Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(information security governance). Showing records 1 – 30 of 37 total matches.

[1] [2]

Search Limiters

Last 2 Years | English Only

▼ Search Limiters


University of Sydney

1. Soyref, Maxim. The holistic management of information security processes .

Degree: 2014, University of Sydney

 Title: The holistic management of information security processes Keywords: cybersecurity, information security, strategy, security process, security governance, security management This research examines information security management… (more)

Subjects/Keywords: Cybersecurity; Information security; Strategy; Security process; Security governance; Security management

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Soyref, M. (2014). The holistic management of information security processes . (Thesis). University of Sydney. Retrieved from http://hdl.handle.net/2123/13373

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Soyref, Maxim. “The holistic management of information security processes .” 2014. Thesis, University of Sydney. Accessed April 02, 2020. http://hdl.handle.net/2123/13373.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Soyref, Maxim. “The holistic management of information security processes .” 2014. Web. 02 Apr 2020.

Vancouver:

Soyref M. The holistic management of information security processes . [Internet] [Thesis]. University of Sydney; 2014. [cited 2020 Apr 02]. Available from: http://hdl.handle.net/2123/13373.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Soyref M. The holistic management of information security processes . [Thesis]. University of Sydney; 2014. Available from: http://hdl.handle.net/2123/13373

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Nairobi

2. Mbithi, Nicholas M. An information security governance framework for the public Sector in Kenya .

Degree: 2012, University of Nairobi

 One of the main assets of any institution, be it a private company or a government institution, is information. This being the case, it is… (more)

Subjects/Keywords: information security; governance framework; public Sector; Kenya

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mbithi, N. M. (2012). An information security governance framework for the public Sector in Kenya . (Thesis). University of Nairobi. Retrieved from http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/10315

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Mbithi, Nicholas M. “An information security governance framework for the public Sector in Kenya .” 2012. Thesis, University of Nairobi. Accessed April 02, 2020. http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/10315.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Mbithi, Nicholas M. “An information security governance framework for the public Sector in Kenya .” 2012. Web. 02 Apr 2020.

Vancouver:

Mbithi NM. An information security governance framework for the public Sector in Kenya . [Internet] [Thesis]. University of Nairobi; 2012. [cited 2020 Apr 02]. Available from: http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/10315.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Mbithi NM. An information security governance framework for the public Sector in Kenya . [Thesis]. University of Nairobi; 2012. Available from: http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/10315

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rochester Institute of Technology

3. Dass, Sourabh. Security practices: A Mixed approach.

Degree: MS, Computer Science (GCCIS), 2010, Rochester Institute of Technology

  Consistency of information is ideally maintained by adhering to the best practices and policies. However, statistics show trends of rising threats in information security(more)

Subjects/Keywords: Information security; Information technology; Mixed methods approach; Research; Security governance; Thesis

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dass, S. (2010). Security practices: A Mixed approach. (Masters Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/148

Chicago Manual of Style (16th Edition):

Dass, Sourabh. “Security practices: A Mixed approach.” 2010. Masters Thesis, Rochester Institute of Technology. Accessed April 02, 2020. https://scholarworks.rit.edu/theses/148.

MLA Handbook (7th Edition):

Dass, Sourabh. “Security practices: A Mixed approach.” 2010. Web. 02 Apr 2020.

Vancouver:

Dass S. Security practices: A Mixed approach. [Internet] [Masters thesis]. Rochester Institute of Technology; 2010. [cited 2020 Apr 02]. Available from: https://scholarworks.rit.edu/theses/148.

Council of Science Editors:

Dass S. Security practices: A Mixed approach. [Masters Thesis]. Rochester Institute of Technology; 2010. Available from: https://scholarworks.rit.edu/theses/148


University of South Africa

4. Basani, Mandla. Towards a framework to ensure alignment among information security professionals, ICT security auditors and regulatory officials in implementing information security in South Africa .

Degree: 2012, University of South Africa

Information security in the form of IT governance is part of corporate governance. Corporate governance requires that structures and processes are in place with appropriate… (more)

Subjects/Keywords: Information security professionals,; ICT security auditors,; Regulatory officials; Framework; Role players; Information security programme; Corporate governance; IT governance; COBIT

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Basani, M. (2012). Towards a framework to ensure alignment among information security professionals, ICT security auditors and regulatory officials in implementing information security in South Africa . (Masters Thesis). University of South Africa. Retrieved from http://hdl.handle.net/10500/9300

Chicago Manual of Style (16th Edition):

Basani, Mandla. “Towards a framework to ensure alignment among information security professionals, ICT security auditors and regulatory officials in implementing information security in South Africa .” 2012. Masters Thesis, University of South Africa. Accessed April 02, 2020. http://hdl.handle.net/10500/9300.

MLA Handbook (7th Edition):

Basani, Mandla. “Towards a framework to ensure alignment among information security professionals, ICT security auditors and regulatory officials in implementing information security in South Africa .” 2012. Web. 02 Apr 2020.

Vancouver:

Basani M. Towards a framework to ensure alignment among information security professionals, ICT security auditors and regulatory officials in implementing information security in South Africa . [Internet] [Masters thesis]. University of South Africa; 2012. [cited 2020 Apr 02]. Available from: http://hdl.handle.net/10500/9300.

Council of Science Editors:

Basani M. Towards a framework to ensure alignment among information security professionals, ICT security auditors and regulatory officials in implementing information security in South Africa . [Masters Thesis]. University of South Africa; 2012. Available from: http://hdl.handle.net/10500/9300


UCLA

5. Chamberland, Kristen. Contextualizing Institutional IT Policy: A Historical Narrative of UCLA’s Policymaking Environment.

Degree: Information Studies, 2016, UCLA

Information technology (IT) policymaking in higher education is often an ad hoc process,responding to crises, rather than taking a proactive approach based on a clear… (more)

Subjects/Keywords: Information science; data governance; data security; information privacy; information technology policy; institutional values; stakeholder relationships

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chamberland, K. (2016). Contextualizing Institutional IT Policy: A Historical Narrative of UCLA’s Policymaking Environment. (Thesis). UCLA. Retrieved from http://www.escholarship.org/uc/item/0160r7kr

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chamberland, Kristen. “Contextualizing Institutional IT Policy: A Historical Narrative of UCLA’s Policymaking Environment.” 2016. Thesis, UCLA. Accessed April 02, 2020. http://www.escholarship.org/uc/item/0160r7kr.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chamberland, Kristen. “Contextualizing Institutional IT Policy: A Historical Narrative of UCLA’s Policymaking Environment.” 2016. Web. 02 Apr 2020.

Vancouver:

Chamberland K. Contextualizing Institutional IT Policy: A Historical Narrative of UCLA’s Policymaking Environment. [Internet] [Thesis]. UCLA; 2016. [cited 2020 Apr 02]. Available from: http://www.escholarship.org/uc/item/0160r7kr.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chamberland K. Contextualizing Institutional IT Policy: A Historical Narrative of UCLA’s Policymaking Environment. [Thesis]. UCLA; 2016. Available from: http://www.escholarship.org/uc/item/0160r7kr

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


KTH

6. Farnian, Adnan. Assessing The Relative Importance of Information Security Governance Processes on Reducing Negative Impacts From Information Security Incidents.

Degree: Industrial Information and Control Systems, 2010, KTH

  Today the extent and value of electronic data is constantly growing. Dealing across the internet depends on how secure consumers believe their personal data… (more)

Subjects/Keywords: Information Technology; Information Security; Information Security Governance

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Farnian, A. (2010). Assessing The Relative Importance of Information Security Governance Processes on Reducing Negative Impacts From Information Security Incidents. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-81417

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Farnian, Adnan. “Assessing The Relative Importance of Information Security Governance Processes on Reducing Negative Impacts From Information Security Incidents.” 2010. Thesis, KTH. Accessed April 02, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-81417.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Farnian, Adnan. “Assessing The Relative Importance of Information Security Governance Processes on Reducing Negative Impacts From Information Security Incidents.” 2010. Web. 02 Apr 2020.

Vancouver:

Farnian A. Assessing The Relative Importance of Information Security Governance Processes on Reducing Negative Impacts From Information Security Incidents. [Internet] [Thesis]. KTH; 2010. [cited 2020 Apr 02]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-81417.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Farnian A. Assessing The Relative Importance of Information Security Governance Processes on Reducing Negative Impacts From Information Security Incidents. [Thesis]. KTH; 2010. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-81417

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Virginia Commonwealth University

7. Nasution, Muhamad Faisal Fariduddin Attar. Institutionalization of Information Security: Case of the Indonesian Banking Sector.

Degree: PhD, Information Systems, 2012, Virginia Commonwealth University

 This study focuses on the institutionalization of information security in the banking sector. This study is important to pursue since it explicates the internalization of… (more)

Subjects/Keywords: Information Systems Security; Information Security Governance; Institutionalization; Institutional Theory; Structuration Theory; Banking Sector; Business; Management Information Systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nasution, M. F. F. A. (2012). Institutionalization of Information Security: Case of the Indonesian Banking Sector. (Doctoral Dissertation). Virginia Commonwealth University. Retrieved from https://doi.org/10.25772/X39B-JC68 ; https://scholarscompass.vcu.edu/etd/2825

Chicago Manual of Style (16th Edition):

Nasution, Muhamad Faisal Fariduddin Attar. “Institutionalization of Information Security: Case of the Indonesian Banking Sector.” 2012. Doctoral Dissertation, Virginia Commonwealth University. Accessed April 02, 2020. https://doi.org/10.25772/X39B-JC68 ; https://scholarscompass.vcu.edu/etd/2825.

MLA Handbook (7th Edition):

Nasution, Muhamad Faisal Fariduddin Attar. “Institutionalization of Information Security: Case of the Indonesian Banking Sector.” 2012. Web. 02 Apr 2020.

Vancouver:

Nasution MFFA. Institutionalization of Information Security: Case of the Indonesian Banking Sector. [Internet] [Doctoral dissertation]. Virginia Commonwealth University; 2012. [cited 2020 Apr 02]. Available from: https://doi.org/10.25772/X39B-JC68 ; https://scholarscompass.vcu.edu/etd/2825.

Council of Science Editors:

Nasution MFFA. Institutionalization of Information Security: Case of the Indonesian Banking Sector. [Doctoral Dissertation]. Virginia Commonwealth University; 2012. Available from: https://doi.org/10.25772/X39B-JC68 ; https://scholarscompass.vcu.edu/etd/2825


University of Wolverhampton

8. Simmons, Andrea C. Tackling the barriers to achieving Information Assurance.

Degree: PhD, 2017, University of Wolverhampton

 This original, reflective practitioner study researched whether professionalising IA could be successfully achieved, in line with the UK Cyber Security Strategy expectations. The context was… (more)

Subjects/Keywords: 005.8; Information Assurance (IA); IA Professionalism; IA Practitioner; Governance; Risk and Compliance (GRC); Information Security; Cyber Security; History of Information Assurance

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Simmons, A. C. (2017). Tackling the barriers to achieving Information Assurance. (Doctoral Dissertation). University of Wolverhampton. Retrieved from http://hdl.handle.net/2436/621031

Chicago Manual of Style (16th Edition):

Simmons, Andrea C. “Tackling the barriers to achieving Information Assurance.” 2017. Doctoral Dissertation, University of Wolverhampton. Accessed April 02, 2020. http://hdl.handle.net/2436/621031.

MLA Handbook (7th Edition):

Simmons, Andrea C. “Tackling the barriers to achieving Information Assurance.” 2017. Web. 02 Apr 2020.

Vancouver:

Simmons AC. Tackling the barriers to achieving Information Assurance. [Internet] [Doctoral dissertation]. University of Wolverhampton; 2017. [cited 2020 Apr 02]. Available from: http://hdl.handle.net/2436/621031.

Council of Science Editors:

Simmons AC. Tackling the barriers to achieving Information Assurance. [Doctoral Dissertation]. University of Wolverhampton; 2017. Available from: http://hdl.handle.net/2436/621031


East Carolina University

9. Vail, John Edwards. Small Business Information Security.

Degree: 2012, East Carolina University

 Small businesses account for over fifty percent of the Gross National Product of the U.S. economy; and the security of their information systems is critical… (more)

Subjects/Keywords: Information technology; Information security; Information technology management; Information technology policy; IT due diligence; IT governance; Small business information security; Small business – Technological innovations; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Vail, J. E. (2012). Small Business Information Security. (Thesis). East Carolina University. Retrieved from http://hdl.handle.net/10342/3889

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Vail, John Edwards. “Small Business Information Security.” 2012. Thesis, East Carolina University. Accessed April 02, 2020. http://hdl.handle.net/10342/3889.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Vail, John Edwards. “Small Business Information Security.” 2012. Web. 02 Apr 2020.

Vancouver:

Vail JE. Small Business Information Security. [Internet] [Thesis]. East Carolina University; 2012. [cited 2020 Apr 02]. Available from: http://hdl.handle.net/10342/3889.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Vail JE. Small Business Information Security. [Thesis]. East Carolina University; 2012. Available from: http://hdl.handle.net/10342/3889

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Queensland University of Technology

10. Branagan, Mark Allan. A risk simulation framework for information infrastructure protection.

Degree: 2012, Queensland University of Technology

Information communication and technology (ICT) systems are almost ubiquitous in the modern world. It is hard to identify any industry, or for that matter any… (more)

Subjects/Keywords: information security risk assessment, risk simulation, information infrastructure risk assessment, information infrastructure information security, risk, information security, compliance auditing, complex systems risk assessment, governance; critical infrastructure information security, information security documentation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Branagan, M. A. (2012). A risk simulation framework for information infrastructure protection. (Thesis). Queensland University of Technology. Retrieved from https://eprints.qut.edu.au/51006/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Branagan, Mark Allan. “A risk simulation framework for information infrastructure protection.” 2012. Thesis, Queensland University of Technology. Accessed April 02, 2020. https://eprints.qut.edu.au/51006/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Branagan, Mark Allan. “A risk simulation framework for information infrastructure protection.” 2012. Web. 02 Apr 2020.

Vancouver:

Branagan MA. A risk simulation framework for information infrastructure protection. [Internet] [Thesis]. Queensland University of Technology; 2012. [cited 2020 Apr 02]. Available from: https://eprints.qut.edu.au/51006/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Branagan MA. A risk simulation framework for information infrastructure protection. [Thesis]. Queensland University of Technology; 2012. Available from: https://eprints.qut.edu.au/51006/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

11. Silva, Maria Helena Ferreira da Cruz e. O impacto das crenças individuais dos profissionais na cultura de segurança da informação nas organizações : estudo no sector da água/saneamento em Portugal.

Degree: 2014, RCAAP

 Este trabalho realizado no âmbito da finalização do mestrado em Segurança em Sistemas de Informação pela Faculdade de Engenharia da Universidade Católica Portuguesa, debruça-se sobre… (more)

Subjects/Keywords: Informação; Segurança da Informação; Governação Corporativa; Governação das TI; Governação da Segurança da Informação; Cultura de Segurança da Informação; Information; Information Security; Corporative Governance; IT Governance; Information Security Governance; Information Security Culture

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Silva, M. H. F. d. C. e. (2014). O impacto das crenças individuais dos profissionais na cultura de segurança da informação nas organizações : estudo no sector da água/saneamento em Portugal. (Thesis). RCAAP. Retrieved from http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ucp.pt:10400.14/15263

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Silva, Maria Helena Ferreira da Cruz e. “O impacto das crenças individuais dos profissionais na cultura de segurança da informação nas organizações : estudo no sector da água/saneamento em Portugal.” 2014. Thesis, RCAAP. Accessed April 02, 2020. http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ucp.pt:10400.14/15263.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Silva, Maria Helena Ferreira da Cruz e. “O impacto das crenças individuais dos profissionais na cultura de segurança da informação nas organizações : estudo no sector da água/saneamento em Portugal.” 2014. Web. 02 Apr 2020.

Vancouver:

Silva MHFdCe. O impacto das crenças individuais dos profissionais na cultura de segurança da informação nas organizações : estudo no sector da água/saneamento em Portugal. [Internet] [Thesis]. RCAAP; 2014. [cited 2020 Apr 02]. Available from: http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ucp.pt:10400.14/15263.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Silva MHFdCe. O impacto das crenças individuais dos profissionais na cultura de segurança da informação nas organizações : estudo no sector da água/saneamento em Portugal. [Thesis]. RCAAP; 2014. Available from: http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ucp.pt:10400.14/15263

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rochester Institute of Technology

12. Zhavgasheva, Gulmira. Data privacy: Legal and business malpractice.

Degree: MS, Computer Science (GCCIS), 2010, Rochester Institute of Technology

  While banking system of Kazakhstan has been reformed during the past two decades to transition to the international standards, privacy of financial information seems… (more)

Subjects/Keywords: Credit card and cardholder data; Data privacy concerns; Information security; PCI DSS; Privacy legislation; Security governance

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhavgasheva, G. (2010). Data privacy: Legal and business malpractice. (Masters Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/140

Chicago Manual of Style (16th Edition):

Zhavgasheva, Gulmira. “Data privacy: Legal and business malpractice.” 2010. Masters Thesis, Rochester Institute of Technology. Accessed April 02, 2020. https://scholarworks.rit.edu/theses/140.

MLA Handbook (7th Edition):

Zhavgasheva, Gulmira. “Data privacy: Legal and business malpractice.” 2010. Web. 02 Apr 2020.

Vancouver:

Zhavgasheva G. Data privacy: Legal and business malpractice. [Internet] [Masters thesis]. Rochester Institute of Technology; 2010. [cited 2020 Apr 02]. Available from: https://scholarworks.rit.edu/theses/140.

Council of Science Editors:

Zhavgasheva G. Data privacy: Legal and business malpractice. [Masters Thesis]. Rochester Institute of Technology; 2010. Available from: https://scholarworks.rit.edu/theses/140

13. Mirbaz, Jamshid. Säkerhetsstyrning inom den Finansiella Sektorn : En Studie på Best Practice hos Tre Svenska Banker.

Degree: Industrial Information and Control Systems, 2012, KTH

  For organizations that handle sensitive information, IT governance and information security are necessities in order to maintain credibility and to conduct its business efficiently.… (more)

Subjects/Keywords: IT Governance; IT Infrastructure; Information Security; Security

…ISGF (Information Security Governance Framework) är en omfattande akademisk ramverk… …Figur 8 – Akademiska ramverket ISGF (Information Security Governance Framework) 3… …x5D;[23] Figur 6 – PDCA modell anpassad till ISMS (Information Security… …information från olika verksamheter inom finanssektorn samlats in och resultatet analyserats och… …som ett stöd för verksamheten. Utifrån detta sammanhang är förmodligen information en av… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mirbaz, J. (2012). Säkerhetsstyrning inom den Finansiella Sektorn : En Studie på Best Practice hos Tre Svenska Banker. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-98863

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Mirbaz, Jamshid. “Säkerhetsstyrning inom den Finansiella Sektorn : En Studie på Best Practice hos Tre Svenska Banker.” 2012. Thesis, KTH. Accessed April 02, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-98863.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Mirbaz, Jamshid. “Säkerhetsstyrning inom den Finansiella Sektorn : En Studie på Best Practice hos Tre Svenska Banker.” 2012. Web. 02 Apr 2020.

Vancouver:

Mirbaz J. Säkerhetsstyrning inom den Finansiella Sektorn : En Studie på Best Practice hos Tre Svenska Banker. [Internet] [Thesis]. KTH; 2012. [cited 2020 Apr 02]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-98863.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Mirbaz J. Säkerhetsstyrning inom den Finansiella Sektorn : En Studie på Best Practice hos Tre Svenska Banker. [Thesis]. KTH; 2012. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-98863

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

14. Donnerin, Oscar. Kommuner i interorganisatorisk samverkan : Att säkert och effektivt styra informationssäkerhetsarbete.

Degree: Information Systems, 2015, Linköping UniversityLinköping University

  Samverkan mellan kommuner är något som varit en aktuell fråga för svenska myndigheter under en längre tid. Mer specifikt har en tydlig ökning identifierats… (more)

Subjects/Keywords: Interorganisatorisk samverkan; informationssäkerhet; informationsutbyte; offentlig sektor; policy; information security governance; säkerhetsmedvetande; Information Systems; Systemvetenskap, informationssystem och informatik

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Donnerin, O. (2015). Kommuner i interorganisatorisk samverkan : Att säkert och effektivt styra informationssäkerhetsarbete. (Thesis). Linköping UniversityLinköping University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-119833

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Donnerin, Oscar. “Kommuner i interorganisatorisk samverkan : Att säkert och effektivt styra informationssäkerhetsarbete.” 2015. Thesis, Linköping UniversityLinköping University. Accessed April 02, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-119833.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Donnerin, Oscar. “Kommuner i interorganisatorisk samverkan : Att säkert och effektivt styra informationssäkerhetsarbete.” 2015. Web. 02 Apr 2020.

Vancouver:

Donnerin O. Kommuner i interorganisatorisk samverkan : Att säkert och effektivt styra informationssäkerhetsarbete. [Internet] [Thesis]. Linköping UniversityLinköping University; 2015. [cited 2020 Apr 02]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-119833.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Donnerin O. Kommuner i interorganisatorisk samverkan : Att säkert och effektivt styra informationssäkerhetsarbete. [Thesis]. Linköping UniversityLinköping University; 2015. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-119833

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

15. André Marcelo Knorst. Alinhamento estratégico entre objetivos de negócio e segurança da informação no contexto da governança de tecnologia da informação (TI): um estudo no setor de automação.

Degree: 2010, Universidade do Vale do Rio do Sinos

A teoria traz como um problema e uma limitação dos modelos de gestão de TI presentes em grande parte das empresas a abordagem excessivamente operacional… (more)

Subjects/Keywords: alinhamento estratégico; segurança da informação; governança de TI; BSC; COBIT; ISO 27002; strategic alignment; information security, IT governance; ADMINISTRACAO

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Knorst, A. M. (2010). Alinhamento estratégico entre objetivos de negócio e segurança da informação no contexto da governança de tecnologia da informação (TI): um estudo no setor de automação. (Thesis). Universidade do Vale do Rio do Sinos. Retrieved from http://bdtd.unisinos.br/tde_busca/arquivo.php?codArquivo=1287

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Knorst, André Marcelo. “Alinhamento estratégico entre objetivos de negócio e segurança da informação no contexto da governança de tecnologia da informação (TI): um estudo no setor de automação.” 2010. Thesis, Universidade do Vale do Rio do Sinos. Accessed April 02, 2020. http://bdtd.unisinos.br/tde_busca/arquivo.php?codArquivo=1287.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Knorst, André Marcelo. “Alinhamento estratégico entre objetivos de negócio e segurança da informação no contexto da governança de tecnologia da informação (TI): um estudo no setor de automação.” 2010. Web. 02 Apr 2020.

Vancouver:

Knorst AM. Alinhamento estratégico entre objetivos de negócio e segurança da informação no contexto da governança de tecnologia da informação (TI): um estudo no setor de automação. [Internet] [Thesis]. Universidade do Vale do Rio do Sinos; 2010. [cited 2020 Apr 02]. Available from: http://bdtd.unisinos.br/tde_busca/arquivo.php?codArquivo=1287.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Knorst AM. Alinhamento estratégico entre objetivos de negócio e segurança da informação no contexto da governança de tecnologia da informação (TI): um estudo no setor de automação. [Thesis]. Universidade do Vale do Rio do Sinos; 2010. Available from: http://bdtd.unisinos.br/tde_busca/arquivo.php?codArquivo=1287

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of KwaZulu-Natal

16. Pretorius, Barend Hendrik. Cyber-security and governance for industrial control systems (ICS) in South Africa.

Degree: 2016, University of KwaZulu-Natal

 Industrial control systems (ICS) and supervisory, control, and data acquisition (SCADA) systems have evolved from operating in a relatively trusting environment to the current prevalence… (more)

Subjects/Keywords: Information Systems and Technology.; Cyber-Security.; Governance.; Industrial control systems.; Data acquisition (SCADA) systems.; Control systems (ICS)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pretorius, B. H. (2016). Cyber-security and governance for industrial control systems (ICS) in South Africa. (Thesis). University of KwaZulu-Natal. Retrieved from http://hdl.handle.net/10413/15261

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Pretorius, Barend Hendrik. “Cyber-security and governance for industrial control systems (ICS) in South Africa.” 2016. Thesis, University of KwaZulu-Natal. Accessed April 02, 2020. http://hdl.handle.net/10413/15261.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Pretorius, Barend Hendrik. “Cyber-security and governance for industrial control systems (ICS) in South Africa.” 2016. Web. 02 Apr 2020.

Vancouver:

Pretorius BH. Cyber-security and governance for industrial control systems (ICS) in South Africa. [Internet] [Thesis]. University of KwaZulu-Natal; 2016. [cited 2020 Apr 02]. Available from: http://hdl.handle.net/10413/15261.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Pretorius BH. Cyber-security and governance for industrial control systems (ICS) in South Africa. [Thesis]. University of KwaZulu-Natal; 2016. Available from: http://hdl.handle.net/10413/15261

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

17. Da Cruz, Eduardo Miguel. A model for bridging the information security gap between IT governance and IT service management.

Degree: 2008, University of Johannesburg

Today, organisations rely on IT systems which are constantly expected to improve return on investment without an increase in costs. These expectations have resulted in… (more)

Subjects/Keywords: computer security; corporate governance; information technology management

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Da Cruz, E. M. (2008). A model for bridging the information security gap between IT governance and IT service management. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/491

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Da Cruz, Eduardo Miguel. “A model for bridging the information security gap between IT governance and IT service management.” 2008. Thesis, University of Johannesburg. Accessed April 02, 2020. http://hdl.handle.net/10210/491.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Da Cruz, Eduardo Miguel. “A model for bridging the information security gap between IT governance and IT service management.” 2008. Web. 02 Apr 2020.

Vancouver:

Da Cruz EM. A model for bridging the information security gap between IT governance and IT service management. [Internet] [Thesis]. University of Johannesburg; 2008. [cited 2020 Apr 02]. Available from: http://hdl.handle.net/10210/491.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Da Cruz EM. A model for bridging the information security gap between IT governance and IT service management. [Thesis]. University of Johannesburg; 2008. Available from: http://hdl.handle.net/10210/491

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


KTH

18. Kukuruzovic, Naida. Security Management : Fulfillment of the Government Requirements for a component assurance process.

Degree: Information and Communication Technology (ICT), 2016, KTH

Protecting organization’s assets from various security threats is a necessity for every organization. Efficient security management is vital to effectively protect the organization’s assets.… (more)

Subjects/Keywords: Security management; information security; authentication; authorization; governance; risk management; compliance; user management; Säkerhetshantering; informationssäkerhet; autentisering; auktorisering; styrning; riskhantering; följsamhet; användaradministration; Communication Systems; Kommunikationssystem; Computer Sciences; Datavetenskap (datalogi); Computer Engineering; Datorteknik

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kukuruzovic, N. (2016). Security Management : Fulfillment of the Government Requirements for a component assurance process. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-189983

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kukuruzovic, Naida. “Security Management : Fulfillment of the Government Requirements for a component assurance process.” 2016. Thesis, KTH. Accessed April 02, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-189983.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kukuruzovic, Naida. “Security Management : Fulfillment of the Government Requirements for a component assurance process.” 2016. Web. 02 Apr 2020.

Vancouver:

Kukuruzovic N. Security Management : Fulfillment of the Government Requirements for a component assurance process. [Internet] [Thesis]. KTH; 2016. [cited 2020 Apr 02]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-189983.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kukuruzovic N. Security Management : Fulfillment of the Government Requirements for a component assurance process. [Thesis]. KTH; 2016. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-189983

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

19. Bravc, Jernej. METODA ZA UVEDBO IN VZDRŽEVANJE SISTEMA ZA UPRAVLJANJE INFORMACIJSKE VARNOSTI V PODJETJU.

Degree: 2012, Univerza v Mariboru

V magistrskem delu smo poudarili pomembnost ustreznega nivoja informacijske varnosti, ki ga podjetjem zagotavlja sistem za upravljanje informacijske varnosti. Za njegovo uvedbo in učinkovito vzdrževanje… (more)

Subjects/Keywords: upravljanje IT; informacijska varnost; sistem za upravljanje informacijske varnosti (SUIV); informacijska varnostna politika; upravljanje IT tveganj; IT governance; information security; information security management system (ISMS); information security policy; IT risk management; info:eu-repo/classification/udc/005:004.6/.7.056(043)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bravc, J. (2012). METODA ZA UVEDBO IN VZDRŽEVANJE SISTEMA ZA UPRAVLJANJE INFORMACIJSKE VARNOSTI V PODJETJU. (Masters Thesis). Univerza v Mariboru. Retrieved from https://dk.um.si/IzpisGradiva.php?id=22671 ; https://dk.um.si/Dokument.php?id=29369&dn= ; https://plus.si.cobiss.net/opac7/bib/16000790?lang=sl

Chicago Manual of Style (16th Edition):

Bravc, Jernej. “METODA ZA UVEDBO IN VZDRŽEVANJE SISTEMA ZA UPRAVLJANJE INFORMACIJSKE VARNOSTI V PODJETJU.” 2012. Masters Thesis, Univerza v Mariboru. Accessed April 02, 2020. https://dk.um.si/IzpisGradiva.php?id=22671 ; https://dk.um.si/Dokument.php?id=29369&dn= ; https://plus.si.cobiss.net/opac7/bib/16000790?lang=sl.

MLA Handbook (7th Edition):

Bravc, Jernej. “METODA ZA UVEDBO IN VZDRŽEVANJE SISTEMA ZA UPRAVLJANJE INFORMACIJSKE VARNOSTI V PODJETJU.” 2012. Web. 02 Apr 2020.

Vancouver:

Bravc J. METODA ZA UVEDBO IN VZDRŽEVANJE SISTEMA ZA UPRAVLJANJE INFORMACIJSKE VARNOSTI V PODJETJU. [Internet] [Masters thesis]. Univerza v Mariboru; 2012. [cited 2020 Apr 02]. Available from: https://dk.um.si/IzpisGradiva.php?id=22671 ; https://dk.um.si/Dokument.php?id=29369&dn= ; https://plus.si.cobiss.net/opac7/bib/16000790?lang=sl.

Council of Science Editors:

Bravc J. METODA ZA UVEDBO IN VZDRŽEVANJE SISTEMA ZA UPRAVLJANJE INFORMACIJSKE VARNOSTI V PODJETJU. [Masters Thesis]. Univerza v Mariboru; 2012. Available from: https://dk.um.si/IzpisGradiva.php?id=22671 ; https://dk.um.si/Dokument.php?id=29369&dn= ; https://plus.si.cobiss.net/opac7/bib/16000790?lang=sl

20. Maria do Carmo Soares de Mendonça. A percepção gerencial sobre o modelo de gestão da segurança da informação de uma empresa pública de TIC: perspectiva de evolução para um modelo de governança.

Degree: 2007, Universidade Católica de Brasilia

No mundo globalizado da tecnologia da informação e comunicação, as ameaças a sistemas de informação e redes de computadores qualificam a segurança da informação como… (more)

Subjects/Keywords: segurança da informação; governança e gestão; gestão do conhecimento sistemas de segurança; tecnologia da informação; ADMINISTRACAO; information technology; governance and management, information security; ADMINISTRACAO

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mendonça, M. d. C. S. d. (2007). A percepção gerencial sobre o modelo de gestão da segurança da informação de uma empresa pública de TIC: perspectiva de evolução para um modelo de governança. (Masters Thesis). Universidade Católica de Brasilia. Retrieved from http://www.bdtd.ucb.br/tede/tde_busca/arquivo.php?codArquivo=733

Chicago Manual of Style (16th Edition):

Mendonça, Maria do Carmo Soares de. “A percepção gerencial sobre o modelo de gestão da segurança da informação de uma empresa pública de TIC: perspectiva de evolução para um modelo de governança.” 2007. Masters Thesis, Universidade Católica de Brasilia. Accessed April 02, 2020. http://www.bdtd.ucb.br/tede/tde_busca/arquivo.php?codArquivo=733.

MLA Handbook (7th Edition):

Mendonça, Maria do Carmo Soares de. “A percepção gerencial sobre o modelo de gestão da segurança da informação de uma empresa pública de TIC: perspectiva de evolução para um modelo de governança.” 2007. Web. 02 Apr 2020.

Vancouver:

Mendonça MdCSd. A percepção gerencial sobre o modelo de gestão da segurança da informação de uma empresa pública de TIC: perspectiva de evolução para um modelo de governança. [Internet] [Masters thesis]. Universidade Católica de Brasilia; 2007. [cited 2020 Apr 02]. Available from: http://www.bdtd.ucb.br/tede/tde_busca/arquivo.php?codArquivo=733.

Council of Science Editors:

Mendonça MdCSd. A percepção gerencial sobre o modelo de gestão da segurança da informação de uma empresa pública de TIC: perspectiva de evolução para um modelo de governança. [Masters Thesis]. Universidade Católica de Brasilia; 2007. Available from: http://www.bdtd.ucb.br/tede/tde_busca/arquivo.php?codArquivo=733


University of Central Florida

21. Wu, Yu. Effects Of It Governance On Information Security.

Degree: 2007, University of Central Florida

 This dissertation is composed by three essays that explore the relationship between good IT governance and effective information security services. Governance steers and verifies performance… (more)

Subjects/Keywords: information security; IT governance; agency relationships; decision rights; Management Information Systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wu, Y. (2007). Effects Of It Governance On Information Security. (Doctoral Dissertation). University of Central Florida. Retrieved from https://stars.library.ucf.edu/etd/3417

Chicago Manual of Style (16th Edition):

Wu, Yu. “Effects Of It Governance On Information Security.” 2007. Doctoral Dissertation, University of Central Florida. Accessed April 02, 2020. https://stars.library.ucf.edu/etd/3417.

MLA Handbook (7th Edition):

Wu, Yu. “Effects Of It Governance On Information Security.” 2007. Web. 02 Apr 2020.

Vancouver:

Wu Y. Effects Of It Governance On Information Security. [Internet] [Doctoral dissertation]. University of Central Florida; 2007. [cited 2020 Apr 02]. Available from: https://stars.library.ucf.edu/etd/3417.

Council of Science Editors:

Wu Y. Effects Of It Governance On Information Security. [Doctoral Dissertation]. University of Central Florida; 2007. Available from: https://stars.library.ucf.edu/etd/3417

22. Alkaabi, Ahmed. Strategic framework to minimise information security risks in the UAE.

Degree: PhD, 2014, University of Bedfordshire

 The transition process to ICT (Information and Communication Technology) has had significant influence on different aspects of society. Although the computerisation process has motivated the… (more)

Subjects/Keywords: 005.8; G400 Computer Science; computer security; information security; information security governance; United Arab Emirates

…2.1 Information Security… …26 2.1.1 Vulnerability of Information Security… …33 2.1.2 Human Factors in Information Security… …43 2.1.4.5 Information Security Standards and Guidelines… …63 3.2.1 Information Security Culture… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alkaabi, A. (2014). Strategic framework to minimise information security risks in the UAE. (Doctoral Dissertation). University of Bedfordshire. Retrieved from http://hdl.handle.net/10547/344600

Chicago Manual of Style (16th Edition):

Alkaabi, Ahmed. “Strategic framework to minimise information security risks in the UAE.” 2014. Doctoral Dissertation, University of Bedfordshire. Accessed April 02, 2020. http://hdl.handle.net/10547/344600.

MLA Handbook (7th Edition):

Alkaabi, Ahmed. “Strategic framework to minimise information security risks in the UAE.” 2014. Web. 02 Apr 2020.

Vancouver:

Alkaabi A. Strategic framework to minimise information security risks in the UAE. [Internet] [Doctoral dissertation]. University of Bedfordshire; 2014. [cited 2020 Apr 02]. Available from: http://hdl.handle.net/10547/344600.

Council of Science Editors:

Alkaabi A. Strategic framework to minimise information security risks in the UAE. [Doctoral Dissertation]. University of Bedfordshire; 2014. Available from: http://hdl.handle.net/10547/344600


Delft University of Technology

23. Schmidt, A. Secrecy versus openness: Internet security and the limits of open source and peer production.

Degree: 2014, Delft University of Technology

 Open source and peer production have been praised as organisational models that could change the world for the better. It is commonly asserted that almost… (more)

Subjects/Keywords: information security; peer production; open source; internet governance; security governance; incident response; cybersecurity; cyberattacks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Schmidt, A. (2014). Secrecy versus openness: Internet security and the limits of open source and peer production. (Doctoral Dissertation). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:ecf237ed-7131-4455-917f-11e55e03df0d ; urn:NBN:nl:ui:24-uuid:ecf237ed-7131-4455-917f-11e55e03df0d ; urn:NBN:nl:ui:24-uuid:ecf237ed-7131-4455-917f-11e55e03df0d ; http://resolver.tudelft.nl/uuid:ecf237ed-7131-4455-917f-11e55e03df0d

Chicago Manual of Style (16th Edition):

Schmidt, A. “Secrecy versus openness: Internet security and the limits of open source and peer production.” 2014. Doctoral Dissertation, Delft University of Technology. Accessed April 02, 2020. http://resolver.tudelft.nl/uuid:ecf237ed-7131-4455-917f-11e55e03df0d ; urn:NBN:nl:ui:24-uuid:ecf237ed-7131-4455-917f-11e55e03df0d ; urn:NBN:nl:ui:24-uuid:ecf237ed-7131-4455-917f-11e55e03df0d ; http://resolver.tudelft.nl/uuid:ecf237ed-7131-4455-917f-11e55e03df0d.

MLA Handbook (7th Edition):

Schmidt, A. “Secrecy versus openness: Internet security and the limits of open source and peer production.” 2014. Web. 02 Apr 2020.

Vancouver:

Schmidt A. Secrecy versus openness: Internet security and the limits of open source and peer production. [Internet] [Doctoral dissertation]. Delft University of Technology; 2014. [cited 2020 Apr 02]. Available from: http://resolver.tudelft.nl/uuid:ecf237ed-7131-4455-917f-11e55e03df0d ; urn:NBN:nl:ui:24-uuid:ecf237ed-7131-4455-917f-11e55e03df0d ; urn:NBN:nl:ui:24-uuid:ecf237ed-7131-4455-917f-11e55e03df0d ; http://resolver.tudelft.nl/uuid:ecf237ed-7131-4455-917f-11e55e03df0d.

Council of Science Editors:

Schmidt A. Secrecy versus openness: Internet security and the limits of open source and peer production. [Doctoral Dissertation]. Delft University of Technology; 2014. Available from: http://resolver.tudelft.nl/uuid:ecf237ed-7131-4455-917f-11e55e03df0d ; urn:NBN:nl:ui:24-uuid:ecf237ed-7131-4455-917f-11e55e03df0d ; urn:NBN:nl:ui:24-uuid:ecf237ed-7131-4455-917f-11e55e03df0d ; http://resolver.tudelft.nl/uuid:ecf237ed-7131-4455-917f-11e55e03df0d

24. Maurício Machado Paranhos. Framework de segurança da informação para medição do nível de maturidade das organizações.

Degree: 2010, Universidade Católica de Brasilia

A segurança da informação nas organizações, em muitos casos, passa a ser algo que viabiliza ou inviabiliza um negócio, já que protege o principal ativo… (more)

Subjects/Keywords: redes de computação; sistemas de recuperação da informação; organização; tecnologia da informação; framework; programa de computador; CIENCIA DA INFORMACAO; governance; framework; information security; maturity; CIENCIA DA INFORMACAO

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Paranhos, M. M. (2010). Framework de segurança da informação para medição do nível de maturidade das organizações. (Masters Thesis). Universidade Católica de Brasilia. Retrieved from http://www.bdtd.ucb.br/tede/tde_busca/arquivo.php?codArquivo=1417

Chicago Manual of Style (16th Edition):

Paranhos, Maurício Machado. “Framework de segurança da informação para medição do nível de maturidade das organizações.” 2010. Masters Thesis, Universidade Católica de Brasilia. Accessed April 02, 2020. http://www.bdtd.ucb.br/tede/tde_busca/arquivo.php?codArquivo=1417.

MLA Handbook (7th Edition):

Paranhos, Maurício Machado. “Framework de segurança da informação para medição do nível de maturidade das organizações.” 2010. Web. 02 Apr 2020.

Vancouver:

Paranhos MM. Framework de segurança da informação para medição do nível de maturidade das organizações. [Internet] [Masters thesis]. Universidade Católica de Brasilia; 2010. [cited 2020 Apr 02]. Available from: http://www.bdtd.ucb.br/tede/tde_busca/arquivo.php?codArquivo=1417.

Council of Science Editors:

Paranhos MM. Framework de segurança da informação para medição do nível de maturidade das organizações. [Masters Thesis]. Universidade Católica de Brasilia; 2010. Available from: http://www.bdtd.ucb.br/tede/tde_busca/arquivo.php?codArquivo=1417

25. Chhabra, Varun. Technology adoption in the public distribution system of Chhattisgarh, India: Analysis of factors that facilitate the transition to technology utilization in food distribution.

Degree: 2017, Iowa State University

Information and communication technologies in public administration and social welfare initiatives are increasingly being used by various countries with an intent to augment transparency and… (more)

Subjects/Keywords: E-governance; Food Security; Information and Communication Technologies; Mandatory Technology adoption; Quality management tools; Structural Equation Modeling; Agriculture; Bioresource and Agricultural Engineering; Industrial Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chhabra, V. (2017). Technology adoption in the public distribution system of Chhattisgarh, India: Analysis of factors that facilitate the transition to technology utilization in food distribution. (Thesis). Iowa State University. Retrieved from https://lib.dr.iastate.edu/etd/16114

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chhabra, Varun. “Technology adoption in the public distribution system of Chhattisgarh, India: Analysis of factors that facilitate the transition to technology utilization in food distribution.” 2017. Thesis, Iowa State University. Accessed April 02, 2020. https://lib.dr.iastate.edu/etd/16114.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chhabra, Varun. “Technology adoption in the public distribution system of Chhattisgarh, India: Analysis of factors that facilitate the transition to technology utilization in food distribution.” 2017. Web. 02 Apr 2020.

Vancouver:

Chhabra V. Technology adoption in the public distribution system of Chhattisgarh, India: Analysis of factors that facilitate the transition to technology utilization in food distribution. [Internet] [Thesis]. Iowa State University; 2017. [cited 2020 Apr 02]. Available from: https://lib.dr.iastate.edu/etd/16114.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chhabra V. Technology adoption in the public distribution system of Chhattisgarh, India: Analysis of factors that facilitate the transition to technology utilization in food distribution. [Thesis]. Iowa State University; 2017. Available from: https://lib.dr.iastate.edu/etd/16114

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

26. Shaaban, Hussein Khamis. Enhancing the governance of information security in developing countries : the case of Zanzibar.

Degree: PhD, 2014, University of Bedfordshire

 Organisations in the developing countries need to protect their information assets (IA) in an optimal way. This thesis is based upon the argument that in… (more)

Subjects/Keywords: 005.8; G420 Networks and Communications; information security; information security governance; Zanzibar; developing countries

…108 6.2.4 Benchmarking of information security governance .............................110… …INTERVIEW GUIDE II – Complex Societal Issues Concerning Governance of Information Security (… …120 Table 7.4.1 A semiotic diagnosis for information security governance design… …connected over open data networks, efficient information security governance has become a crucial… …order to achieve effective information security governance, it is essential to develop and… 

Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7 Sample image

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shaaban, H. K. (2014). Enhancing the governance of information security in developing countries : the case of Zanzibar. (Doctoral Dissertation). University of Bedfordshire. Retrieved from http://hdl.handle.net/10547/315359

Chicago Manual of Style (16th Edition):

Shaaban, Hussein Khamis. “Enhancing the governance of information security in developing countries : the case of Zanzibar.” 2014. Doctoral Dissertation, University of Bedfordshire. Accessed April 02, 2020. http://hdl.handle.net/10547/315359.

MLA Handbook (7th Edition):

Shaaban, Hussein Khamis. “Enhancing the governance of information security in developing countries : the case of Zanzibar.” 2014. Web. 02 Apr 2020.

Vancouver:

Shaaban HK. Enhancing the governance of information security in developing countries : the case of Zanzibar. [Internet] [Doctoral dissertation]. University of Bedfordshire; 2014. [cited 2020 Apr 02]. Available from: http://hdl.handle.net/10547/315359.

Council of Science Editors:

Shaaban HK. Enhancing the governance of information security in developing countries : the case of Zanzibar. [Doctoral Dissertation]. University of Bedfordshire; 2014. Available from: http://hdl.handle.net/10547/315359

27. Prislan, Kaja. Večkriterijski model učinkovitosti informacijske varnosti v organizacijah.

Degree: 2017, Univerza v Mariboru

 Informatizacija poslovnih procesov spreminja koncepte zagotavljanja organizacijske varnosti. V doktorski disertaciji pojasnimo, kako v sodobnem poslovnem svetu pristopiti k upravljanju informacijske varnosti, kakšen je njen… (more)

Subjects/Keywords: informacijska varnost; informacijske grožnje; varnostni management; varnostni ukrepi; učinkovitost; merjenje učinkovitosti; odločitveni modeli; doktorske disertacije; information security; security management; governance; effectiveness and efficiency; assessment; performance measurement model; decision model; info:eu-repo/classification/udc/004.056:005.934(043.3)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Prislan, K. (2017). Večkriterijski model učinkovitosti informacijske varnosti v organizacijah. (Doctoral Dissertation). Univerza v Mariboru. Retrieved from https://dk.um.si/IzpisGradiva.php?id=62163 ; https://dk.um.si/Dokument.php?id=108821&dn= ; https://plus.si.cobiss.net/opac7/bib/3295210?lang=sl

Chicago Manual of Style (16th Edition):

Prislan, Kaja. “Večkriterijski model učinkovitosti informacijske varnosti v organizacijah.” 2017. Doctoral Dissertation, Univerza v Mariboru. Accessed April 02, 2020. https://dk.um.si/IzpisGradiva.php?id=62163 ; https://dk.um.si/Dokument.php?id=108821&dn= ; https://plus.si.cobiss.net/opac7/bib/3295210?lang=sl.

MLA Handbook (7th Edition):

Prislan, Kaja. “Večkriterijski model učinkovitosti informacijske varnosti v organizacijah.” 2017. Web. 02 Apr 2020.

Vancouver:

Prislan K. Večkriterijski model učinkovitosti informacijske varnosti v organizacijah. [Internet] [Doctoral dissertation]. Univerza v Mariboru; 2017. [cited 2020 Apr 02]. Available from: https://dk.um.si/IzpisGradiva.php?id=62163 ; https://dk.um.si/Dokument.php?id=108821&dn= ; https://plus.si.cobiss.net/opac7/bib/3295210?lang=sl.

Council of Science Editors:

Prislan K. Večkriterijski model učinkovitosti informacijske varnosti v organizacijah. [Doctoral Dissertation]. Univerza v Mariboru; 2017. Available from: https://dk.um.si/IzpisGradiva.php?id=62163 ; https://dk.um.si/Dokument.php?id=108821&dn= ; https://plus.si.cobiss.net/opac7/bib/3295210?lang=sl

28. Stauber, Sebastian. Compliance issues within Europe's General Data Protection Regulation in the context of information security and privacy governance in Swedish corporations : A mixed methods study of compliance practices towards GDPR readiness.

Degree: Informatics, 2018, Jönköping University

  The European Union has introduced a new General Data Protection Regulation that regulates all aspects of privacy and data protection for the data of… (more)

Subjects/Keywords: GDPR; Privacy; Data Protection; Information Security; Privacy Governance; Information Governance; IS Governance; IT Governance; IT Compliance; GDPR Implementation; Privacy Regulation; Economics and Business; Ekonomi och näringsliv

…x29;. The changes affect the fields of IT governance and information security as well as… …that are related to GDPR and information security/governance, this question requires seeking… …researchers as it gains comprehension of information and privacy governance that could guide to new… …translated. After that, starting with an explanation of information security and its role in… …last principle is directly connected to the overall information security of an organisation… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Stauber, S. (2018). Compliance issues within Europe's General Data Protection Regulation in the context of information security and privacy governance in Swedish corporations : A mixed methods study of compliance practices towards GDPR readiness. (Thesis). Jönköping University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-39809

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Stauber, Sebastian. “Compliance issues within Europe's General Data Protection Regulation in the context of information security and privacy governance in Swedish corporations : A mixed methods study of compliance practices towards GDPR readiness.” 2018. Thesis, Jönköping University. Accessed April 02, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-39809.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Stauber, Sebastian. “Compliance issues within Europe's General Data Protection Regulation in the context of information security and privacy governance in Swedish corporations : A mixed methods study of compliance practices towards GDPR readiness.” 2018. Web. 02 Apr 2020.

Vancouver:

Stauber S. Compliance issues within Europe's General Data Protection Regulation in the context of information security and privacy governance in Swedish corporations : A mixed methods study of compliance practices towards GDPR readiness. [Internet] [Thesis]. Jönköping University; 2018. [cited 2020 Apr 02]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-39809.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Stauber S. Compliance issues within Europe's General Data Protection Regulation in the context of information security and privacy governance in Swedish corporations : A mixed methods study of compliance practices towards GDPR readiness. [Thesis]. Jönköping University; 2018. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-39809

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

29. Novák, Lukáš. Metodika hodnocení informačních systémů .

Degree: 2018, Brno University of Technology

 Dizertační práce je orientovaná na oblast hodnocení informačních systémů a vymezuje hlavní nedostatky v provozu a řízení informačních systémů v návaznosti na procesy v oddělení… (more)

Subjects/Keywords: Informační systémy; Hodnocení informačních systémů; Nedostatky v oblasti provozu a řízení informačních systémů; Bezpečnost informačních systémů; Audit informačních systémů; Případová studie; Řízení IT oddělení; Information Systems; Assessment of Information Systems; Deficiencies in Operation and Management of Information Systems; Security of Information Systems; Audit of Information Systems; Case Study; IT Governance

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Novák, L. (2018). Metodika hodnocení informačních systémů . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/83013

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Novák, Lukáš. “Metodika hodnocení informačních systémů .” 2018. Thesis, Brno University of Technology. Accessed April 02, 2020. http://hdl.handle.net/11012/83013.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Novák, Lukáš. “Metodika hodnocení informačních systémů .” 2018. Web. 02 Apr 2020.

Vancouver:

Novák L. Metodika hodnocení informačních systémů . [Internet] [Thesis]. Brno University of Technology; 2018. [cited 2020 Apr 02]. Available from: http://hdl.handle.net/11012/83013.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Novák L. Metodika hodnocení informačních systémů . [Thesis]. Brno University of Technology; 2018. Available from: http://hdl.handle.net/11012/83013

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Virginia Commonwealth University

30. Mishra, Sushma. DEFINING VALUE BASED INFORMATION SECURITY GOVERNANCE OBJECTIVES.

Degree: PhD, Information Systems, 2008, Virginia Commonwealth University

 This research argues that the information security governance objectives should be grounded in the values of organizational members. Research literature in decision sciences suggest that… (more)

Subjects/Keywords: information security governance; value theory; value focussed approach; internal control; case study; Business; Management Information Systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mishra, S. (2008). DEFINING VALUE BASED INFORMATION SECURITY GOVERNANCE OBJECTIVES. (Doctoral Dissertation). Virginia Commonwealth University. Retrieved from https://doi.org/10.25772/8S3W-ZD67 ; https://scholarscompass.vcu.edu/etd/1755

Chicago Manual of Style (16th Edition):

Mishra, Sushma. “DEFINING VALUE BASED INFORMATION SECURITY GOVERNANCE OBJECTIVES.” 2008. Doctoral Dissertation, Virginia Commonwealth University. Accessed April 02, 2020. https://doi.org/10.25772/8S3W-ZD67 ; https://scholarscompass.vcu.edu/etd/1755.

MLA Handbook (7th Edition):

Mishra, Sushma. “DEFINING VALUE BASED INFORMATION SECURITY GOVERNANCE OBJECTIVES.” 2008. Web. 02 Apr 2020.

Vancouver:

Mishra S. DEFINING VALUE BASED INFORMATION SECURITY GOVERNANCE OBJECTIVES. [Internet] [Doctoral dissertation]. Virginia Commonwealth University; 2008. [cited 2020 Apr 02]. Available from: https://doi.org/10.25772/8S3W-ZD67 ; https://scholarscompass.vcu.edu/etd/1755.

Council of Science Editors:

Mishra S. DEFINING VALUE BASED INFORMATION SECURITY GOVERNANCE OBJECTIVES. [Doctoral Dissertation]. Virginia Commonwealth University; 2008. Available from: https://doi.org/10.25772/8S3W-ZD67 ; https://scholarscompass.vcu.edu/etd/1755

[1] [2]

.