.” 2012. Doctoral Dissertation, Paris 2. Accessed January 22, 2020. http://www.theses.fr/2012PA020030.

MLA Handbook (7th Edition):

Suzzoni, Benjamin. “Sécurité et politique. Du clivage au consensus ? : Security and politic. From cleavage to consensus ?.” 2012. Web. 22 Jan 2020.

Vancouver:

Suzzoni B. Sécurité et politique. Du clivage au consensus ? : Security and politic. From cleavage to consensus ?. [Internet] [Doctoral dissertation]. Paris 2; 2012. [cited 2020 Jan 22]. Available from: http://www.theses.fr/2012PA020030.

Council of Science Editors:

Suzzoni B. Sécurité et politique. Du clivage au consensus ? : Security and politic. From cleavage to consensus ?. [Doctoral Dissertation]. Paris 2; 2012. Available from: http://www.theses.fr/2012PA020030


University of Vermont

10. Amir-Mohammadian, Sepehr. A Formal Approach to Combining Prospective and Retrospective Security.

Degree: PhD, Computer Science, 2017, University of Vermont

  The major goal of this dissertation is to enhance software security by provably correct enforcement of in-depth policies. In-depth security policies allude to heterogeneous… (more)

Subjects/Keywords: Break the glass policies; Cybersecurity; Integrity; Prospective security; Retrospective security; Taint analysis; Computer Sciences

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Amir-Mohammadian, S. (2017). A Formal Approach to Combining Prospective and Retrospective Security. (Doctoral Dissertation). University of Vermont. Retrieved from https://scholarworks.uvm.edu/graddis/802

Chicago Manual of Style (16th Edition):

Amir-Mohammadian, Sepehr. “A Formal Approach to Combining Prospective and Retrospective Security.” 2017. Doctoral Dissertation, University of Vermont. Accessed January 22, 2020. https://scholarworks.uvm.edu/graddis/802.

MLA Handbook (7th Edition):

Amir-Mohammadian, Sepehr. “A Formal Approach to Combining Prospective and Retrospective Security.” 2017. Web. 22 Jan 2020.

Vancouver:

Amir-Mohammadian S. A Formal Approach to Combining Prospective and Retrospective Security. [Internet] [Doctoral dissertation]. University of Vermont; 2017. [cited 2020 Jan 22]. Available from: https://scholarworks.uvm.edu/graddis/802.

Council of Science Editors:

Amir-Mohammadian S. A Formal Approach to Combining Prospective and Retrospective Security. [Doctoral Dissertation]. University of Vermont; 2017. Available from: https://scholarworks.uvm.edu/graddis/802


Georgia Tech

11. Singh, Kapil. Designing security policies and frameworks for web applications.

Degree: PhD, Computing, 2011, Georgia Tech

 The new developments behind Web 2.0 have increased the complexity of web systems making the task of securing these systems a challenging problem. As a… (more)

Subjects/Keywords: Security policies; Web security; Web applications; Web 2.0; User-generated content; Social media

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Singh, K. (2011). Designing security policies and frameworks for web applications. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/41122

Chicago Manual of Style (16th Edition):

Singh, Kapil. “Designing security policies and frameworks for web applications.” 2011. Doctoral Dissertation, Georgia Tech. Accessed January 22, 2020. http://hdl.handle.net/1853/41122.

MLA Handbook (7th Edition):

Singh, Kapil. “Designing security policies and frameworks for web applications.” 2011. Web. 22 Jan 2020.

Vancouver:

Singh K. Designing security policies and frameworks for web applications. [Internet] [Doctoral dissertation]. Georgia Tech; 2011. [cited 2020 Jan 22]. Available from: http://hdl.handle.net/1853/41122.

Council of Science Editors:

Singh K. Designing security policies and frameworks for web applications. [Doctoral Dissertation]. Georgia Tech; 2011. Available from: http://hdl.handle.net/1853/41122


Penn State University

12. Krych, Daniel. An Exposure of Android Social Media Applications and the Data ISPs Can Collect.

Degree: 2017, Penn State University

 Social media applications play a key role in our day-to-day lives, using and handling sensitive/private data in their nature. Android applications continue to share data… (more)

Subjects/Keywords: Android security; Android privacy; Dynamic analysis; Social media; Privacy policies; Dshell

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Krych, D. (2017). An Exposure of Android Social Media Applications and the Data ISPs Can Collect. (Thesis). Penn State University. Retrieved from https://etda.libraries.psu.edu/catalog/14730dek5156

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Krych, Daniel. “An Exposure of Android Social Media Applications and the Data ISPs Can Collect.” 2017. Thesis, Penn State University. Accessed January 22, 2020. https://etda.libraries.psu.edu/catalog/14730dek5156.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Krych, Daniel. “An Exposure of Android Social Media Applications and the Data ISPs Can Collect.” 2017. Web. 22 Jan 2020.

Vancouver:

Krych D. An Exposure of Android Social Media Applications and the Data ISPs Can Collect. [Internet] [Thesis]. Penn State University; 2017. [cited 2020 Jan 22]. Available from: https://etda.libraries.psu.edu/catalog/14730dek5156.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Krych D. An Exposure of Android Social Media Applications and the Data ISPs Can Collect. [Thesis]. Penn State University; 2017. Available from: https://etda.libraries.psu.edu/catalog/14730dek5156

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

13. Schmidt, David Eric. Pitfalls in the Automated Strengthening of Passwords.

Degree: MS, Computer Science and Engineering, 2013, Penn State University

 Passwords are the most common form of authentication for computer systems, and with good reason: they are simple, intuitive and require no extra device for… (more)

Subjects/Keywords: Password checking; Password creation policies; Information security; Strong authentication

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Schmidt, D. E. (2013). Pitfalls in the Automated Strengthening of Passwords. (Masters Thesis). Penn State University. Retrieved from https://etda.libraries.psu.edu/catalog/19658

Chicago Manual of Style (16th Edition):

Schmidt, David Eric. “Pitfalls in the Automated Strengthening of Passwords.” 2013. Masters Thesis, Penn State University. Accessed January 22, 2020. https://etda.libraries.psu.edu/catalog/19658.

MLA Handbook (7th Edition):

Schmidt, David Eric. “Pitfalls in the Automated Strengthening of Passwords.” 2013. Web. 22 Jan 2020.

Vancouver:

Schmidt DE. Pitfalls in the Automated Strengthening of Passwords. [Internet] [Masters thesis]. Penn State University; 2013. [cited 2020 Jan 22]. Available from: https://etda.libraries.psu.edu/catalog/19658.

Council of Science Editors:

Schmidt DE. Pitfalls in the Automated Strengthening of Passwords. [Masters Thesis]. Penn State University; 2013. Available from: https://etda.libraries.psu.edu/catalog/19658


University of Delaware

14. Zhou, Xiaohan. Social security policies in an overlapping generations model: applications to the U.S. and China .

Degree: 2018, University of Delaware

 In this paper, I find a social security policy with intergenerational transfer may outperform in terms of welfare several balanced-budget alternatives as the economy undergoes… (more)

Subjects/Keywords: Social sciences; China; Overlapping generations model; Social security policies; United States

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhou, X. (2018). Social security policies in an overlapping generations model: applications to the U.S. and China . (Doctoral Dissertation). University of Delaware. Retrieved from http://udspace.udel.edu/handle/19716/23930

Chicago Manual of Style (16th Edition):

Zhou, Xiaohan. “Social security policies in an overlapping generations model: applications to the U.S. and China .” 2018. Doctoral Dissertation, University of Delaware. Accessed January 22, 2020. http://udspace.udel.edu/handle/19716/23930.

MLA Handbook (7th Edition):

Zhou, Xiaohan. “Social security policies in an overlapping generations model: applications to the U.S. and China .” 2018. Web. 22 Jan 2020.

Vancouver:

Zhou X. Social security policies in an overlapping generations model: applications to the U.S. and China . [Internet] [Doctoral dissertation]. University of Delaware; 2018. [cited 2020 Jan 22]. Available from: http://udspace.udel.edu/handle/19716/23930.

Council of Science Editors:

Zhou X. Social security policies in an overlapping generations model: applications to the U.S. and China . [Doctoral Dissertation]. University of Delaware; 2018. Available from: http://udspace.udel.edu/handle/19716/23930


NSYSU

15. Shen, Yi-Hsin. A Study of Employeesâ Information Security Policy Violation Intention: A Moral Disengagement Perspective.

Degree: Master, Institute Of Information Management, 2018, NSYSU

 For modern society, the Internet has become an indispensable part of our lives. In this situation, information security has also become one of the most… (more)

Subjects/Keywords: Information Security Policies Violation Intention; Social Support; Job Engagement; Organizational Identification

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shen, Y. (2018). A Study of Employeesâ Information Security Policy Violation Intention: A Moral Disengagement Perspective. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0624118-150832

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Shen, Yi-Hsin. “A Study of Employeesâ Information Security Policy Violation Intention: A Moral Disengagement Perspective.” 2018. Thesis, NSYSU. Accessed January 22, 2020. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0624118-150832.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Shen, Yi-Hsin. “A Study of Employeesâ Information Security Policy Violation Intention: A Moral Disengagement Perspective.” 2018. Web. 22 Jan 2020.

Vancouver:

Shen Y. A Study of Employeesâ Information Security Policy Violation Intention: A Moral Disengagement Perspective. [Internet] [Thesis]. NSYSU; 2018. [cited 2020 Jan 22]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0624118-150832.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Shen Y. A Study of Employeesâ Information Security Policy Violation Intention: A Moral Disengagement Perspective. [Thesis]. NSYSU; 2018. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0624118-150832

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Leiden University

16. van der Heide, Susanne. The political challenges to combat malnutrition Analysis of food security policy in Guatemala.

Degree: 2019, Leiden University

 This study provides a critical analysis to the issue of malnutrition in Guatemala by looking at the constraints of national food security policy. Even though… (more)

Subjects/Keywords: food security; public policies; Guatemala; malnutrition; political institutions

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

van der Heide, S. (2019). The political challenges to combat malnutrition Analysis of food security policy in Guatemala. (Masters Thesis). Leiden University. Retrieved from http://hdl.handle.net/1887/76516

Chicago Manual of Style (16th Edition):

van der Heide, Susanne. “The political challenges to combat malnutrition Analysis of food security policy in Guatemala.” 2019. Masters Thesis, Leiden University. Accessed January 22, 2020. http://hdl.handle.net/1887/76516.

MLA Handbook (7th Edition):

van der Heide, Susanne. “The political challenges to combat malnutrition Analysis of food security policy in Guatemala.” 2019. Web. 22 Jan 2020.

Vancouver:

van der Heide S. The political challenges to combat malnutrition Analysis of food security policy in Guatemala. [Internet] [Masters thesis]. Leiden University; 2019. [cited 2020 Jan 22]. Available from: http://hdl.handle.net/1887/76516.

Council of Science Editors:

van der Heide S. The political challenges to combat malnutrition Analysis of food security policy in Guatemala. [Masters Thesis]. Leiden University; 2019. Available from: http://hdl.handle.net/1887/76516


KTH

17. Abaid, Mohammed. Evaluation of Jatropha Curcas as future en-ergy crop in some African countries.

Degree: Land and Water Resources Engineering, 2015, KTH

  Biofuels now days consider as one of the successful alternative to meet the challenges associated with climate change and peak oil, as well as… (more)

Subjects/Keywords: Biofuels; Jatropha Curcas; Africa; policies; environments and food security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Abaid, M. (2015). Evaluation of Jatropha Curcas as future en-ergy crop in some African countries. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-170063

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Abaid, Mohammed. “Evaluation of Jatropha Curcas as future en-ergy crop in some African countries.” 2015. Thesis, KTH. Accessed January 22, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-170063.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Abaid, Mohammed. “Evaluation of Jatropha Curcas as future en-ergy crop in some African countries.” 2015. Web. 22 Jan 2020.

Vancouver:

Abaid M. Evaluation of Jatropha Curcas as future en-ergy crop in some African countries. [Internet] [Thesis]. KTH; 2015. [cited 2020 Jan 22]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-170063.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Abaid M. Evaluation of Jatropha Curcas as future en-ergy crop in some African countries. [Thesis]. KTH; 2015. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-170063

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Linnaeus University

18. Spandonidis, Bladimiros. Linking Information Security Awareness to Information Security Management Strategy.A Study in an IT Company.

Degree: Informatics, 2015, Linnaeus University

  There is a great concern when it comes to the investigation of the parameters that affect the formulation of an information security management strategy… (more)

Subjects/Keywords: Information security awareness; information security policies; compliance; psychology; security; measurement; information security management strategies; information security training programs; POST™ framework; PEST analysis.; Other Engineering and Technologies; Annan teknik

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Spandonidis, B. (2015). Linking Information Security Awareness to Information Security Management Strategy.A Study in an IT Company. (Thesis). Linnaeus University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-45894

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Spandonidis, Bladimiros. “Linking Information Security Awareness to Information Security Management Strategy.A Study in an IT Company.” 2015. Thesis, Linnaeus University. Accessed January 22, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-45894.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Spandonidis, Bladimiros. “Linking Information Security Awareness to Information Security Management Strategy.A Study in an IT Company.” 2015. Web. 22 Jan 2020.

Vancouver:

Spandonidis B. Linking Information Security Awareness to Information Security Management Strategy.A Study in an IT Company. [Internet] [Thesis]. Linnaeus University; 2015. [cited 2020 Jan 22]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-45894.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Spandonidis B. Linking Information Security Awareness to Information Security Management Strategy.A Study in an IT Company. [Thesis]. Linnaeus University; 2015. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-45894

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

19. Mattes, Leonardo. GridMultiPolicy: gerenciamento e efetivação de múltiplas políticas de controle de acesso em ambientes de grades computacionais.

Degree: PhD, Sistemas Eletrônicos, 2007, University of São Paulo

O termo grade computacional faz referência a uma classe de sistemas distribuídos que permitem a associação e a integração de múltiplos domínios em organizações virtuais.… (more)

Subjects/Keywords: Grades computacionais; Grid computing; Network security; Políticas de segurança; Redes de computadores (segurança; gerenciamento); Security policies

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mattes, L. (2007). GridMultiPolicy: gerenciamento e efetivação de múltiplas políticas de controle de acesso em ambientes de grades computacionais. (Doctoral Dissertation). University of São Paulo. Retrieved from http://www.teses.usp.br/teses/disponiveis/3/3142/tde-08012008-145925/ ;

Chicago Manual of Style (16th Edition):

Mattes, Leonardo. “GridMultiPolicy: gerenciamento e efetivação de múltiplas políticas de controle de acesso em ambientes de grades computacionais.” 2007. Doctoral Dissertation, University of São Paulo. Accessed January 22, 2020. http://www.teses.usp.br/teses/disponiveis/3/3142/tde-08012008-145925/ ;.

MLA Handbook (7th Edition):

Mattes, Leonardo. “GridMultiPolicy: gerenciamento e efetivação de múltiplas políticas de controle de acesso em ambientes de grades computacionais.” 2007. Web. 22 Jan 2020.

Vancouver:

Mattes L. GridMultiPolicy: gerenciamento e efetivação de múltiplas políticas de controle de acesso em ambientes de grades computacionais. [Internet] [Doctoral dissertation]. University of São Paulo; 2007. [cited 2020 Jan 22]. Available from: http://www.teses.usp.br/teses/disponiveis/3/3142/tde-08012008-145925/ ;.

Council of Science Editors:

Mattes L. GridMultiPolicy: gerenciamento e efetivação de múltiplas políticas de controle de acesso em ambientes de grades computacionais. [Doctoral Dissertation]. University of São Paulo; 2007. Available from: http://www.teses.usp.br/teses/disponiveis/3/3142/tde-08012008-145925/ ;

20. Castillo, Juan Ignacio Albino Roman. O brasil e a segurança no cone sul no pós-guerra fria.

Degree: PhD, Ciência Política, 2009, University of São Paulo

Quando se considera a Segurança Internacional da América Latina, comprovasse a inexistência de um ator regional com excedente de poder necessário, tanto em Hard power,… (more)

Subjects/Keywords: International Politics - Security - Latin America - Brazil; International Relations; Política de segurança; Política Internacional - Segurança - América Latina - Brasil; Relações internacionais; Security Policies

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Castillo, J. I. A. R. (2009). O brasil e a segurança no cone sul no pós-guerra fria. (Doctoral Dissertation). University of São Paulo. Retrieved from http://www.teses.usp.br/teses/disponiveis/8/8131/tde-11112009-172933/ ;

Chicago Manual of Style (16th Edition):

Castillo, Juan Ignacio Albino Roman. “O brasil e a segurança no cone sul no pós-guerra fria.” 2009. Doctoral Dissertation, University of São Paulo. Accessed January 22, 2020. http://www.teses.usp.br/teses/disponiveis/8/8131/tde-11112009-172933/ ;.

MLA Handbook (7th Edition):

Castillo, Juan Ignacio Albino Roman. “O brasil e a segurança no cone sul no pós-guerra fria.” 2009. Web. 22 Jan 2020.

Vancouver:

Castillo JIAR. O brasil e a segurança no cone sul no pós-guerra fria. [Internet] [Doctoral dissertation]. University of São Paulo; 2009. [cited 2020 Jan 22]. Available from: http://www.teses.usp.br/teses/disponiveis/8/8131/tde-11112009-172933/ ;.

Council of Science Editors:

Castillo JIAR. O brasil e a segurança no cone sul no pós-guerra fria. [Doctoral Dissertation]. University of São Paulo; 2009. Available from: http://www.teses.usp.br/teses/disponiveis/8/8131/tde-11112009-172933/ ;


Universidade Presbiteriana Mackenzie

21. Gislene Donizetti Gerônimo. Segurança pública: dever do Estado: garantia do exercício da cidadania.

Degree: 2011, Universidade Presbiteriana Mackenzie

O Estado Moderno surgiu como um novo tipo de Estado. Marcado pelo poder soberano, foi instituído com a função de assegurar a ordem e a… (more)

Subjects/Keywords: police activity; public security; políticas de segurança pública; atividade policial; polícia; segurança pública; DIREITO CONSTITUCIONAL; policy; policies of public security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gerônimo, G. D. (2011). Segurança pública: dever do Estado: garantia do exercício da cidadania. (Thesis). Universidade Presbiteriana Mackenzie. Retrieved from http://tede.mackenzie.com.br//tde_busca/arquivo.php?codArquivo=2380

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Gerônimo, Gislene Donizetti. “Segurança pública: dever do Estado: garantia do exercício da cidadania.” 2011. Thesis, Universidade Presbiteriana Mackenzie. Accessed January 22, 2020. http://tede.mackenzie.com.br//tde_busca/arquivo.php?codArquivo=2380.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Gerônimo, Gislene Donizetti. “Segurança pública: dever do Estado: garantia do exercício da cidadania.” 2011. Web. 22 Jan 2020.

Vancouver:

Gerônimo GD. Segurança pública: dever do Estado: garantia do exercício da cidadania. [Internet] [Thesis]. Universidade Presbiteriana Mackenzie; 2011. [cited 2020 Jan 22]. Available from: http://tede.mackenzie.com.br//tde_busca/arquivo.php?codArquivo=2380.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Gerônimo GD. Segurança pública: dever do Estado: garantia do exercício da cidadania. [Thesis]. Universidade Presbiteriana Mackenzie; 2011. Available from: http://tede.mackenzie.com.br//tde_busca/arquivo.php?codArquivo=2380

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Universitat Autònoma de Barcelona

22. García Alfaro, Joaquín. Platform of intrusion management design and implementation.

Degree: Departament d'Informàtica, 2006, Universitat Autònoma de Barcelona

 Since computer infrastructures are currently getting more vulnerable than ever, traditional security mechanisms are still necessary but not suficient. We need to design effective response… (more)

Subjects/Keywords: Intrusion detection; Security policies; Network security; Tecnologies; 519.1

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

García Alfaro, J. (2006). Platform of intrusion management design and implementation. (Thesis). Universitat Autònoma de Barcelona. Retrieved from http://hdl.handle.net/10803/3053

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

García Alfaro, Joaquín. “Platform of intrusion management design and implementation.” 2006. Thesis, Universitat Autònoma de Barcelona. Accessed January 22, 2020. http://hdl.handle.net/10803/3053.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

García Alfaro, Joaquín. “Platform of intrusion management design and implementation.” 2006. Web. 22 Jan 2020.

Vancouver:

García Alfaro J. Platform of intrusion management design and implementation. [Internet] [Thesis]. Universitat Autònoma de Barcelona; 2006. [cited 2020 Jan 22]. Available from: http://hdl.handle.net/10803/3053.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

García Alfaro J. Platform of intrusion management design and implementation. [Thesis]. Universitat Autònoma de Barcelona; 2006. Available from: http://hdl.handle.net/10803/3053

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

23. Nulle, Annika. The Common Security and Defence Policy of the EU : A Neo-Institutionalist Analysis of a Policy Field in Paralysis.

Degree: Faculty of Arts and Sciences, 2014, Linköping UniversityLinköping University

  This research work aims at improving the overall understanding of the Common Security and Defence Policy of the European Union and its functioning against… (more)

Subjects/Keywords: European Union; Common Security and Defence Policy; European foreign policy; EU crisis management; international security policies; New Institutionalism; institutionalist theory

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nulle, A. (2014). The Common Security and Defence Policy of the EU : A Neo-Institutionalist Analysis of a Policy Field in Paralysis. (Thesis). Linköping UniversityLinköping University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-107951

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Nulle, Annika. “The Common Security and Defence Policy of the EU : A Neo-Institutionalist Analysis of a Policy Field in Paralysis.” 2014. Thesis, Linköping UniversityLinköping University. Accessed January 22, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-107951.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Nulle, Annika. “The Common Security and Defence Policy of the EU : A Neo-Institutionalist Analysis of a Policy Field in Paralysis.” 2014. Web. 22 Jan 2020.

Vancouver:

Nulle A. The Common Security and Defence Policy of the EU : A Neo-Institutionalist Analysis of a Policy Field in Paralysis. [Internet] [Thesis]. Linköping UniversityLinköping University; 2014. [cited 2020 Jan 22]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-107951.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Nulle A. The Common Security and Defence Policy of the EU : A Neo-Institutionalist Analysis of a Policy Field in Paralysis. [Thesis]. Linköping UniversityLinköping University; 2014. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-107951

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

24. João Paulo Barbosa dos Santos. O impacto das políticas públicas sobre as práticas tradicionais dos pescadores da Ilha de Itamaracá-PE: o caso do Bolsa Família nas comunidades de Jaguaribe e Pilar.

Degree: 2012, Universidade Federal Rural de Pernambuco

As políticas públicas no Brasil têm sido uma constante importante durante diversas fases de governo. As mesmas têm proporcionado melhores condições a diversas camadas sociais,… (more)

Subjects/Keywords: Bolsa família; Pesca artesanal; Políticas públicas; Segurança alimentar; ADMINISTRACAO; Public policies; Handmade fishing; Health security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Santos, J. P. B. d. (2012). O impacto das políticas públicas sobre as práticas tradicionais dos pescadores da Ilha de Itamaracá-PE: o caso do Bolsa Família nas comunidades de Jaguaribe e Pilar. (Thesis). Universidade Federal Rural de Pernambuco. Retrieved from http://200.17.137.108/tde_busca/arquivo.php?codArquivo=1952

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Santos, João Paulo Barbosa dos. “O impacto das políticas públicas sobre as práticas tradicionais dos pescadores da Ilha de Itamaracá-PE: o caso do Bolsa Família nas comunidades de Jaguaribe e Pilar.” 2012. Thesis, Universidade Federal Rural de Pernambuco. Accessed January 22, 2020. http://200.17.137.108/tde_busca/arquivo.php?codArquivo=1952.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Santos, João Paulo Barbosa dos. “O impacto das políticas públicas sobre as práticas tradicionais dos pescadores da Ilha de Itamaracá-PE: o caso do Bolsa Família nas comunidades de Jaguaribe e Pilar.” 2012. Web. 22 Jan 2020.

Vancouver:

Santos JPBd. O impacto das políticas públicas sobre as práticas tradicionais dos pescadores da Ilha de Itamaracá-PE: o caso do Bolsa Família nas comunidades de Jaguaribe e Pilar. [Internet] [Thesis]. Universidade Federal Rural de Pernambuco; 2012. [cited 2020 Jan 22]. Available from: http://200.17.137.108/tde_busca/arquivo.php?codArquivo=1952.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Santos JPBd. O impacto das políticas públicas sobre as práticas tradicionais dos pescadores da Ilha de Itamaracá-PE: o caso do Bolsa Família nas comunidades de Jaguaribe e Pilar. [Thesis]. Universidade Federal Rural de Pernambuco; 2012. Available from: http://200.17.137.108/tde_busca/arquivo.php?codArquivo=1952

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

25. França, Giselle de Amaro e. O Poder Judiciário e as políticas públicas previdenciárias.

Degree: Mestrado, Direito do Trabalho, 2010, University of São Paulo

O estudo das políticas públicas recentemente tem despertado a atenção da doutrina no âmbito do Direito. O presente trabalho busca apresentar um quadro geral das… (more)

Subjects/Keywords: Direito previdenciário; Judicial review; Poder judiciário; Políticas públicas; Previdência Social; Public policies; Social security act

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

França, G. d. A. e. (2010). O Poder Judiciário e as políticas públicas previdenciárias. (Masters Thesis). University of São Paulo. Retrieved from http://www.teses.usp.br/teses/disponiveis/2/2138/tde-13122010-163247/ ;

Chicago Manual of Style (16th Edition):

França, Giselle de Amaro e. “O Poder Judiciário e as políticas públicas previdenciárias.” 2010. Masters Thesis, University of São Paulo. Accessed January 22, 2020. http://www.teses.usp.br/teses/disponiveis/2/2138/tde-13122010-163247/ ;.

MLA Handbook (7th Edition):

França, Giselle de Amaro e. “O Poder Judiciário e as políticas públicas previdenciárias.” 2010. Web. 22 Jan 2020.

Vancouver:

França GdAe. O Poder Judiciário e as políticas públicas previdenciárias. [Internet] [Masters thesis]. University of São Paulo; 2010. [cited 2020 Jan 22]. Available from: http://www.teses.usp.br/teses/disponiveis/2/2138/tde-13122010-163247/ ;.

Council of Science Editors:

França GdAe. O Poder Judiciário e as políticas públicas previdenciárias. [Masters Thesis]. University of São Paulo; 2010. Available from: http://www.teses.usp.br/teses/disponiveis/2/2138/tde-13122010-163247/ ;


NSYSU

26. Li, Shin-bei. Security Consideration in Japanâs ODA Charter: A Case Study of Capacity Building with the Philippines.

Degree: Master, ICAPS, 2018, NSYSU

 This study is to explore the factors of New ODA Charter adding security consideration by a case study of Capacity building with Philippines. It begins… (more)

Subjects/Keywords: U.S. âJapan Alliance; Capacity Building Program; South China Sea Issues; Japanâs ODA; Security Policies

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Li, S. (2018). Security Consideration in Japanâs ODA Charter: A Case Study of Capacity Building with the Philippines. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0505118-170239

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Li, Shin-bei. “Security Consideration in Japanâs ODA Charter: A Case Study of Capacity Building with the Philippines.” 2018. Thesis, NSYSU. Accessed January 22, 2020. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0505118-170239.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Li, Shin-bei. “Security Consideration in Japanâs ODA Charter: A Case Study of Capacity Building with the Philippines.” 2018. Web. 22 Jan 2020.

Vancouver:

Li S. Security Consideration in Japanâs ODA Charter: A Case Study of Capacity Building with the Philippines. [Internet] [Thesis]. NSYSU; 2018. [cited 2020 Jan 22]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0505118-170239.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Li S. Security Consideration in Japanâs ODA Charter: A Case Study of Capacity Building with the Philippines. [Thesis]. NSYSU; 2018. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0505118-170239

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Angelo State University

27. Stiles, Robert E. United States policy towards rogue states.

Degree: Master of Security Studies, Security Studies, 2012, Angelo State University

 One of the United States' main security challenges in the post-Cold War era is rogue states. Given that such states are an ongoing security concern,… (more)

Subjects/Keywords: rogue states; security concern; Islamic Republic of Iran; Iraq; North Korean; policies

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Stiles, R. E. (2012). United States policy towards rogue states. (Masters Thesis). Angelo State University. Retrieved from http://hdl.handle.net/2346.1/30021

Chicago Manual of Style (16th Edition):

Stiles, Robert E. “United States policy towards rogue states.” 2012. Masters Thesis, Angelo State University. Accessed January 22, 2020. http://hdl.handle.net/2346.1/30021.

MLA Handbook (7th Edition):

Stiles, Robert E. “United States policy towards rogue states.” 2012. Web. 22 Jan 2020.

Vancouver:

Stiles RE. United States policy towards rogue states. [Internet] [Masters thesis]. Angelo State University; 2012. [cited 2020 Jan 22]. Available from: http://hdl.handle.net/2346.1/30021.

Council of Science Editors:

Stiles RE. United States policy towards rogue states. [Masters Thesis]. Angelo State University; 2012. Available from: http://hdl.handle.net/2346.1/30021


Technical University of Lisbon

28. Fonseca, Francisco José Seixas. A evolução das políticas públicas de segurança interna em Portugal, na era da globalização.

Degree: 2010, Technical University of Lisbon

Tese de Mestrado do curso de Gestão e Políticas Públicas

A gestão da segurança interna tem sofrido alterações neste mundo dinâmico e em acentuada globalização.… (more)

Subjects/Keywords: Políticas públicas; Segurança; Governo; Globalização; Gestão; Agendas; Public policies; Security; Government; Globalization; Management; Agenda

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Fonseca, F. J. S. (2010). A evolução das políticas públicas de segurança interna em Portugal, na era da globalização. (Thesis). Technical University of Lisbon. Retrieved from http://www.rcaap.pt/detail.jsp?id=oai:www.repository.utl.pt:10400.5/2977

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Fonseca, Francisco José Seixas. “A evolução das políticas públicas de segurança interna em Portugal, na era da globalização.” 2010. Thesis, Technical University of Lisbon. Accessed January 22, 2020. http://www.rcaap.pt/detail.jsp?id=oai:www.repository.utl.pt:10400.5/2977.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Fonseca, Francisco José Seixas. “A evolução das políticas públicas de segurança interna em Portugal, na era da globalização.” 2010. Web. 22 Jan 2020.

Vancouver:

Fonseca FJS. A evolução das políticas públicas de segurança interna em Portugal, na era da globalização. [Internet] [Thesis]. Technical University of Lisbon; 2010. [cited 2020 Jan 22]. Available from: http://www.rcaap.pt/detail.jsp?id=oai:www.repository.utl.pt:10400.5/2977.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Fonseca FJS. A evolução das políticas públicas de segurança interna em Portugal, na era da globalização. [Thesis]. Technical University of Lisbon; 2010. Available from: http://www.rcaap.pt/detail.jsp?id=oai:www.repository.utl.pt:10400.5/2977

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Universidade do Rio Grande do Sul

29. Horowitz, Eduardo. Estudo sobre a extração de políticas de firewall e uma proposta de metodologia.

Degree: 2007, Universidade do Rio Grande do Sul

Com o aumento das ameaças na Internet, firewalls tornaram-se mecanismos de defesa cada vez mais utilizados. No entanto, sua configuração é notadamente complexa, podendo resultar… (more)

Subjects/Keywords: Network security; Seguranca : Computadores; Criptografia; Firewalls; Firewall; Firewall policies; Decorrelation; Policy extraction

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Horowitz, E. (2007). Estudo sobre a extração de políticas de firewall e uma proposta de metodologia. (Thesis). Universidade do Rio Grande do Sul. Retrieved from http://hdl.handle.net/10183/12075

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Horowitz, Eduardo. “Estudo sobre a extração de políticas de firewall e uma proposta de metodologia.” 2007. Thesis, Universidade do Rio Grande do Sul. Accessed January 22, 2020. http://hdl.handle.net/10183/12075.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Horowitz, Eduardo. “Estudo sobre a extração de políticas de firewall e uma proposta de metodologia.” 2007. Web. 22 Jan 2020.

Vancouver:

Horowitz E. Estudo sobre a extração de políticas de firewall e uma proposta de metodologia. [Internet] [Thesis]. Universidade do Rio Grande do Sul; 2007. [cited 2020 Jan 22]. Available from: http://hdl.handle.net/10183/12075.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Horowitz E. Estudo sobre a extração de políticas de firewall e uma proposta de metodologia. [Thesis]. Universidade do Rio Grande do Sul; 2007. Available from: http://hdl.handle.net/10183/12075

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Ohio University

30. Giffin, Jessica L. The Effects of the War on Terror on U.S. and Latin American Security Policies.

Degree: MA, Political Science (Arts and Sciences), 2007, Ohio University

 What effect has the War on Terror had on U.S. and Latin American security policies? Has the War on Terror impacted only the discourse regarding… (more)

Subjects/Keywords: War on Terror; Latin America; Colombia; Mexico; Plan Colombia; Immigration; Security policies

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Giffin, J. L. (2007). The Effects of the War on Terror on U.S. and Latin American Security Policies. (Masters Thesis). Ohio University. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1187385265

Chicago Manual of Style (16th Edition):

Giffin, Jessica L. “The Effects of the War on Terror on U.S. and Latin American Security Policies.” 2007. Masters Thesis, Ohio University. Accessed January 22, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1187385265.

MLA Handbook (7th Edition):

Giffin, Jessica L. “The Effects of the War on Terror on U.S. and Latin American Security Policies.” 2007. Web. 22 Jan 2020.

Vancouver:

Giffin JL. The Effects of the War on Terror on U.S. and Latin American Security Policies. [Internet] [Masters thesis]. Ohio University; 2007. [cited 2020 Jan 22]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1187385265.

Council of Science Editors:

Giffin JL. The Effects of the War on Terror on U.S. and Latin American Security Policies. [Masters Thesis]. Ohio University; 2007. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1187385265

[1] [2] [3] [4] [5]

.