Rozprawy doktorskie na temat „Information security practice tests”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 32 najlepszych rozpraw doktorskich naukowych na temat „Information security practice tests”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.
Ashenden, D. M. "Information security awareness : improving current research and practice". Thesis, University College London (University of London), 2015. http://discovery.ucl.ac.uk/1469598/.
Pełny tekst źródłaWilliams, Patricia A. "An investigation into information security in general medical practice". Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2007. https://ro.ecu.edu.au/theses/274.
Pełny tekst źródłaHove, Cathrine, i Marte Tårnes. "Information Security Incident Management : An Empirical Study of Current Practice". Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2013. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-22651.
Pełny tekst źródłaMahncke, Rachel J. "Measuring and applying information security governance within general medical practice". Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2016. https://ro.ecu.edu.au/theses/1797.
Pełny tekst źródłaMirbaz, Jamshid. "Säkerhetsstyrning inom den Finansiella Sektorn : En Studie på Best Practice hos Tre Svenska Banker". Thesis, KTH, Industriella informations- och styrsystem, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-98863.
Pełny tekst źródłaVega, Laurian. "Security in Practice: Examining the Collaborative Management of Sensitive Information in Childcare Centers and Physicians' Offices". Diss., Virginia Tech, 2011. http://hdl.handle.net/10919/37552.
Pełny tekst źródłaPh. D.
Shear, Christopher James. "Business counterintelligence : sustainable practice or passing fad?" Thesis, Stellenbosch : University of Stellenbosch, 2009. http://hdl.handle.net/10019.1/1930.
Pełny tekst źródłaTraditional information protection mechanisms are no longer adequately placed to effectively deal with the adversarial threats that have arisen as a result of the rise in importance of knowledge for today’s organisations. Business counterintelligence appears to be a protective entity, which in principle can effectively engage with and mitigate many of these newly manifested threats. Yet, business counterintelligence is also an entity that is accompanied by a great deal of haze and confusion as to its use, implementation and integration within different organisations. This is evident from the literature where there currently exist multiple fragmented definitions of what business counterintelligence is. Organisations may as a result adopt a particular business counterintelligence definition that may not be effective for their context. This can result in the ineffective protection of critical information assets and the misappropriation of organisational resources; something which is not sustainable. This thesis proposes that in order to allay the confusion caused by these differing fragmented definitions, one needs to be able to arrive at a consolidated definition of what constitutes business counterintelligence; this thesis’s primary objective. This has been examined by firstly contextualising business counterintelligence in order to better understand the topic; the information society was used as a backdrop for this purpose. Secondly, an examination of the prevailing views of business counterintelligence and its role within organisations is offered in order to build clarity. Thirdly, a consolidated definition of business counterintelligence is proposed and its implications for different organisations examined. Finally, the implications of this consolidated definition for the sustainability of business counterintelligence are discussed and conclusions based on the evidence presented within the thesis drawn. Based on the arguments presented, this thesis postulates that a consolidated definition of business counterintelligence is more effective and is thus more sustainable.
Sestorp, Isak, i André Lehto. "CPDLC in Practice : A Dissection of the Controller Pilot Data Link Communication Security". Thesis, Linköpings universitet, Institutionen för datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-159840.
Pełny tekst źródłaSarmonpal, Sandra. "Learning Analytics from Research to Practice| A Content Analysis to Assess Information Quality on Product Websites". Thesis, Pepperdine University, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=13421041.
Pełny tekst źródłaThe purpose of this study was to examine and describe the nature of the research to practice gap in learning analytics applications in K12 educational settings. It was also the purpose of this study to characterize how learning analytics are currently implemented and understood. A secondary objective of this research was to advance a preliminary learning analytics implementation framework for practitioners. To achieve these purposes, this study applied quantitative content analysis using automated text analysis techniques to assess the quality of information provided on analytics-based product websites against learning analytics research. Because learning analytics implementations require adoption of analytical tools, characterizing content on analytics-based product websites provides insight into data practices in K12 schools and how learning analytics are practiced and understood. A major finding of this study was that learning analytics do not appear to be applied in ways that will improve learning outcomes for students as described by the research. A second finding was that policy influence expressed in the study corpus suggest competing interests within the current policy structure for K12 education settings. Keywords: quantitative content analysis, automated text analysis, learning analytics, big data, frameworks, educational technology, website content analysis
Nguyen, Ngoc Tan. "A Security Monitoring Plane for Information Centric Networking : application to Named Data Networking". Thesis, Troyes, 2018. http://www.theses.fr/2018TROY0020.
Pełny tekst źródłaThe current architecture of the Internet has been designed to connect remote hosts. But the evolution of its usage, which is now similar to that of a global platform for content distribution undermines its original communication model. In order to bring consistency between the Internet's architecture with its use, new content-oriented network architectures have been proposed, and these are now ready to be implemented. The issues of their management, deployment, and security now arise as locks essential to lift for Internet operators. In this thesis, we propose a security monitoring plan for Named Data Networking (NDN), the most advanced architecture which also benefits from a functional implementation. In this context, we have characterized the most important NDN attacks - Interest Flooding Attack (IFA) and Content Poisoning Attack (CPA) - under real deployment conditions. These results have led to the development of micro-detector-based attack detection solutions leveraging hypothesis testing theory. The approach allows the design of an optimal (AUMP) test capable of providing a desired false alarm probability (PFA) by maximizing the detection power. We have integrated these micro-detectors into a security monitoring plan to detect abnormal changes and correlate them through a Bayesian network, which can identify events impacting security in an NDN node. This proposal has been validated by simulation and experimentation on IFA and CPA attacks
Lukweza, Chishala. "An investigation into the state-of-practice of information security within Zambian copper mines: a case study". Thesis, Rhodes University, 2011. http://hdl.handle.net/10962/d1002776.
Pełny tekst źródłaTidwell, Craig Leonard. "Testing the impact of training with simulated scenarios for information security awareness on virtual community of practice members". Doctoral diss., University of Central Florida, 2011. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/5058.
Pełny tekst źródłaID: 029809175; System requirements: World Wide Web browser and PDF reader.; Mode of access: World Wide Web.; Thesis (Ph.D.)--University of Central Florida, 2011.; Includes bibliographical references (p. 189-196).
Ph.D.
Doctorate
Engineering and Computer Science
Modeling and Simulation
Al, Smadi Duha. "Information Sharing and Storage Behavior via Cloud Computing: Security and Privacy in Research and Practice and Users' Trust". Thesis, University of North Texas, 2019. https://digital.library.unt.edu/ark:/67531/metadc1505164/.
Pełny tekst źródłaGarcia-Patron, Sanchez Raul. "Quantum information with optical continuous variables: from Bell tests to key distribution". Doctoral thesis, Universite Libre de Bruxelles, 2007. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/210655.
Pełny tekst źródłaDoctorat en Sciences de l'ingénieur
info:eu-repo/semantics/nonPublished
Siganto, Jean Josephine. "Transparent, balanced and vigorous: The exercise of the Australian Privacy Commissioner's powers in relation to National Privacy Principle 4". Thesis, Queensland University of Technology, 2015. https://eprints.qut.edu.au/83792/4/Jean_Siganto_Thesis.pdf.
Pełny tekst źródłaWang, Qianxue. "Création et évaluation statistique d'une nouvelle de générateurs pseudo-aléatoires chaotiques". Thesis, Besançon, 2012. http://www.theses.fr/2012BESA2031.
Pełny tekst źródłaIn this thesis, a new way to generate pseudorandom numbers is presented. The propositionis to mix two exiting generators with discrete chaotic iterations that satisfy the Devaney’sdefinition of chaos. A rigorous framework is introduced, where topological properties of theresulting generator are given, and two practical designs are presented and evaluated. It is shownthat the statistical quality of the inputted generators can be greatly improved by this way, thusfulfilling the up-to-date standards. Comparison between these two designs and existing generatorsare investigated in details. Among other things, it is established that the second designedtechnique outperforms the first one, both in terms of performance and speed.In the first part of this manuscript, the iteration function embedded into chaotic iterations isthe vectorial Boolean negation. In the second part, we propose a method using graphs havingstrongly connected components as a selection criterion.We are thus able to modify the iterationfunction without deflating the good properties of the associated generator. Simulation resultsand basic security analysis are then presented to evaluate the randomness of this new family ofpseudorandom generators. Finally, an illustration in the field of information hiding is presented,and the robustness of the obtained data hiding algorithm against attacks is evaluated
Montesdioca, Gustavo Percio Zimmermann. "Satisfação do usuário com as práticas de segurança da informação". reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2013. http://hdl.handle.net/10183/72774.
Pełny tekst źródłaInformation security is a major concern for management in recent decades and responsible for major losses in organizations. The prevention of these problems can be achieved through user education and awareness on using technology safely, using practices that are consistent with the information security policies on firm. Managers face difficulties to understand and decide what action should be taken to protect information systems. Lack of knowledge and metrics on the information security are the main problems reported by managers for decision on information security investments. Several studies indicate that user involvement and investment in training and awareness are the most effective way to avoid problems related to information security. User satisfaction is one of the proven ways to measure the quality of investment and use intention of information systems. The objective of this research is to develop an instrument to measure user satisfaction with information security practices. To achieve this goal, factors to measure IS user satisfaction were identified on literature. A research instrument was developed based on these factors to measure user satisfaction with information security practices. A conceptual model was developed and a survey was conducted with enterprise information systems users. There was obtained a total of 173 usable questionnaires. Structural equation modeling covariance-based was used to evaluate model and research hypotheses. The result indicates satisfaction with percept benefits from information security compared with efforts to achieve them, but user dissatisfaction over the information systems use with security practices.
Norris-Jones, Lynne. "Demonstrate and document : the development of a best practice model for biometric access control management". Thesis, Cardiff Metropolitan University, 2011. http://hdl.handle.net/10369/6411.
Pełny tekst źródłaRapp, Axel. "Web site security maturity of the European Union and its member states : A survey study on the compliance with best practices of DNSSEC, HSTS, HTTPS, TLS-version, and certificate validation types". Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-20127.
Pełny tekst źródłaCarvalho, Luciano Gonçalves de. "Requisitos e testes de segurança para brinquedos inteligentes". Universidade de São Paulo, 2017. http://www.teses.usp.br/teses/disponiveis/100/100131/tde-15022018-003245/.
Pełny tekst źródłaToys are an essential part of our culture, and they have evolved over time. Currently, we can find in the market toys equipped with electronic circuits and sensors able to collect environmental and personal data from users. They are also able to automatically connect to communication networks through wireless network protocols in order to access mobile services aiming at customizing the gaming experience for each user. Known as smart toys, these are part of a so-called toy computing environment, consisting of a physical toy, a mobile device, which can be a tablet or smartphone, and a mobile app, which can control the physical toy and share information with mobile services. This new type of toy, which belongs to a new type of environment and also present characteristics of the Internet of Things, raises issues regarding information security which did not exist in conventional toys. Such issues, hence, should be treated in a way to avoid losses to the users of this technology. Accordingly, this research project presents twenty two (22) general security requirements identified following the Microsoft Security Development Lifecycle (SDL) and the threat modeling supported by the threat model STRIDE (Spoofing identity, Tampering with data, Repudiation, Information disclosure, Denial of service e Elevation of privilege). These requirements address security issues that smart toys should meet to avoid the main existent threats. All considered issues were extracted from the Childrens Online Privacy Protection Act (COPPA), General Data Protection Regulation (GDPR) and Personal Information Protection and Electronic Documents Act (PIPEDA). Furthermore, we have also identified a general set of security tests based on the SDL process to check whether the identified security requirements have been met. A further analysis of the smart toys currently available in the market and their publicly related security flaws give evidence of the importance of meeting the proposed security requirements and executing the proposed security tests to avoid several security problems
Roberts, Anthea Elizabeth. "Is International Law International?" Phd thesis, Canberra, ACT : The Australian National University, 2017. http://hdl.handle.net/1885/124611.
Pełny tekst źródłaLin, Gary, i 林俊銘. "Enterprise Information Security - Backup Systems Planning and Practice". Thesis, 2002. http://ndltd.ncl.edu.tw/handle/47151235587414698218.
Pełny tekst źródła國立中山大學
國際高階經營管理研究所
90
It is well understood that competitiveness is the foundation of business. Efficient information acquisition, distribution and protection proves to not only improve business’ competitiveness but also extend business value to both business partners and customers. Consequently, Information Security has been the rigorous and sustaining challenge to the business. Thanks to the booming evolution of information technology, business nowadays has proliferated it widely for business operations. Sept 11 catastrophe in US has brought to business a significant yet unforeseen impact — information security reassessment on both backup systems and disaster recovery planning. This document aims at exploring the status quo of domestic enterprises in this regard as well as possible obstacles of the implementation. Through field research and thorough understanding, we’ve observed the differentiation among the industries we investigated. Meanwhile, we hoped to come out some solid recommendations and awareness to the business by applying generally acknowledged standard — BS7799 rules and policies. With that in mind, enterprises then would be able to move themselves faster toward globalization. For a long time, IT professionals tend to use tape or jukebox as primary data backup media. Today, we can only rely on those tools for alternatives. By current working field, I’m taking the advantage by introducing high-level technologic system frameworks, practices and experiences from international key players in this field. Enterprises are also recommended to start the “BIA — Business Impact Analysis” to outline a proper DR and Contingency Plan for the sake of substantial and continual support to business interests and long-term benefits!
Lessing, Martha Maria. "A model for best practice driven information security governance". Thesis, 2008. http://hdl.handle.net/10210/524.
Pełny tekst źródłaProf. S. H. von Solms
Wang, Ji Hsian, i 王繼顯. "Verification and Practice of Enterprise Information Security Pattern and Knowledge within Ontology Method". Thesis, 2007. http://ndltd.ncl.edu.tw/handle/77748723698840124016.
Pełny tekst źródła國防管理學院
國防資訊研究所
95
The application that is popularized with information technology and products extensively, each enterprise realizes the operation purpose by information technology and policy of information safety. However, the characteristic of the question of information safety emerges in an endless stream, making enterprise's information threaten to heighten with loophole safely, the work of stipulating, revising and carrying out etc. Relative to enterprise's information policy, enterprises will face stricter and stricter challenge. Similarly, enterprises will consider the condition and limiting factor inside or outside the norm of international information safety, enterprise in the stipulating of policy of information safety. But, are the rules consistent with international regulations while stipulating the policy? And will it producing different understanding because knowledge backgrounds are different and considering the limiting factor? How do enterprises utilize information security knowledge to stipulate the policy of information safety effectively? So, this paper constructs the domain knowledge base of the information safety with ontology method, through the knowledge tool, such knowledge as the safety measure of using BS7799 information constructs in the knowledge base of the field to be with standard safety management…etc. Put forward the concept structure design of the basic grammar and analysis, understand the norm by way of picture, and fit present situation knowledge of enterprise's information security and threaten knowledge to combine, help the policymaker to make or improve the information security of enterprises and fit the policy effectively, so that to help to increase the competition advantage in enterprises, and then the information of strengthening enterprises information security.
"Best practice strategy framework for developing countries to secure cyberspace". Thesis, 2015. http://hdl.handle.net/10210/15091.
Pełny tekst źródłaCyber issues are global phenomena in a world of inter-related systems, and as such, the discussion on cybersecurity frameworks, policies and strategies inevitably requires reference to, and benchmarking with regional, continental and global trends and solutions. This, in the context of the effects of globalisation on developing countries, with specific reference to areas such as Africa as a developing continent with regard to the protection of its cyberspace. More drastic measures, such as the utilization of cyber warfare techniques and pre-emptive cyber strike-teams in addition to traditional cybersecurity mechanisms as an essential part of a national security effort to protect cyberspace has become more prevalent within the developed worlds. Likewise, developing nations need to gear themselves in a structured, coordinated and responsible way in order to do their part to secure their own environments. Cyberspace is a dynamic global environment with cyber related issues being a global concern. Although countries generally regulate their own cyber environment through policy; cross-border cyber issues are difficult to resolve and the lack of international cyber laws impede cybersecurity efforts. Cybercrime and the management of cross-border cyber incidents are becoming a growing national security concern as the lack of effective controls leave critical infrastructure and the cyber-connected environment vulnerable to attack. Some developing countries are on track with the maturity of their cybersecurity initiatives, but appropriate cybersecurity frameworks for many developing countries require careful consideration, especially due to the lack of resources, infrastructure and local technology development capabilities.
Raykova, Mariana Petrova. "Secure Computation in Heterogeneous Environments: How to Bring Multiparty Computation Closer to Practice?" Thesis, 2012. https://doi.org/10.7916/D8GH9R2Z.
Pełny tekst źródłaTU, FANG-SHENG, i 涂芳聖. "A Practice Research of Computer Mediated Communication Software on Team Performance of Outsourcing Project of Information Security". Thesis, 2017. http://ndltd.ncl.edu.tw/handle/57196850656691960646.
Pełny tekst źródła輔仁大學
資訊管理學系碩士在職專班
105
In recent years, outsourcing has become’s a trend for enterprises to obtain information security system. On information security, it specially need to coordinate the manpower and timetable through various meetings or communication tools to accomplish the established objectives. Due to the rapid development of communication tools, various CMC software provides the instant communication and interaction between the members of the organization, and whether these can help the team to achieve the best team performance. In this research, uses instant messaging software, Email , social networking for the independent variables, on the research to influence process of communication, interaction, social network and team performance. Samples were collected from various information security management professions in Taiwan with 130 valid questionnaires retrieved. In this study, we have 3 result as fellow: 1.Instant messaging software and email all positively influence communication process, team interaction, social networks and project team of the information security project. It show that hat CMC software can improve the team performance of information security project. 2.Most of the project information security team regularly connected through e-mail to do regular progress reports, question replies and discussion. 3.The respondents agree that the mobile communication platform and Facebook are good quality communication tools, but in these two tools is not significant to influence communication process, team interaction, social networks and project team of the information security project.
Botha, Carla-Lee. "A gab analysis to compare best practice recommendations legal requirements when raising information security awareness amongst home users of online banking". Diss., 2011. http://hdl.handle.net/10500/5457.
Pełny tekst źródłaBusiness Information systems
Msc. (Information systems)
Botha, Carla-Lee. "A gap analysis to compare best practice recommendations and legal requirements when raising information security awareness amongst home users of online banking". Diss., 2011. http://hdl.handle.net/10500/5457.
Pełny tekst źródłaBusiness Information systems
Msc. (Information systems)
Mahopo, Ntombizodwa Bessy. "A risk based approach for managing information technology security risk within a dynamic environment". Diss., 2015. http://hdl.handle.net/10500/21925.
Pełny tekst źródłaComputing
M. Sc. (Computing)
Maguraushe, Kudakwashe. "Development of a diagnostic instrument and privacy model for student personal information privacy perceptions at a Zimbabwean university". Thesis, 2021. http://hdl.handle.net/10500/27557.
Pełny tekst źródłaSchool of Computing
Ph. D. (Information Systems)
Perkins, Catharina Elizabetha. "The management of an information technology infrastructure in schools in the Western Cape Province". Diss., 2012. http://hdl.handle.net/10500/9266.
Pełny tekst źródłaRekenaar infrastruktuur by sekondere skole in die WKOD (Wes Kaapse Onderwys Departement) word in die navorsing beskryf. Die studie ondersoek verskillende strukture naamlike skole wat 'n voltydse netwerk administrateur het en skole waar 'n onderwyser die verantwoordelikheid aanneem van 'n netwerk administrateur. Die effektiewe beheer van rekenaar infrastrukture word bespreek. Dit sluit hardeware, sagteware, beleid formulasie, rekenaar netwerk, sekuriteit, personeel bestuur, en BYOD (bring jou eie toestel). Die bestuur van rekenaar infrastruktuur verskil van skool tot skool en die effektiewe bestuur daarvan word deur baie faktore beinvloed. Die kwantitatiewe studie het probleem areas vir die bestuur van rekenaar infrastruktuur by sekondere skole in die WKOD uitgewys. Die kwantitatiewe studie het verder die behoefte vir beste praktyk riglyne uitgewys om sodoende better dienslewering te verseker. Die literere studie het beste praktyk riglyne vir rekenaar infrastruktuur bestuur genoem.
Educational Leadership and Management