To see the other types of publications on this topic, follow the link: Component of corporate security.

Dissertations / Theses on the topic 'Component of corporate security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Component of corporate security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Копча, Ю. Ю., та Yu Yu Kopcha. "Механізм формування потенціалу економічної безпеки підприємств: дисертація". Thesis, Національний авіаційний університет, 2020. http://dspace.lvduvs.edu.ua/handle/1234567890/3513.

Full text
Abstract:
Копча Ю. Ю. Механізм формування потенціалу економічної безпеки підприємств: дисертація на здобуття ступеня доктора філософії за спеціальністю 051 – «Економіка» / Копча Юрій Юрійович. – Київ: Національний авіаційний університет; Львівський державний університет внутрішніх справ МВС України, 2020. - 277 с.<br>У дисертаційній роботі вирішено важливе науково-практичне завдання, пов’язане з теоретико-методичним обґрунтуванням положень і розробкою практичних рекомендацій щодо розробки механізму формування потенціалу економічної безпеки підприємства та використання системи оцінювання його складов
APA, Harvard, Vancouver, ISO, and other styles
2

Rudkovsky, O. V. "Corporate security organizations." Thesis, Sumy State University, 2014. http://essuir.sumdu.edu.ua/handle/123456789/36239.

Full text
Abstract:
An analysis of the current domestic and foreign literature on corporate governance. The questions of analysis, dynamics and control risks associated with the operation and development corporations that allows you to explore a range of challenges, threats, hazards that affect the structure and development of corporate security. Analysis of research on the creation and development of a new direction - a corporate security. When you are citing the document, use the following link http://essuir.sumdu.edu.ua/handle/123456789/36239
APA, Harvard, Vancouver, ISO, and other styles
3

Hetherington, Christopher John. "Private security as an essential component of Homeland Security /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FHetherington.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, June 2004.<br>Thesis advisor(s): Maria Rasmussen. Includes bibliographical references (p. 57-59). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
4

Kelechi, Ugwu, Charles Maina, Sergio Silva, and Gabriel Vargas. "Corporate Identity:Communication as a key Component." Thesis, Jönköping University, Jönköping International Business School, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-1329.

Full text
Abstract:
<p>Problem: In the world of today’s business, there is a trend for investors not only to base their decisions whether to invest in a company on the basis of its financial results.</p><p>These days more features are taken into consideration. Corporate identity is a crucial aspect to bear in mind for investors, as it demonstrates what the company is, how it works and where it is going. Corporate Communication is a process that allows companies to share their information with the stakeholders. Not every company is aware</p><p>of the significance of communicating its corporate identity to investor
APA, Harvard, Vancouver, ISO, and other styles
5

Vargas, Gabriel, Sergio Silva, Ugwu Keliche, and Charles Maina. "Corporate Identity : Communication as a key component." Thesis, Jönköping University, Jönköping International Business School, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-1327.

Full text
Abstract:
<p>Problem: In the world of today’s business, there is a trend for investors not only to base their decisions whether to invest in a company on the basis of its financial results. These days more features are taken into consideration. Corporate identity is a crucial aspect to bear in mind for investors, as it demonstrates what the company is, how it works and where it is going. Corporate Communication is a process that allows companies to share their information with the stakeholders. Not every company is aware of the significance of communicating its corporate identity to investors. These rep
APA, Harvard, Vancouver, ISO, and other styles
6

Dyskant, Lucas Bubman. "The illiquidity component of corporate bond spreads." reponame:Repositório Institucional do FGV, 2017. http://hdl.handle.net/10438/19304.

Full text
Abstract:
Submitted by Lucas Bubman Dyskant (lucasbubman@hotmail.com) on 2017-11-28T15:33:56Z No. of bitstreams: 2 EPGE - Final.pdf: 765762 bytes, checksum: 516f76f53430680a81d511305bdde1be (MD5) EPGE - Final.pdf: 765762 bytes, checksum: 516f76f53430680a81d511305bdde1be (MD5)<br>Approved for entry into archive by GILSON ROCHA MIRANDA (gilson.miranda@fgv.br) on 2017-12-07T19:31:14Z (GMT) No. of bitstreams: 2 EPGE - Final.pdf: 765762 bytes, checksum: 516f76f53430680a81d511305bdde1be (MD5) EPGE - Final.pdf: 765762 bytes, checksum: 516f76f53430680a81d511305bdde1be (MD5)<br>Made available in DSpace on 2
APA, Harvard, Vancouver, ISO, and other styles
7

Крапивний, Іван Васильович, Иван Васильевич Крапивный, Ivan Vasylovych Krapyvnyi, et al. "Tax security as a component of the financial security of a country." Thesis, Sumy State University, 2015. http://essuir.sumdu.edu.ua/handle/123456789/43525.

Full text
Abstract:
In modern conditions of the market economy development, the deepening of integration and globalization, the importance of taxes in providing financial security is growing. Taxes and tax policy in modern conditions is one of the most important objects of market reforms. Taking into account that taxes have a significant impact on the economy, the budget system, financial support of local authorities, tax security is an important element of the system of financial security ensuring. To our mind the tax security of the country is such condition of the tax system, which is characterized by the sta
APA, Harvard, Vancouver, ISO, and other styles
8

Thomson, Kerry-Lynn. "Integrating information security into corporate culture." Thesis, Port Elizabeth Technikon, 2003. http://hdl.handle.net/10948/132.

Full text
Abstract:
Introduction: There are many components that are required for an organisation to be successful in its chosen field. These components vary from corporate culture, to corporate leadership, to effective protection of important assets. These and many more contribute to the success of an organisation. One component that should be a definitive part in the strategy of any organisation is information security. Information security is one of the fastest growing sub-disciplines in the Information Technology industry, indicating the importance of this field (Zylt, 2001, online). Information security is c
APA, Harvard, Vancouver, ISO, and other styles
9

Posthumus, Shaun Murray. "Corporate information risk : an information security governance framework." Thesis, Nelson Mandela Metropolitan University, 2006. http://hdl.handle.net/10948/814.

Full text
Abstract:
Information Security is currently viewed from a technical point of view only. Some authors believe that Information Security is a process that involves more than merely Risk Management at the department level, as it is also a strategic and potentially legal issue. Hence, there is a need to elevate the importance of Information Security to a governance level through Information Security Governance and propose a framework to help guide the Board of Directors in their Information Security Governance efforts. IT is a major facilitator of organizational business processes and these processes manipu
APA, Harvard, Vancouver, ISO, and other styles
10

Sohrakoff, Karen A. "Immigrant integration a missing component of Homeland Security strategy and policy /." Thesis, Monterey, California : Naval Postgraduate School, 2010. http://edocs.nps.edu/npspubs/scholarly/theses/2010/Mar/10Mar%5FSohrakoff.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, March 2010.<br>Thesis Advisor(s): Rollins, John ; Wollman, Lauren. "March 2010." Description based on title screen as viewed on April 23, 2010. Author(s) subject terms: Immigration, Integration, Radicalization, Identity, International, U.S. Citizenship and Immigration Services (USCIS), Citizenship and Immigration Canada Includes bibliographical references (p. 79-89). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
11

Bond, Anders, and Nils Påhlsson. "A Quantitative Evaluation Framework for Component Security in Distributed Information Systems." Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2410.

Full text
Abstract:
<p>The Heimdal Framework presented in this thesis is a step towards an unambiguous framework that reveals the objective strength and weaknesses of the security of components. It provides a way to combine different aspects affecting the security of components - such as category requirements, implemented security functionality and the environment in which it operates - in a modular way, making each module replaceable in the event that a more accurate module is developed. </p><p>The environment is assessed and quantified through a methodology presented as a part of the Heimdal Framework. The resu
APA, Harvard, Vancouver, ISO, and other styles
12

Ben, Said Najah. "Information Flow Security in Component-Based Models : From verification to Implementation." Thesis, Université Grenoble Alpes (ComUE), 2016. http://www.theses.fr/2016GREAM053/document.

Full text
Abstract:
La sécurité des systèmes d'information sont primordiales dans la vie d'aujourd'hui, en particulier avec la croissance des systèmes informatiques complexes et fortement interconnectés. Par exemple, les systèmes bancaires ont l'obligation de garantir l'intégrité et la confidentialité de leurs comptes clients. Le vote électronique, des ventes aux enchères et le commerce doit aussi assurer leurs la confidentialité et l'intégrité.Cependant, la vérification de la sécurité et sa mise en œuvre en distribuée sont des processus lourds en général, les compétences de sécurité avancées sont nécessaires pui
APA, Harvard, Vancouver, ISO, and other styles
13

Maslyuk, L. L., and V. V. Loiko. "The production component of economic security for the production of clothing." Thesis, КНУТД, 2016. https://er.knutd.edu.ua/handle/123456789/2169.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Hellwig, A. "The increasing importance of the involvement component of organisational commitment." Thesis, Queensland University of Technology, 1996. https://eprints.qut.edu.au/36283/1/36283_Hellwig_1996.pdf.

Full text
Abstract:
In examining relational communication exchanges, one aspect that constantly comes to the fore is the construct commitment. Without commitment these exchanges would seem to have a lesser chance of developing into lasting systems. One example of a relational communication system is the employee/employer relationship found in many organisations. Organisational commitment has been the subject of many studies and in furthering research into this form of commitment many measuring instruments have been developed and tested. Of these instruments, one that has achieved widespread acceptance is
APA, Harvard, Vancouver, ISO, and other styles
15

Burkhead, Randy L. "A phenomenological study of information security incidents experienced by information security professionals providing corporate information security incident management." Thesis, Capella University, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=3682325.

Full text
Abstract:
<p> The security of digital information is paramount to the success of private organizations. Violating that security is a multi-billion-dollar criminal business and exploiting these vulnerabilities creates a single point of failure for operations. Thus, understanding the detection, identification, and response to information security incidents is critical to protecting all levels of infrastructure. The lived experiences of current professionals indicate 10 unique themes in regards to how information security incidents are addressed in private organizations. These unique themes led the researc
APA, Harvard, Vancouver, ISO, and other styles
16

Yu, Suxiu. "Essays on Corporate Finance, Security Design and Information Choice." Thesis, Toulouse 1, 2017. http://www.theses.fr/2017TOU10028.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Fiore, Ugo. "Improving Network Anomaly Detection with Independent Component Analysis." Doctoral thesis, Universita degli studi di Salerno, 2015. http://hdl.handle.net/10556/1978.

Full text
Abstract:
2013 - 2014<br>Complexity, sophistication, and rate of growth of modern networks, coupled with the depth, continuity, and pervasiveness of their role in our everyday lives, stress the importance of identifying potential misuse or threats that could undermine regular operation. To ensure an adequate and prompt reaction, anomalies in network traffic should be detected, classified, and identified as quickly and correctly as possible. Several approaches focus on inspecting the content of packets traveling through the network, while other techniques aim at detecting suspicious activity by measuri
APA, Harvard, Vancouver, ISO, and other styles
18

Olsen, Brett C. "Essays on security issuance." Diss., Columbia, Mo. : University of Missouri-Columbia, 2007. http://hdl.handle.net/10355/6261.

Full text
Abstract:
Thesis (Ph.D.)--University of Missouri-Columbia, 2007.<br>The entire dissertation/thesis text is included in the research.pdf file; the official abstract appears in the short.pdf file (which also appears in the research.pdf); a non-technical general description, or public abstract, appears in the public.pdf file. Title from title screen of research.pdf file (viewed on March 24, 2009) Vita. Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
19

Dementis, Georgios Sousa Goncalo. "A legal reasoning component of a network security command and control system." Monterey, California : Naval Postgraduate School, 2010. http://edocs.nps.edu/npspubs/scholarly/theses/2010/Mar/10Mar%5FDementis.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, March 2010.<br>Thesis Advisor(s): Michael, James B. Second Reader: Wingfield, Thomas C. ; Sarkesain, John F. "March 2010." Description based on title screen as viewed on April 26, 2010. Author(s) subject terms: Cyberspace, Cyberspace Defense, Network Defense, Distributed Systems, Command and Control, Battle Management, Information Assurance, Situational Awareness. Includes bibliographical references (p. 73-77). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
20

Tran, Tam M. Allen James O. "Interoperability and security support for heterogeneous Cots/Gots/legacy component-based architecture." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2000. http://handle.dtic.mil/100.2/ADA383767.

Full text
Abstract:
Thesis (M.S. in Software Engineering) Naval Postgraduate School, Sept. 2000.<br>Thesis advisor(s): LuQi; Shing, Mantak. "September 2000." Includes bibliographical references (p. 63-65). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
21

Kukuruzovic, Naida. "Security Management : Fulfillment of the Government Requirements for a component assurance process." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-189983.

Full text
Abstract:
Protecting organization’s assets from various security threats is a necessity for every organization. Efficient security management is vital to effectively protect the organization’s assets. However, the process of implementing efficient security management is complex and needs to address many requirements. The problem that this master’s thesis project addressed was to propose a component assurance process for the Swedish Armed Forces. This process has to be followed in order for a solution or product to be approved at a specific component assurance level. This problem was solved by first perf
APA, Harvard, Vancouver, ISO, and other styles
22

Sousa, Goncalo. "A legal reasoning component of a network security command and control system." Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/5457.

Full text
Abstract:
Approved for public release; distribution is unlimited<br>There are numerous computer-aided tools to enable Computer Network Defense. However, their effectiveness in countering attacks is less than optimal when they are used independently of one another. Research has identified the requirements for an integrated command and control (C2) system that is able to conduct full-spectrum operations in the cyberspace environment. The most notable of that research revolves around the development and experimentation with the prototype system known as Cyber Command, Control and Information Operati
APA, Harvard, Vancouver, ISO, and other styles
23

Tran, Tam M., and James O. Allen. "Interoperability and security support for heterogeneous Cots/Gots/legacy component-based architecture." Thesis, Monterey, California. Naval Postgraduate School, 2000. http://hdl.handle.net/10945/9419.

Full text
Abstract:
There is a need for Commercial-off-the-shelf (COTS), Government-off- the-shelf (GOTS) and legacy components to interoperate in a secure distributed computing environment in order to facilitate the development of evolving applications. This thesis researches existing open standards solutions to the distributed component integration problem and proposes an application framework that supports application wrappers and a uniform security policy external to the components. This application framework adopts an Object Request Broker (ORB) standard based on Microsoft Distributed Component Object Model
APA, Harvard, Vancouver, ISO, and other styles
24

Hodges, Randy T. "The exegesis of culture as a critical component of Christian corporate worship." Theological Research Exchange Network (TREN), 1993. http://www.tren.com.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Peterson, Mikael. "CAESAR : A proposed method for evaluating security in component-based distributed information systems." Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2470.

Full text
Abstract:
<p>Background: The network-centric defense requires a method for securing vast dynamic distributed information systems. Currently, there are no efficient methods for establishing the level of IT security in vast dynamic distributed information systems. </p><p>Purpose: The target of this thesis was to design a method, capable of determining the level of IT security of vast dynamic component-based distributed information systems. </p><p>Method: The work was carried out by first defining concepts of IT security and distributed information systems and by reviewing basic measurement and modeling th
APA, Harvard, Vancouver, ISO, and other styles
26

Ziegan, Marius Christoph. "Essays on the determinants and costs of corporate security offerings." Thesis, University of Manchester, 2013. https://www.research.manchester.ac.uk/portal/en/theses/essays-on-the-determinants-and-costs-of-corporate-security-offerings(f687d966-21d1-46e0-987b-cf366b8ee456).html.

Full text
Abstract:
This thesis presents three essays on the determinants and costs of corporate security offerings. The essays contribute to an ongoing debate in the literature on what determines firms’ security choice by examining the following issues: “Does corporate governance influence convertible debt issuance?”; “The signaling content of security offerings proceeds”; and “The costs of raising capital: New evidence.”In the first essay, we explore the influence of corporate governance on firms’ choice between equity, convertible debt and straight debt. For a sample of Western European corporate security offe
APA, Harvard, Vancouver, ISO, and other styles
27

Mayisela, Simphiwe Hector. "Data-centric security : towards a utopian model for protecting corporate data on mobile devices." Thesis, Rhodes University, 2014. http://hdl.handle.net/10962/d1011094.

Full text
Abstract:
Data-centric security is significant in understanding, assessing and mitigating the various risks and impacts of sharing information outside corporate boundaries. Information generally leaves corporate boundaries through mobile devices. Mobile devices continue to evolve as multi-functional tools for everyday life, surpassing their initial intended use. This added capability and increasingly extensive use of mobile devices does not come without a degree of risk - hence the need to guard and protect information as it exists beyond the corporate boundaries and throughout its lifecycle. Literature
APA, Harvard, Vancouver, ISO, and other styles
28

Vorobiev, Artem. "An architectural approach to achieving higher-level security for component (service) based software systems." Swinburne Research Bank, 2008. http://hdl.handle.net/1959.3/47779.

Full text
Abstract:
Thesis (Ph.D) - Swinburne University of Technology, Faculty of Information & Communication Technologies, 2008.<br>Submitted in fulfillment of the requirements of for the degree of Doctor of Philosophy, Faculty of Information and Communication Technologies, Swinburne University of Technology, 2008. Typescript. Includes bibliographical references (p. 228-238)
APA, Harvard, Vancouver, ISO, and other styles
29

Armstrong, Helen L. "A soft approach to management of information security." Curtin University of Technology, School of Public Health, 1999. http://espace.library.curtin.edu.au:80/R/?func=dbin-jump-full&object_id=10235.

Full text
Abstract:
The key theme of this research is the planning and management of information security and in particular, the research focuses on the involvement of information stakeholders in this process. The main objective of the research is to study the ownership of, and acceptance of responsibility for, information security measures by stakeholders having an interest in that information.
APA, Harvard, Vancouver, ISO, and other styles
30

Armstrong, Helen. "A soft approach to management of information security." Thesis, Curtin University, 1999. http://hdl.handle.net/20.500.11937/1238.

Full text
Abstract:
The key theme of this research is the planning and management of information security and in particular, the research focuses on the involvement of information stakeholders in this process. The main objective of the research is to study the ownership of, and acceptance of responsibility for, information security measures by stakeholders having an interest in that information.
APA, Harvard, Vancouver, ISO, and other styles
31

Noe, Ewell Adriel. "A Discussion of Intercultural Relations as a Critical Component of Corporate Social Responsibility." Thesis, University of the Pacific, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10276597.

Full text
Abstract:
<p>Given the current state of unprecedented global interdependence, and the growing impact that business has on the world?s inhabitants, Corporate Social Responsibility has become something that is not only desirable, but also expected of corporations. The topic of this qualitative study is the conceptual and pragmatic links of Intercultural Relations and Corporate Social Responsibility. This research focused on an identified informational gap in social responsibility literature and investigated the possible impact of culture and intercultural competence on Corporate Social Responsibility wo
APA, Harvard, Vancouver, ISO, and other styles
32

Frey, Rüdiger, Lars Rösler, and Dan Lu. "Corporate Security Prices in Structural Credit Risk Models with Incomplete Information." Wiley, 2017. http://dx.doi.org/10.1111/mafi.12176.

Full text
Abstract:
The paper studies structural credit risk models with incomplete information of the asset value. It is shown that the pricing of typical corporate securities such as equity, corporate bonds or CDSs leads to a nonlinear filtering problem. This problem cannot be tackled with standard techniques as the default time does not have an intensity under full information. We therefore transform the problem to a standard filtering problem for a stopped diffusion process. This problem is analyzed via SPDE results from the filtering literature. In particular we are able to characterize the default intensity
APA, Harvard, Vancouver, ISO, and other styles
33

Momot, T. V., I. O. Filatova, and D. T. Momot. "Customer relationship management in the system of stakeholders-oriented corporate security." Thesis, Київський національний університет технологій та дизайну, 2018. https://er.knutd.edu.ua/handle/123456789/10138.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Ludbey, Codee Roy. "The corporate security stratum of work: Occupational ceilings, progression, and career success." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2019. https://ro.ecu.edu.au/theses/2238.

Full text
Abstract:
To meet the challenges of modern society organisations are becoming more complex, and so too are the occupations that support them, including the Corporate Security occupation. Within this complexity progression is a changing security environment that impacts business opportunity and societal expectations due to a shift away from risk acceptance (Beck, 1992). Subsequently, the study investigated the Corporate Security stratum of work within large organisations in order to understand career opportunity, complexity, and influence within the context of the socio-organisational literature. By grou
APA, Harvard, Vancouver, ISO, and other styles
35

Johnson, Kenneth Tyrone. "The Training Deficiency in Corporate America: Training Security Professionals to Protect Sensitive Information." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4145.

Full text
Abstract:
Increased internal and external training approaches are elements senior leaders need to know before creating a training plan for security professionals to protect sensitive information. The purpose of this qualitative case study was to explore training strategies telecommunication industry leaders use to ensure security professionals can protect sensitive information. The population consisted of 3 senior leaders in a large telecommunication company located in Dallas, Texas that has a large footprint of securing sensitive information. The conceptual framework on which this study was based was t
APA, Harvard, Vancouver, ISO, and other styles
36

Rempfer, Thomas L. "Anthrax vaccine as a component of the strategic national stockpile: a dilemma for Homeland Security." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Dec/09Dec%5FRempfer.pdf.

Full text
Abstract:
Thesis (Master of Arts in Security Studies(Homeland Security and Defense))--Naval Postgraduate School, December 2009.<br>Thesis Advisor: Supinski, Stanley. Second Reader: Lynch, Dean. "December 2009." Description based on title screen as viewed on January 29, 2010. Author(s) subject terms: Anthrax Vaccine Adsorbed; AVA; BioThrax; Homeland Security; Strategic National Stockpile; biodefense; bioterrorism; biological warfare; Amerithrax; Anthrax Vaccine Immunization Program; AVIP; Gulf War Illness; Gulf War Syndrome; Investigational New Drug, IND; Experimental; Civilian Control of the Military, P
APA, Harvard, Vancouver, ISO, and other styles
37

Elish, Karim Omar Mahmoud. "User-Intention Based Program Analysis for Android Security." Diss., Virginia Tech, 2015. http://hdl.handle.net/10919/54943.

Full text
Abstract:
The number of mobile applications (i.e., apps) is rapidly growing, as the mobile computing becomes an integral part of the modern user experience. Malicious apps have infiltrated open marketplaces for mobile platforms. These malicious apps can exfiltrate user's private data, abuse of system resources, or disrupting regular services. Despite the recent advances on mobile security, the problem of detecting vulnerable and malicious mobile apps with high detection accuracy remains an open problem. In this thesis, we address the problem of Android security by presenting a new quantitative program
APA, Harvard, Vancouver, ISO, and other styles
38

Rich, Ronald P., and Jonathan S. Holmgren. "Metric methodology for the creation of environments and processes to certify a component : specifically the Naval Research Laboratory Pump." Thesis, Monterey, California. Naval Postgraduate School, 2003. http://hdl.handle.net/10945/1102.

Full text
Abstract:
This thesis was completed in cooperation with the Cebrowski Institute for Information Innovation and Superiority.<br>Approved for public release; distribution is unlimited<br>A of the NP, but the key requirement for Certification and Accreditation is the creation of a Protection Profile and an understanding of the DITSCAP requirements and process. This thesis creates a Protection Profile for the NP along with a draft Type SSAA for Certification and Accreditation of the NP.<br>Lieutenant, United States Navy<br>Lieutenant, United States Navy
APA, Harvard, Vancouver, ISO, and other styles
39

Kulkarni, Keyur. "Android Malware Detection through Permission and App Component Analysis using Machine Learning Algorithms." University of Toledo / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1525454213460236.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Chau, Foo-cheong Sidney, and 周富祥. "Application the principles of corporate governance to enhance efficiency of airport security services." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2012. http://hub.hku.hk/bib/B5025456X.

Full text
Abstract:
Today, aviation security is at the forefront of public consciousness particularly when they think of their own personal safety. The dramatic and catastrophic attacks of 911, utilizing civil aviation resources has made the world view aviation security with a critical eye. It could be argued that the response by States and individual airports and airlines has been positive and rapid, however the effectiveness has been marginal. Many factors have been proffered as the reason, from ineffective conservative governments, out-dated equipment, old infrastructure to a traditional mind-set that does no
APA, Harvard, Vancouver, ISO, and other styles
41

Hammouri, Tariq M. "Improving Jordan's corporate loan security system : the floating charge; evaluation, modification and transplantation." Thesis, University of Bristol, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.247558.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Davis, Robert Elliot. "Relationship between Corporate Governance and Information Security Governance Effectiveness in United States Corporations." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3873.

Full text
Abstract:
Cyber attackers targeting large corporations achieved a high perimeter penetration success rate during 2013, resulting in many corporations incurring financial losses. Corporate information technology leaders have a fiduciary responsibility to implement information security domain processes that effectually address the challenges for preventing and deterring information security breaches. Grounded in corporate governance theory, the purpose of this correlational study was to examine the relationship between strategic alignment, resource management, risk management, value delivery, performance
APA, Harvard, Vancouver, ISO, and other styles
43

Michiel, Michael. "The institutionalisation of an information security culture in a petroleum organisation in the Western Cape." Thesis, Cape Peninsula University of Technology, 2018. http://hdl.handle.net/20.500.11838/2749.

Full text
Abstract:
Thesis (MTech (Information Technology))--Cape Peninsula University of Technology, 2018.<br>In today’s world, organisations cannot exist without having information readily available. The protection of information relies not only on technology but also on the behaviour of employees. The failure to institutionalise an information security culture inside an organisation will cause the continued occurrence of security breaches. The aim of the research is to explore how an information security culture can be institutionalised within a petroleum organisation in the Western Cape. The primary research
APA, Harvard, Vancouver, ISO, and other styles
44

Van, Niekerk Johannes Frederick. "Fostering information security culture through intergrating theory and technology." Thesis, Nelson Mandela Metropolitan University, 2010. http://hdl.handle.net/10948/1404.

Full text
Abstract:
Today information can be seen as a basic commodity that is crucial to the continuous well-being of modern organizations. Many modern organizations will be unable to do business without access to their information resources. It is therefor of vital importance for organizations to ensure that their infor- mation resources are adequately protected against both internal and external threats. This protection of information resources is known as information security and is, to a large extent, dependent on the behavior of humans in the organization. Humans, at various levels in the organization, play
APA, Harvard, Vancouver, ISO, and other styles
45

Sahd, Lize-Marie. "A structured approach to the identification of the significant risks related to enterprise mobile solutions at a mobile technology component level." Thesis, Stellenbosch : Stellenbosch University, 2015. http://hdl.handle.net/10019.1/96674.

Full text
Abstract:
Thesis (MComm)--Stellenbosch University, 2015.<br>ENGLISH ABSTRACT: The consumerisation of mobile technology is driving the mobile revolution and enterprises are forced to incorporate mobile solutions into their business processes in order to remain competitive. While there are many benefits relating to the investment in and use of mobile technology, significant risks are also being introduced into the business. The fast pace of technological innovation and the rate of adoption of mobile technology by employees has, however, created an environment where enterprises are deploying mobile s
APA, Harvard, Vancouver, ISO, and other styles
46

Holmgren, Jonathan S. Rich Ronald P. "Metric methodology for the creation of environments and processes to certify a component : specifically the Naval Research Laboratory Pump /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Mar%5FHolmgren.pdf.

Full text
Abstract:
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, March 2003.<br>Thesis advisor(s): George Dinolt, Craig Rasmussen. Includes bibliographical references (p. 155-157). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
47

O'Reilly, Conor Francis. "Towards state-corporate symbiosis : the role of the security consultancy industry in transnational policing." Thesis, Queen's University Belfast, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.479401.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Yeung, Ping E. "Belief-revisions after earnings announcements : evidence from security analysts' forecast revisions /." view abstract or download file of text, 2003. http://wwwlib.umi.com/cr/uoregon/fullcit?p3095287.

Full text
Abstract:
Thesis (Ph. D.)--University of Oregon, 2003.<br>Typescript. Includes vita and abstract. Includes bibliographical references (leaves 77-82). Also available for download via the World Wide Web; free to University of Oregon users.
APA, Harvard, Vancouver, ISO, and other styles
49

Levendal, Arend Randolph Dimitre. "Assessing cultural readiness for lean implementation at an automotive component manufacturer in Port Elizabeth." Thesis, Nelson Mandela Metropolitan University, 2017. http://hdl.handle.net/10948/18145.

Full text
Abstract:
Automotive component manufacturers face significant competitive challenges in the global market and are constantly looking for means to improve their competitive advantage. Organisations then often acquire lean tools as an attractive option to achieve this. Research has however highlighted that the underlying “Lean Culture” is what is really necessary for organisations to achieve and maintain a competitive advantage. According to Rother (2010) lean implementation can be seen as a project or an initiation of an on- going development process where learning is taking place. This implementation im
APA, Harvard, Vancouver, ISO, and other styles
50

McGee, Anthony. "Corporate security's professional project : an examination of the modern condition of corporate security management and the potential for further professionalisation of the occupation." Thesis, Cranfield University, 2010. http://dspace.lib.cranfield.ac.uk/handle/1826/4658.

Full text
Abstract:
There is a common perception among corporate security managers that their occupation is afforded less status and is rewarded less well than the other management functions within business. In response to similar conceptions of the need to raise the value and status of their work, other occupations have historically embarked on so-called ‘professional projects’ whereby they collectively attempt to harness their specialist skills and knowledge as a commodity, the value of which they seek to raise and maintain. This small- scale qualitative study is intended to provide an insight into the analysis
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!