Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(data protection). Showing records 1 – 30 of 671 total matches.

[1] [2] [3] [4] [5] … [23]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Languages

Country

▼ Search Limiters


University of Technology, Sydney

1. Chen, L. Achieving trust-oriented data protection in the cloud environment.

Degree: 2014, University of Technology, Sydney

 Cloud computing has gained increasing acceptance in recent years. In privacy-conscious domains such as healthcare and banking, however, data security and privacy are the greatest… (more)

Subjects/Keywords: Data protection.; Cloud computing.; Security.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chen, L. (2014). Achieving trust-oriented data protection in the cloud environment. (Thesis). University of Technology, Sydney. Retrieved from http://hdl.handle.net/10453/29219

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chen, L. “Achieving trust-oriented data protection in the cloud environment.” 2014. Thesis, University of Technology, Sydney. Accessed November 11, 2019. http://hdl.handle.net/10453/29219.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chen, L. “Achieving trust-oriented data protection in the cloud environment.” 2014. Web. 11 Nov 2019.

Vancouver:

Chen L. Achieving trust-oriented data protection in the cloud environment. [Internet] [Thesis]. University of Technology, Sydney; 2014. [cited 2019 Nov 11]. Available from: http://hdl.handle.net/10453/29219.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chen L. Achieving trust-oriented data protection in the cloud environment. [Thesis]. University of Technology, Sydney; 2014. Available from: http://hdl.handle.net/10453/29219

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Technology, Sydney

2. Oost, DJ. Information security management : an empirical analysis of its constitution.

Degree: 2009, University of Technology, Sydney

 This thesis addresses the following research questions: How does analysis of the everyday discursive work of information security managers inform us about the phenomena that… (more)

Subjects/Keywords: Computer security.; Data protection.; Management.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Oost, D. (2009). Information security management : an empirical analysis of its constitution. (Thesis). University of Technology, Sydney. Retrieved from http://hdl.handle.net/10453/29869

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Oost, DJ. “Information security management : an empirical analysis of its constitution.” 2009. Thesis, University of Technology, Sydney. Accessed November 11, 2019. http://hdl.handle.net/10453/29869.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Oost, DJ. “Information security management : an empirical analysis of its constitution.” 2009. Web. 11 Nov 2019.

Vancouver:

Oost D. Information security management : an empirical analysis of its constitution. [Internet] [Thesis]. University of Technology, Sydney; 2009. [cited 2019 Nov 11]. Available from: http://hdl.handle.net/10453/29869.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Oost D. Information security management : an empirical analysis of its constitution. [Thesis]. University of Technology, Sydney; 2009. Available from: http://hdl.handle.net/10453/29869

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

3. Routly, Wayne A. SIDVI: a model for secure distributed data integration.

Degree: Faculty of Computer Studies, 2004, Port Elizabeth Technikon

 The new millennium has brought about an increase in the use of business intelligence and knowledge management systems. The very foundations of these systems are… (more)

Subjects/Keywords: Data protection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Routly, W. A. (2004). SIDVI: a model for secure distributed data integration. (Thesis). Port Elizabeth Technikon. Retrieved from http://hdl.handle.net/10948/261

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Routly, Wayne A. “SIDVI: a model for secure distributed data integration.” 2004. Thesis, Port Elizabeth Technikon. Accessed November 11, 2019. http://hdl.handle.net/10948/261.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Routly, Wayne A. “SIDVI: a model for secure distributed data integration.” 2004. Web. 11 Nov 2019.

Vancouver:

Routly WA. SIDVI: a model for secure distributed data integration. [Internet] [Thesis]. Port Elizabeth Technikon; 2004. [cited 2019 Nov 11]. Available from: http://hdl.handle.net/10948/261.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Routly WA. SIDVI: a model for secure distributed data integration. [Thesis]. Port Elizabeth Technikon; 2004. Available from: http://hdl.handle.net/10948/261

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Ryerson University

4. Jaber, Ramzy. Digital watermarking of 3D disparity map based images for transaction tracking.

Degree: 2014, Ryerson University

 In this thesis, the basics of disparity map and watermarking are reviewed extensively. In order to embed binary information into images, a 3D image watermarking… (more)

Subjects/Keywords: Digital watermarking; Data protection; Watermarks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jaber, R. (2014). Digital watermarking of 3D disparity map based images for transaction tracking. (Thesis). Ryerson University. Retrieved from https://digital.library.ryerson.ca/islandora/object/RULA%3A3434

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Jaber, Ramzy. “Digital watermarking of 3D disparity map based images for transaction tracking.” 2014. Thesis, Ryerson University. Accessed November 11, 2019. https://digital.library.ryerson.ca/islandora/object/RULA%3A3434.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Jaber, Ramzy. “Digital watermarking of 3D disparity map based images for transaction tracking.” 2014. Web. 11 Nov 2019.

Vancouver:

Jaber R. Digital watermarking of 3D disparity map based images for transaction tracking. [Internet] [Thesis]. Ryerson University; 2014. [cited 2019 Nov 11]. Available from: https://digital.library.ryerson.ca/islandora/object/RULA%3A3434.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Jaber R. Digital watermarking of 3D disparity map based images for transaction tracking. [Thesis]. Ryerson University; 2014. Available from: https://digital.library.ryerson.ca/islandora/object/RULA%3A3434

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Edinburgh

5. Stevens, Leslie Anne. A public interest approach to data protection law : the meaning, value and utility of the public interest for research uses of data.

Degree: PhD, 2017, University of Edinburgh

 Due to legal uncertainty surrounding the application of key provisions of European and UK data protection law, the public interest in protecting individuals’ informational privacy… (more)

Subjects/Keywords: public interest; privacy; data protection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Stevens, L. A. (2017). A public interest approach to data protection law : the meaning, value and utility of the public interest for research uses of data. (Doctoral Dissertation). University of Edinburgh. Retrieved from http://hdl.handle.net/1842/25772

Chicago Manual of Style (16th Edition):

Stevens, Leslie Anne. “A public interest approach to data protection law : the meaning, value and utility of the public interest for research uses of data.” 2017. Doctoral Dissertation, University of Edinburgh. Accessed November 11, 2019. http://hdl.handle.net/1842/25772.

MLA Handbook (7th Edition):

Stevens, Leslie Anne. “A public interest approach to data protection law : the meaning, value and utility of the public interest for research uses of data.” 2017. Web. 11 Nov 2019.

Vancouver:

Stevens LA. A public interest approach to data protection law : the meaning, value and utility of the public interest for research uses of data. [Internet] [Doctoral dissertation]. University of Edinburgh; 2017. [cited 2019 Nov 11]. Available from: http://hdl.handle.net/1842/25772.

Council of Science Editors:

Stevens LA. A public interest approach to data protection law : the meaning, value and utility of the public interest for research uses of data. [Doctoral Dissertation]. University of Edinburgh; 2017. Available from: http://hdl.handle.net/1842/25772


Nelson Mandela Metropolitan University

6. [No author]. A framework for information security management in local government.

Degree: Faculty of Engineering, the Built Environment and Information Technology, 2017, Nelson Mandela Metropolitan University

 Information has become so pervasive within enterprises and everyday life, that it is almost indispensable. This is clear as information has become core to the… (more)

Subjects/Keywords: Computer security  – Management; Data protection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

author], [. (2017). A framework for information security management in local government. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/7588

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

author], [No. “A framework for information security management in local government.” 2017. Thesis, Nelson Mandela Metropolitan University. Accessed November 11, 2019. http://hdl.handle.net/10948/7588.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

author], [No. “A framework for information security management in local government.” 2017. Web. 11 Nov 2019.

Vancouver:

author] [. A framework for information security management in local government. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2017. [cited 2019 Nov 11]. Available from: http://hdl.handle.net/10948/7588.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

author] [. A framework for information security management in local government. [Thesis]. Nelson Mandela Metropolitan University; 2017. Available from: http://hdl.handle.net/10948/7588

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

7. Von Solms, Rossouw. Information security management : processes and metrics.

Degree: 2014, University of Johannesburg

PhD. (Informatics)

Organizations become daily more dependent on information. Information is captured, processed, stored and distributed by the information resources and services within the organization.… (more)

Subjects/Keywords: Data protection; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Von Solms, R. (2014). Information security management : processes and metrics. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/12038

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Von Solms, Rossouw. “Information security management : processes and metrics.” 2014. Thesis, University of Johannesburg. Accessed November 11, 2019. http://hdl.handle.net/10210/12038.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Von Solms, Rossouw. “Information security management : processes and metrics.” 2014. Web. 11 Nov 2019.

Vancouver:

Von Solms R. Information security management : processes and metrics. [Internet] [Thesis]. University of Johannesburg; 2014. [cited 2019 Nov 11]. Available from: http://hdl.handle.net/10210/12038.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Von Solms R. Information security management : processes and metrics. [Thesis]. University of Johannesburg; 2014. Available from: http://hdl.handle.net/10210/12038

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

8. Edwards, Norman Godfrey. Die ontwikkeling en implementering van 'n formele model vir logiese toegangsbeheer in rekenaarstelsels.

Degree: 2014, University of Johannesburg

M.Com. (Computer Science)

The area covered in this study is that of logical security models. A logical security model refers to the formal representation of… (more)

Subjects/Keywords: Computers - Access control; Data protection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Edwards, N. G. (2014). Die ontwikkeling en implementering van 'n formele model vir logiese toegangsbeheer in rekenaarstelsels. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/9810

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Edwards, Norman Godfrey. “Die ontwikkeling en implementering van 'n formele model vir logiese toegangsbeheer in rekenaarstelsels.” 2014. Thesis, University of Johannesburg. Accessed November 11, 2019. http://hdl.handle.net/10210/9810.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Edwards, Norman Godfrey. “Die ontwikkeling en implementering van 'n formele model vir logiese toegangsbeheer in rekenaarstelsels.” 2014. Web. 11 Nov 2019.

Vancouver:

Edwards NG. Die ontwikkeling en implementering van 'n formele model vir logiese toegangsbeheer in rekenaarstelsels. [Internet] [Thesis]. University of Johannesburg; 2014. [cited 2019 Nov 11]. Available from: http://hdl.handle.net/10210/9810.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Edwards NG. Die ontwikkeling en implementering van 'n formele model vir logiese toegangsbeheer in rekenaarstelsels. [Thesis]. University of Johannesburg; 2014. Available from: http://hdl.handle.net/10210/9810

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Université de Neuchâtel

9. Jendly, Manon. La coexistence des secrets en exécution de peine privative de liberté: vers un modèle de partage des informations confidentielles en milieu carcéral.

Degree: 2005, Université de Neuchâtel

 Cette recherche s’inscrit dans le cadre de la refonte de la politique pénitentiaire helvétique, laquelle a été entamée depuis plusieurs décennies et considère la peine… (more)

Subjects/Keywords: Data protection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jendly, M. (2005). La coexistence des secrets en exécution de peine privative de liberté: vers un modèle de partage des informations confidentielles en milieu carcéral. (Thesis). Université de Neuchâtel. Retrieved from http://doc.rero.ch/record/5503

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Jendly, Manon. “La coexistence des secrets en exécution de peine privative de liberté: vers un modèle de partage des informations confidentielles en milieu carcéral.” 2005. Thesis, Université de Neuchâtel. Accessed November 11, 2019. http://doc.rero.ch/record/5503.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Jendly, Manon. “La coexistence des secrets en exécution de peine privative de liberté: vers un modèle de partage des informations confidentielles en milieu carcéral.” 2005. Web. 11 Nov 2019.

Vancouver:

Jendly M. La coexistence des secrets en exécution de peine privative de liberté: vers un modèle de partage des informations confidentielles en milieu carcéral. [Internet] [Thesis]. Université de Neuchâtel; 2005. [cited 2019 Nov 11]. Available from: http://doc.rero.ch/record/5503.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Jendly M. La coexistence des secrets en exécution de peine privative de liberté: vers un modèle de partage des informations confidentielles en milieu carcéral. [Thesis]. Université de Neuchâtel; 2005. Available from: http://doc.rero.ch/record/5503

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rutgers University

10. Salles-Loustau, Gabriel, 1986-. Data protection via virtual micro security perimeters.

Degree: PhD, Electrical and Computer Engineering, 2018, Rutgers University

Mobile devices have become the platform of reference for data consumption. Between personal and work related usages, users entrust their mobile devices to handle data(more)

Subjects/Keywords: Computer security; Data protection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Salles-Loustau, Gabriel, 1. (2018). Data protection via virtual micro security perimeters. (Doctoral Dissertation). Rutgers University. Retrieved from https://rucore.libraries.rutgers.edu/rutgers-lib/57699/

Chicago Manual of Style (16th Edition):

Salles-Loustau, Gabriel, 1986-. “Data protection via virtual micro security perimeters.” 2018. Doctoral Dissertation, Rutgers University. Accessed November 11, 2019. https://rucore.libraries.rutgers.edu/rutgers-lib/57699/.

MLA Handbook (7th Edition):

Salles-Loustau, Gabriel, 1986-. “Data protection via virtual micro security perimeters.” 2018. Web. 11 Nov 2019.

Vancouver:

Salles-Loustau, Gabriel 1. Data protection via virtual micro security perimeters. [Internet] [Doctoral dissertation]. Rutgers University; 2018. [cited 2019 Nov 11]. Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/57699/.

Council of Science Editors:

Salles-Loustau, Gabriel 1. Data protection via virtual micro security perimeters. [Doctoral Dissertation]. Rutgers University; 2018. Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/57699/


Rutgers University

11. Dasta, Shane, 1991-. Dynamic steganography.

Degree: MS, Steganography, 2019, Rutgers University

 We introduce the idea of dynamic steganography, which is essentially hiding a process within a process. We introduce components of dynamic steganography. The payload process… (more)

Subjects/Keywords: Computer Science; Cryptography; Data protection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dasta, Shane, 1. (2019). Dynamic steganography. (Masters Thesis). Rutgers University. Retrieved from https://rucore.libraries.rutgers.edu/rutgers-lib/60862/

Chicago Manual of Style (16th Edition):

Dasta, Shane, 1991-. “Dynamic steganography.” 2019. Masters Thesis, Rutgers University. Accessed November 11, 2019. https://rucore.libraries.rutgers.edu/rutgers-lib/60862/.

MLA Handbook (7th Edition):

Dasta, Shane, 1991-. “Dynamic steganography.” 2019. Web. 11 Nov 2019.

Vancouver:

Dasta, Shane 1. Dynamic steganography. [Internet] [Masters thesis]. Rutgers University; 2019. [cited 2019 Nov 11]. Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/60862/.

Council of Science Editors:

Dasta, Shane 1. Dynamic steganography. [Masters Thesis]. Rutgers University; 2019. Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/60862/


Massey University

12. McLachlan, Scott. Realism in synthetic data generation : a thesis presented in fulfilment of the requirements for the degree of Master of Philosophy in Science, School of Engineering and Advanced Technology, Massey University, Palmerston North, New Zealand .

Degree: 2017, Massey University

 There are many situations where researchers cannot make use of real data because either the data does not exist in the required format or privacy… (more)

Subjects/Keywords: Computer simulation; Data protection; Data mining

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

McLachlan, S. (2017). Realism in synthetic data generation : a thesis presented in fulfilment of the requirements for the degree of Master of Philosophy in Science, School of Engineering and Advanced Technology, Massey University, Palmerston North, New Zealand . (Thesis). Massey University. Retrieved from http://hdl.handle.net/10179/11569

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

McLachlan, Scott. “Realism in synthetic data generation : a thesis presented in fulfilment of the requirements for the degree of Master of Philosophy in Science, School of Engineering and Advanced Technology, Massey University, Palmerston North, New Zealand .” 2017. Thesis, Massey University. Accessed November 11, 2019. http://hdl.handle.net/10179/11569.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

McLachlan, Scott. “Realism in synthetic data generation : a thesis presented in fulfilment of the requirements for the degree of Master of Philosophy in Science, School of Engineering and Advanced Technology, Massey University, Palmerston North, New Zealand .” 2017. Web. 11 Nov 2019.

Vancouver:

McLachlan S. Realism in synthetic data generation : a thesis presented in fulfilment of the requirements for the degree of Master of Philosophy in Science, School of Engineering and Advanced Technology, Massey University, Palmerston North, New Zealand . [Internet] [Thesis]. Massey University; 2017. [cited 2019 Nov 11]. Available from: http://hdl.handle.net/10179/11569.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

McLachlan S. Realism in synthetic data generation : a thesis presented in fulfilment of the requirements for the degree of Master of Philosophy in Science, School of Engineering and Advanced Technology, Massey University, Palmerston North, New Zealand . [Thesis]. Massey University; 2017. Available from: http://hdl.handle.net/10179/11569

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Minnesota

13. Mandagere, Nagapramod. Techniques for Optimizing Cost of Enterprise Data Management.

Degree: PhD, Computer Science, 2015, University of Minnesota

 Rapid adoption of data driven decision making, Internet of Things (IoT), mass digitization of content have led to unprecedented changes in data storage requirements. From… (more)

Subjects/Keywords: CDP; Continuous Data Protection; Data Protection; MAID; Storage power management

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mandagere, N. (2015). Techniques for Optimizing Cost of Enterprise Data Management. (Doctoral Dissertation). University of Minnesota. Retrieved from http://hdl.handle.net/11299/177133

Chicago Manual of Style (16th Edition):

Mandagere, Nagapramod. “Techniques for Optimizing Cost of Enterprise Data Management.” 2015. Doctoral Dissertation, University of Minnesota. Accessed November 11, 2019. http://hdl.handle.net/11299/177133.

MLA Handbook (7th Edition):

Mandagere, Nagapramod. “Techniques for Optimizing Cost of Enterprise Data Management.” 2015. Web. 11 Nov 2019.

Vancouver:

Mandagere N. Techniques for Optimizing Cost of Enterprise Data Management. [Internet] [Doctoral dissertation]. University of Minnesota; 2015. [cited 2019 Nov 11]. Available from: http://hdl.handle.net/11299/177133.

Council of Science Editors:

Mandagere N. Techniques for Optimizing Cost of Enterprise Data Management. [Doctoral Dissertation]. University of Minnesota; 2015. Available from: http://hdl.handle.net/11299/177133


University of South Africa

14. London, Ray William. Comparative data protection and security : a critical evealuation of legal standards .

Degree: 2014, University of South Africa

 This study1 addresses the key information technology issues of the age and its unintended consequences. The issues include social control by businesses, governments, and information… (more)

Subjects/Keywords: Australia data protection; Canada data protection; Comparative law privacy or data protection; Data protection; Data security; Information privacy; Information privacy laws; Information technology; International data; Protection legal standards; Social control; Sciolegal information privacy,; South Africa data protection; United Kingdom; United States information protection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

London, R. W. (2014). Comparative data protection and security : a critical evealuation of legal standards . (Doctoral Dissertation). University of South Africa. Retrieved from http://hdl.handle.net/10500/13859

Chicago Manual of Style (16th Edition):

London, Ray William. “Comparative data protection and security : a critical evealuation of legal standards .” 2014. Doctoral Dissertation, University of South Africa. Accessed November 11, 2019. http://hdl.handle.net/10500/13859.

MLA Handbook (7th Edition):

London, Ray William. “Comparative data protection and security : a critical evealuation of legal standards .” 2014. Web. 11 Nov 2019.

Vancouver:

London RW. Comparative data protection and security : a critical evealuation of legal standards . [Internet] [Doctoral dissertation]. University of South Africa; 2014. [cited 2019 Nov 11]. Available from: http://hdl.handle.net/10500/13859.

Council of Science Editors:

London RW. Comparative data protection and security : a critical evealuation of legal standards . [Doctoral Dissertation]. University of South Africa; 2014. Available from: http://hdl.handle.net/10500/13859


Deakin University

15. Ninggal, Mohd Izuan Hafez. Privacy-preserving mechanism for social network data publishing.

Degree: 2015, Deakin University

  Privacy is receiving growing concern from various parties especially consumers due to the simplification of the collection and distribution of personal data. This research focuses… (more)

Subjects/Keywords: privacy protection; personal data; social network data publishing; data anonymization mechanism

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ninggal, M. I. H. (2015). Privacy-preserving mechanism for social network data publishing. (Thesis). Deakin University. Retrieved from http://hdl.handle.net/10536/DRO/DU:30082967

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ninggal, Mohd Izuan Hafez. “Privacy-preserving mechanism for social network data publishing.” 2015. Thesis, Deakin University. Accessed November 11, 2019. http://hdl.handle.net/10536/DRO/DU:30082967.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ninggal, Mohd Izuan Hafez. “Privacy-preserving mechanism for social network data publishing.” 2015. Web. 11 Nov 2019.

Vancouver:

Ninggal MIH. Privacy-preserving mechanism for social network data publishing. [Internet] [Thesis]. Deakin University; 2015. [cited 2019 Nov 11]. Available from: http://hdl.handle.net/10536/DRO/DU:30082967.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ninggal MIH. Privacy-preserving mechanism for social network data publishing. [Thesis]. Deakin University; 2015. Available from: http://hdl.handle.net/10536/DRO/DU:30082967

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

16. Sun, Zongji. Face de-identification for privacy protection.

Degree: PhD, 2019, University of Hertfordshire

 The ability to record, store and analyse images of faces economically, rapidly and on a vast scale brings people's attention to privacy. The current privacy… (more)

Subjects/Keywords: 006.3; face de-identification; data protection; privacy protection; face synthesis

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sun, Z. (2019). Face de-identification for privacy protection. (Doctoral Dissertation). University of Hertfordshire. Retrieved from http://hdl.handle.net/2299/21270

Chicago Manual of Style (16th Edition):

Sun, Zongji. “Face de-identification for privacy protection.” 2019. Doctoral Dissertation, University of Hertfordshire. Accessed November 11, 2019. http://hdl.handle.net/2299/21270.

MLA Handbook (7th Edition):

Sun, Zongji. “Face de-identification for privacy protection.” 2019. Web. 11 Nov 2019.

Vancouver:

Sun Z. Face de-identification for privacy protection. [Internet] [Doctoral dissertation]. University of Hertfordshire; 2019. [cited 2019 Nov 11]. Available from: http://hdl.handle.net/2299/21270.

Council of Science Editors:

Sun Z. Face de-identification for privacy protection. [Doctoral Dissertation]. University of Hertfordshire; 2019. Available from: http://hdl.handle.net/2299/21270


Nelson Mandela Metropolitan University

17. Gaadingwe, Tshepo Gaadingwe. A critical review of the IFIP TC11 Security Conference Series.

Degree: MTech, Faculty of Engineering, the Built Environment and Information Technology, 2007, Nelson Mandela Metropolitan University

 Over the past few decades the field of computing has grown and evolved. In this time, information security research has experienced the same type of… (more)

Subjects/Keywords: Database security; Data protection; Computers  – Access control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gaadingwe, T. G. (2007). A critical review of the IFIP TC11 Security Conference Series. (Masters Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/507

Chicago Manual of Style (16th Edition):

Gaadingwe, Tshepo Gaadingwe. “A critical review of the IFIP TC11 Security Conference Series.” 2007. Masters Thesis, Nelson Mandela Metropolitan University. Accessed November 11, 2019. http://hdl.handle.net/10948/507.

MLA Handbook (7th Edition):

Gaadingwe, Tshepo Gaadingwe. “A critical review of the IFIP TC11 Security Conference Series.” 2007. Web. 11 Nov 2019.

Vancouver:

Gaadingwe TG. A critical review of the IFIP TC11 Security Conference Series. [Internet] [Masters thesis]. Nelson Mandela Metropolitan University; 2007. [cited 2019 Nov 11]. Available from: http://hdl.handle.net/10948/507.

Council of Science Editors:

Gaadingwe TG. A critical review of the IFIP TC11 Security Conference Series. [Masters Thesis]. Nelson Mandela Metropolitan University; 2007. Available from: http://hdl.handle.net/10948/507


Nelson Mandela Metropolitan University

18. Reid, Rayne. A brain-compatible approach to the presentation of cyber security educational material.

Degree: MTech, Faculty of Engineering, the Built Environment and Information Technology, 2012, Nelson Mandela Metropolitan University

 Information is an extremely important asset in modern society. It is used in most daily activities and transactions, and, thus, the importance of information is… (more)

Subjects/Keywords: Data protection  – Management; Computer security  – Management

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Reid, R. (2012). A brain-compatible approach to the presentation of cyber security educational material. (Masters Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/d1019895

Chicago Manual of Style (16th Edition):

Reid, Rayne. “A brain-compatible approach to the presentation of cyber security educational material.” 2012. Masters Thesis, Nelson Mandela Metropolitan University. Accessed November 11, 2019. http://hdl.handle.net/10948/d1019895.

MLA Handbook (7th Edition):

Reid, Rayne. “A brain-compatible approach to the presentation of cyber security educational material.” 2012. Web. 11 Nov 2019.

Vancouver:

Reid R. A brain-compatible approach to the presentation of cyber security educational material. [Internet] [Masters thesis]. Nelson Mandela Metropolitan University; 2012. [cited 2019 Nov 11]. Available from: http://hdl.handle.net/10948/d1019895.

Council of Science Editors:

Reid R. A brain-compatible approach to the presentation of cyber security educational material. [Masters Thesis]. Nelson Mandela Metropolitan University; 2012. Available from: http://hdl.handle.net/10948/d1019895


Nelson Mandela Metropolitan University

19. Maninjwa, Prosecutor Mvikeli. Managing an information security policy architecture : a technical documentation perspective.

Degree: MTech, Faculty of Engineering, the Built Environment and Information Technology, 2012, Nelson Mandela Metropolitan University

 Information and the related assets form critical business assets for most organizations. Organizations depend on their information assets to survive and to remain competitive. However,… (more)

Subjects/Keywords: Computer security  – Management; Computer architecture; Data protection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Maninjwa, P. M. (2012). Managing an information security policy architecture : a technical documentation perspective. (Masters Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/d1020757

Chicago Manual of Style (16th Edition):

Maninjwa, Prosecutor Mvikeli. “Managing an information security policy architecture : a technical documentation perspective.” 2012. Masters Thesis, Nelson Mandela Metropolitan University. Accessed November 11, 2019. http://hdl.handle.net/10948/d1020757.

MLA Handbook (7th Edition):

Maninjwa, Prosecutor Mvikeli. “Managing an information security policy architecture : a technical documentation perspective.” 2012. Web. 11 Nov 2019.

Vancouver:

Maninjwa PM. Managing an information security policy architecture : a technical documentation perspective. [Internet] [Masters thesis]. Nelson Mandela Metropolitan University; 2012. [cited 2019 Nov 11]. Available from: http://hdl.handle.net/10948/d1020757.

Council of Science Editors:

Maninjwa PM. Managing an information security policy architecture : a technical documentation perspective. [Masters Thesis]. Nelson Mandela Metropolitan University; 2012. Available from: http://hdl.handle.net/10948/d1020757


RMIT University

20. Ahmad, T. Global and local feature-based transformations for fingerprint data protection.

Degree: 2012, RMIT University

 Due to its non-shareable characteristic, biometrics has been widely implemented for authenticating users. This characteristic asserts that biometrics meets the non-repudiation requirement which is one… (more)

Subjects/Keywords: Fields of Research; Fingerprint; biometrics; data protection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ahmad, T. (2012). Global and local feature-based transformations for fingerprint data protection. (Thesis). RMIT University. Retrieved from http://researchbank.rmit.edu.au/view/rmit:160073

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ahmad, T. “Global and local feature-based transformations for fingerprint data protection.” 2012. Thesis, RMIT University. Accessed November 11, 2019. http://researchbank.rmit.edu.au/view/rmit:160073.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ahmad, T. “Global and local feature-based transformations for fingerprint data protection.” 2012. Web. 11 Nov 2019.

Vancouver:

Ahmad T. Global and local feature-based transformations for fingerprint data protection. [Internet] [Thesis]. RMIT University; 2012. [cited 2019 Nov 11]. Available from: http://researchbank.rmit.edu.au/view/rmit:160073.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ahmad T. Global and local feature-based transformations for fingerprint data protection. [Thesis]. RMIT University; 2012. Available from: http://researchbank.rmit.edu.au/view/rmit:160073

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Nelson Mandela Metropolitan University

21. Boshoff, Ryno. A baseline for information security knowledge for end users.

Degree: Faculty of Engineering, the Built Environment and Information Technology, 2012, Nelson Mandela Metropolitan University

 Information plays a vast contributing role to all resources within an organisation. Organisations should recognise the importance of information and implement information security controls to… (more)

Subjects/Keywords: Data protection  – Management; Computer security  – Management

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Boshoff, R. (2012). A baseline for information security knowledge for end users. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/d1013260

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Boshoff, Ryno. “A baseline for information security knowledge for end users.” 2012. Thesis, Nelson Mandela Metropolitan University. Accessed November 11, 2019. http://hdl.handle.net/10948/d1013260.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Boshoff, Ryno. “A baseline for information security knowledge for end users.” 2012. Web. 11 Nov 2019.

Vancouver:

Boshoff R. A baseline for information security knowledge for end users. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2012. [cited 2019 Nov 11]. Available from: http://hdl.handle.net/10948/d1013260.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Boshoff R. A baseline for information security knowledge for end users. [Thesis]. Nelson Mandela Metropolitan University; 2012. Available from: http://hdl.handle.net/10948/d1013260

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Nelson Mandela Metropolitan University

22. Deysel, Natasha. A model for information security control audit for small to mid-sized organisations.

Degree: Faculty of Engineering, the Built Environment and Information Technology, 2009, Nelson Mandela Metropolitan University

 Organisations are increasingly dependent on their information. Compromise to this information in terms of loss, inaccuracy or competitors gaining unauthorised access could have devastating consequences… (more)

Subjects/Keywords: Data protection; Computer networks  – Information technology

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Deysel, N. (2009). A model for information security control audit for small to mid-sized organisations. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/940

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Deysel, Natasha. “A model for information security control audit for small to mid-sized organisations.” 2009. Thesis, Nelson Mandela Metropolitan University. Accessed November 11, 2019. http://hdl.handle.net/10948/940.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Deysel, Natasha. “A model for information security control audit for small to mid-sized organisations.” 2009. Web. 11 Nov 2019.

Vancouver:

Deysel N. A model for information security control audit for small to mid-sized organisations. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2009. [cited 2019 Nov 11]. Available from: http://hdl.handle.net/10948/940.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Deysel N. A model for information security control audit for small to mid-sized organisations. [Thesis]. Nelson Mandela Metropolitan University; 2009. Available from: http://hdl.handle.net/10948/940

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Hong Kong University of Science and Technology

23. Hong, Dan. Sharing private data in online social networks.

Degree: 2009, Hong Kong University of Science and Technology

 With the development of Web 2.0 and sensing technologies, private information such as email messages, health records, discussion histories, could be obtained by Web visitors… (more)

Subjects/Keywords: Online social networks  – Management; Data protection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hong, D. (2009). Sharing private data in online social networks. (Thesis). Hong Kong University of Science and Technology. Retrieved from https://doi.org/10.14711/thesis-b1070834 ; http://repository.ust.hk/ir/bitstream/1783.1-6325/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hong, Dan. “Sharing private data in online social networks.” 2009. Thesis, Hong Kong University of Science and Technology. Accessed November 11, 2019. https://doi.org/10.14711/thesis-b1070834 ; http://repository.ust.hk/ir/bitstream/1783.1-6325/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hong, Dan. “Sharing private data in online social networks.” 2009. Web. 11 Nov 2019.

Vancouver:

Hong D. Sharing private data in online social networks. [Internet] [Thesis]. Hong Kong University of Science and Technology; 2009. [cited 2019 Nov 11]. Available from: https://doi.org/10.14711/thesis-b1070834 ; http://repository.ust.hk/ir/bitstream/1783.1-6325/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hong D. Sharing private data in online social networks. [Thesis]. Hong Kong University of Science and Technology; 2009. Available from: https://doi.org/10.14711/thesis-b1070834 ; http://repository.ust.hk/ir/bitstream/1783.1-6325/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Hong Kong

24. Cui, Xingmin. Data privacy of Android applications and name privacy of NDN.

Degree: PhD, 2016, University of Hong Kong

 We get used to the concept that Personal Computers are connected via IP-based Internet to communicate and share content with each other. But nowadays two… (more)

Subjects/Keywords: Computer networks - Security measures; Data protection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cui, X. (2016). Data privacy of Android applications and name privacy of NDN. (Doctoral Dissertation). University of Hong Kong. Retrieved from http://hdl.handle.net/10722/236581

Chicago Manual of Style (16th Edition):

Cui, Xingmin. “Data privacy of Android applications and name privacy of NDN.” 2016. Doctoral Dissertation, University of Hong Kong. Accessed November 11, 2019. http://hdl.handle.net/10722/236581.

MLA Handbook (7th Edition):

Cui, Xingmin. “Data privacy of Android applications and name privacy of NDN.” 2016. Web. 11 Nov 2019.

Vancouver:

Cui X. Data privacy of Android applications and name privacy of NDN. [Internet] [Doctoral dissertation]. University of Hong Kong; 2016. [cited 2019 Nov 11]. Available from: http://hdl.handle.net/10722/236581.

Council of Science Editors:

Cui X. Data privacy of Android applications and name privacy of NDN. [Doctoral Dissertation]. University of Hong Kong; 2016. Available from: http://hdl.handle.net/10722/236581


Nelson Mandela Metropolitan University

25. Jansson, Kenny. A model for cultivating resistance to social engineering attacks.

Degree: Faculty of Engineering, the Built Environment and Information Technology, 2011, Nelson Mandela Metropolitan University

 The human being is commonly considered as being the weakest link in information security. Subsequently, as information is one of the most critical assets in… (more)

Subjects/Keywords: Computer security; Data protection; Human-computer interaction

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jansson, K. (2011). A model for cultivating resistance to social engineering attacks. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/1588

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Jansson, Kenny. “A model for cultivating resistance to social engineering attacks.” 2011. Thesis, Nelson Mandela Metropolitan University. Accessed November 11, 2019. http://hdl.handle.net/10948/1588.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Jansson, Kenny. “A model for cultivating resistance to social engineering attacks.” 2011. Web. 11 Nov 2019.

Vancouver:

Jansson K. A model for cultivating resistance to social engineering attacks. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2011. [cited 2019 Nov 11]. Available from: http://hdl.handle.net/10948/1588.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Jansson K. A model for cultivating resistance to social engineering attacks. [Thesis]. Nelson Mandela Metropolitan University; 2011. Available from: http://hdl.handle.net/10948/1588

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Queen Mary, University of London

26. Möller, Carolin. The evolution of data protection and privacy in the public security context : an institutional analysis of three EU data retention and access regimes.

Degree: PhD, 2017, Queen Mary, University of London

 Since nearly two decades threats to public security through events such as 9/11, the Madrid (2004) and London (2005) bombings and more recently the Paris… (more)

Subjects/Keywords: Law; Data protection; Privacy; Terrorism; public security.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Möller, C. (2017). The evolution of data protection and privacy in the public security context : an institutional analysis of three EU data retention and access regimes. (Doctoral Dissertation). Queen Mary, University of London. Retrieved from http://qmro.qmul.ac.uk/xmlui/handle/123456789/25911 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.765979

Chicago Manual of Style (16th Edition):

Möller, Carolin. “The evolution of data protection and privacy in the public security context : an institutional analysis of three EU data retention and access regimes.” 2017. Doctoral Dissertation, Queen Mary, University of London. Accessed November 11, 2019. http://qmro.qmul.ac.uk/xmlui/handle/123456789/25911 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.765979.

MLA Handbook (7th Edition):

Möller, Carolin. “The evolution of data protection and privacy in the public security context : an institutional analysis of three EU data retention and access regimes.” 2017. Web. 11 Nov 2019.

Vancouver:

Möller C. The evolution of data protection and privacy in the public security context : an institutional analysis of three EU data retention and access regimes. [Internet] [Doctoral dissertation]. Queen Mary, University of London; 2017. [cited 2019 Nov 11]. Available from: http://qmro.qmul.ac.uk/xmlui/handle/123456789/25911 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.765979.

Council of Science Editors:

Möller C. The evolution of data protection and privacy in the public security context : an institutional analysis of three EU data retention and access regimes. [Doctoral Dissertation]. Queen Mary, University of London; 2017. Available from: http://qmro.qmul.ac.uk/xmlui/handle/123456789/25911 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.765979


Universidad Nacional de La Plata

27. Corvi, Javier Omar. Componente genérico de auditoría para monitorear cambios en el modelo de objetos.

Degree: 2011, Universidad Nacional de La Plata

En las aplicaciones de software que manejan información crítica, la seguridad y la auditoría de la misma es un requerimiento obligatorio a la hora de… (more)

Subjects/Keywords: Ciencias Informáticas; Security and Protection; Data models

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Corvi, J. O. (2011). Componente genérico de auditoría para monitorear cambios en el modelo de objetos. (Thesis). Universidad Nacional de La Plata. Retrieved from http://hdl.handle.net/10915/46919

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Corvi, Javier Omar. “Componente genérico de auditoría para monitorear cambios en el modelo de objetos.” 2011. Thesis, Universidad Nacional de La Plata. Accessed November 11, 2019. http://hdl.handle.net/10915/46919.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Corvi, Javier Omar. “Componente genérico de auditoría para monitorear cambios en el modelo de objetos.” 2011. Web. 11 Nov 2019.

Vancouver:

Corvi JO. Componente genérico de auditoría para monitorear cambios en el modelo de objetos. [Internet] [Thesis]. Universidad Nacional de La Plata; 2011. [cited 2019 Nov 11]. Available from: http://hdl.handle.net/10915/46919.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Corvi JO. Componente genérico de auditoría para monitorear cambios en el modelo de objetos. [Thesis]. Universidad Nacional de La Plata; 2011. Available from: http://hdl.handle.net/10915/46919

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

28. Pottas, Dalenca. The automatic generation of information security profiles.

Degree: 2014, University of Johannesburg

D.Phil. (Computer Science)

Security needs have changed considerably in the past decade as the economics of computer usage necessitates increased business reliance on computers. As… (more)

Subjects/Keywords: Computers - Access control; Data protection; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pottas, D. (2014). The automatic generation of information security profiles. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/12333

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Pottas, Dalenca. “The automatic generation of information security profiles.” 2014. Thesis, University of Johannesburg. Accessed November 11, 2019. http://hdl.handle.net/10210/12333.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Pottas, Dalenca. “The automatic generation of information security profiles.” 2014. Web. 11 Nov 2019.

Vancouver:

Pottas D. The automatic generation of information security profiles. [Internet] [Thesis]. University of Johannesburg; 2014. [cited 2019 Nov 11]. Available from: http://hdl.handle.net/10210/12333.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Pottas D. The automatic generation of information security profiles. [Thesis]. University of Johannesburg; 2014. Available from: http://hdl.handle.net/10210/12333

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

29. Van Heerden, Chris. Packaged software : security and controls audit review.

Degree: 2015, University of Johannesburg

M.Com.

In recent years large organisations that developed mainframe application software in-house are now purchasing software packages to replace these applications. These advanced packages incorporate… (more)

Subjects/Keywords: Auditing - Data processing; Software protection; Database security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Van Heerden, C. (2015). Packaged software : security and controls audit review. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/14536

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Van Heerden, Chris. “Packaged software : security and controls audit review.” 2015. Thesis, University of Johannesburg. Accessed November 11, 2019. http://hdl.handle.net/10210/14536.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Van Heerden, Chris. “Packaged software : security and controls audit review.” 2015. Web. 11 Nov 2019.

Vancouver:

Van Heerden C. Packaged software : security and controls audit review. [Internet] [Thesis]. University of Johannesburg; 2015. [cited 2019 Nov 11]. Available from: http://hdl.handle.net/10210/14536.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Van Heerden C. Packaged software : security and controls audit review. [Thesis]. University of Johannesburg; 2015. Available from: http://hdl.handle.net/10210/14536

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

30. Pretorius, Maria Rebecca. Application of the access path model with specific reference to the SAP R/3 environment.

Degree: 2014, University of Johannesburg

M.Com. (Computer Auditing)

The management and control of modern day computer systems are becoming more and more trying due to the complexity of systems. This… (more)

Subjects/Keywords: Computer security; Data protection; Computers - Access control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pretorius, M. R. (2014). Application of the access path model with specific reference to the SAP R/3 environment. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/12328

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Pretorius, Maria Rebecca. “Application of the access path model with specific reference to the SAP R/3 environment.” 2014. Thesis, University of Johannesburg. Accessed November 11, 2019. http://hdl.handle.net/10210/12328.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Pretorius, Maria Rebecca. “Application of the access path model with specific reference to the SAP R/3 environment.” 2014. Web. 11 Nov 2019.

Vancouver:

Pretorius MR. Application of the access path model with specific reference to the SAP R/3 environment. [Internet] [Thesis]. University of Johannesburg; 2014. [cited 2019 Nov 11]. Available from: http://hdl.handle.net/10210/12328.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Pretorius MR. Application of the access path model with specific reference to the SAP R/3 environment. [Thesis]. University of Johannesburg; 2014. Available from: http://hdl.handle.net/10210/12328

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2] [3] [4] [5] … [23]

.