Дисертації з теми "Information security projects"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-33 дисертацій для дослідження на тему "Information security projects".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.
Tshabalala, Obediant. "Critical success factors of information security projects." Thesis, Nelson Mandela Metropolitan University, 2016. http://hdl.handle.net/10948/10397.
Повний текст джерелаBasson, Delton Jade. "Managing infrastructure risks in information communication technology outsourced projects : a case study at Transnet, South Africa." Thesis, Cape Peninsula University of Technology, 2017. http://hdl.handle.net/20.500.11838/2535.
Повний текст джерелаThe balance between the dependency on Information and Communications Technology (ICT) and reducing costs has led to an increase in ICT outsourcing in many organisations. ICT outsourcing has benefits, but organisations have limited knowledge on information security and risks when outsourcing these functions. A lack of information security knowledge or a poor organisational risk culture carries the risk of project failure and security breaches. It is unclear how to manage information risks through the usage of ICT infrastructure risk management when outsourcing ICT projects, and this exposes organisations to ICT security risks. The aim of the study is to explore how a selected transport organisation can manage information risks through the usage of infrastructure risk management when outsourcing ICT projects. Two primary research questions are posed namely, “what information risks does the ICT department manage when outsourcing ICT projects?”, and “how can the ICT department protect their information through the usage of infrastructure risk management against ICT security threats when outsourcing ICT?” To answer these two questions, a study was conducted at a transport organisation in South Africa. A subjective ontological and interpretivist epistemological stance has been adopted and an inductive research approach was followed. The research strategy was a case study. Data for this study was gathered through interviews (17 in total) using semi-structured questionnaires. Data collected were transcribed, summarised, and categorised to provide a clear understanding of the data. For this study, forty findings and eight themes were identified. The themes are ICT outsourcing, information risks, costs, ICT vendor dependency, vendor access and management, risk management, user awareness, and frameworks. Guidelines are proposed, comprising six primary components. The results point to gaps that need to be addressed to ensure that information is protected when outsourcing ICT projects. Measures need to be put in place and communication has to be improved among operating divisions. The findings lead to questions such as, ““how does business create an ICT security culture to ensure that information is protected at all times”, and “does vendor access management really get the necessary attention it requires?” Further studies on human behaviour towards ICT security is needed to ensure the protection of organisations against security risks.
Wells, William Ward. "Information security program development." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2585.
Повний текст джерелаMa, Chunyan. "Mathematical security models for multi-agent distributed systems." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2568.
Повний текст джерелаAndersson, Mari-Louise. "Securing an ERP Implementation." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-1882.
Повний текст джерелаAn implementation project of an ERP system results in large changes. Organizations
that face an ERP implementation project have several risks to
consider in order to avoid problems that cause failures. The purpose of
this research is to extend existing models and create a method for implementation
of ERP systems. The method has then been employed to an
ongoing project at the department of Procurement and Supply at Ericsson
Mobile Platforms in Lund. Objectives for the research are to consider
which implementation strategy can be used and how an organization can
minimize risks.
The research approach and methodology is influenced by the qualitative
research method since it was necessary to gather qualitative facts instead
of quantitative facts. Included is also a case study due to the research is
executed within Ericsson Mobile Platforms in Lund.
There are two main opposite implementation strategies, Big Bang and
Step-by-Step. The choice of implementation strategy depends on number
of factors like the size of the organizations, complexity and resources.
A method of ERP implementation has been put forward as a result of the
integrated models. The method includes an overall model and a check list.
Risk identification is a problem that many implementation project faces, a
way to solve this is to make a careful risk analysis, a risk matirx with several
identified risks are putted forward throughout this study.
Martinez, Antonio. "Information management and the biological warfare threat." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://sirsi.nps.navy.mil/uhtbin/hyperion-image/02Mar%5FMartinez.pdf.
Повний текст джерелаLachheb, Tawfik. "A secure client/server java application programming interface." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2561.
Повний текст джерелаStocking, Galen Asher Thomas. "The threat of cyberterrorism: Contemporary consequences and prescriptions." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2590.
Повний текст джерелаPrati, Marco. "ROP Gadgets hiding techniques in Open Source Projects." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/4682/.
Повний текст джерелаReis, David W. "An Examination of an Information Security Framework Implementation Based on Agile Values to Achieve Health Insurance Portability and Accountability Act Security Rule Compliance in an Academic Medical Center: The Thomas Jefferson University Case Study." NSUWorks, 2012. http://nsuworks.nova.edu/gscis_etd/286.
Повний текст джерелаChen, Tang-Li. "Designing secure, JAVA based online registration systems to meet peak load performance targets." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2767.
Повний текст джерелаChinpanich, Vorapong. "Helpdesk Support Alert System." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2674.
Повний текст джерелаMacdonell, James Patrick. "MiniCA: A web-based certificate authority." CSUSB ScholarWorks, 2007. https://scholarworks.lib.csusb.edu/etd-project/3256.
Повний текст джерелаHsiao, Chih-Wen, David Turner, and Keith Ross. "A secure lightweight currency service provider." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2594.
Повний текст джерелаPatton, George Allen. "Supporting and Securing Personal Mobile Devices Within an Existing Information Technology Environment." ScholarWorks, 2014. https://scholarworks.waldenu.edu/dissertations/124.
Повний текст джерелаHvězda, Ondřej. "Posouzení informačního systému firmy a návrh změn." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2017. http://www.nusl.cz/ntk/nusl-316713.
Повний текст джерелаDhir, Amit. "Online project management system." CSUSB ScholarWorks, 2005. https://scholarworks.lib.csusb.edu/etd-project/2919.
Повний текст джерелаDeng, Ni. "A secure, payment-based email delivery system." CSUSB ScholarWorks, 2005. https://scholarworks.lib.csusb.edu/etd-project/2909.
Повний текст джерелаInnocenti, Federica. "Analisi e riprogettazione del processo di ict risk management: un caso applicativo in Telecom Italia." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/6708/.
Повний текст джерелаPejanovic, Trivko. "Information management : best practices in broad base industries / Trivko Pejanovic." Thesis, North-West University, 2006. http://hdl.handle.net/10394/1564.
Повний текст джерелаSolorio, Rigoberto. "A WEB-BASED TEMPERATURE MONITORING SYSTEM FOR THE COLLEGE OF ARTS AND LETTERS." CSUSB ScholarWorks, 2015. https://scholarworks.lib.csusb.edu/etd/129.
Повний текст джерелаBerrios-Ayala, Mark. "Brave New World Reloaded: Advocating for Basic Constitutional Search Protections to Apply to Cell Phones from Eavesdropping and Tracking by Government and Corporate Entities." Honors in the Major Thesis, University of Central Florida, 2013. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/1547.
Повний текст джерелаB.S.
Bachelors
Health and Public Affairs
Legal Studies
HUNG, YUN-RU, and 洪韻茹. "Missing Personal Information Project for Information Security Risk Assessment Anomaly Detection." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/2ba464.
Повний текст джерела國立高雄科技大學
金融資訊系
107
Nowadays, enterprises and companies rely more and more on computer system. Information security and risk assessment become an important key to protect information in the organization. Utilizing information technology to enhance working efficiency can become competitive, which strengthen the importance of information security. The assessment is an effective way to improve information security. However, those data and results may be wrong due to personal negligence. For many cases, risk assessments always rely on some specific person’s experience and their own definition. Everyone has their personal recognition and tolerance to “Risk.” As a result, even people use the same way to do evaluation, the risk rating may be different because of subjective bias or evaluation error. This thesis is to establish an effective detection mechanism through machine learning. This mechanism can detect and markup those error field in personal information rapidly and accurately. It can minimize the range of abnormal information and reduce the time that inspectors execute risk assessments. Therefore, with the mechanism of machine learning, organization can not only reduce cost in human resource but enhance the accuracy and efficiency in execute detection.
GONG, GI-GANG, and 宮志堅. "ARIS-based information security project management and work flow design." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/11942460786190969311.
Повний текст джерела開南大學
資訊管理學系
97
Along with enterprise, exterior fast information and company size growth, information utilization and dependent also unceasing increase, however many elements of certainty which produces regarding the information security administration center have actually existed. This research is for the purpose of by the project management 5 process carrying out the information safety control flow, establishes a set also to be possible to inspect the information security along with the advance in technology method. This research based on the ARIS project management core flow methodology and the ISO27001 information safety requirements item design information security project management flow and the working standard pattern, and draws up a set of information security project management flow and the working standard pattern. The permeable project management flow way, will have provided the information safety managers to carry on the control, then the effective management and assists the organization to complete the goal of the information safety control. Keywords:Information security, project management, ARIS, ISO27001, project management flow, working standard
Lee, Shin-Kai, and 李幸鎧. "A Study of Information Security Project-The Case of Navy." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/62986609591843291507.
Повний текст джерела義守大學
管理學院碩士班
98
This project is about the correlation between director of the unit, user and the information security controller, when the Navy implement the information security control. The results are based on the samplings from afew of Naval unit. There are 394 valid samplings, and which analyzed through statistic program. The results are as follows: 1.The effect through the policy of information security is conspicuous. 2.Different positions bring about various recognition.
Tu, Yuan-Chih, and 杜遠志. "A Study of Collaborative Technical Support Model and Performance Index on Information Security Project Collaborated by Consultant Under Cloud Information Security Solutions." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/92665577583928454344.
Повний текст джерела輔仁大學
資訊管理學系碩士在職專班
103
The cloud computing security solutions can protect the security of business operations, while maintaining the cloud information security must rely on professional and technical support. The professional and technical consultants and information security service providers offer cloud cooperation technology support for enterprise customer’s information security technical support services. This study will explore collaborative technical support model of professional and technical consultants, as well as the impact by the cloud service mode at cloud computing era. The research uses secondary data analysis methods to collect a variety of cloud information security solutions and its technical support model, and study the differences between technical support mode and cloud technology support mode. Secondly, interviews with experts to survey the relevance between consultant’s cooperative technical support and technical support requirements and technical support performance, to confirm information security collaborative technical support model and Performance indicators on information security project collaborated by consultant. The results are as follows: 1.Proposed cloud information security collaborative technical support model that is combining cloud services with traditional information security consultant to illustrate the technical support work and roles at information security project collaborated by consultant under cloud information security solutions. 2.The traditional technical support model, include (1).information security hardware device setup and configuration, (2).information security software system deployment and installation, (3).information security network infrastructure, (4).information security detection and reporting, (5).information security facility maintenance and warranty, (6).information security education, training and certification. Consultants believe that in addition to education and certification of information security, the remaining five have cloud collaborative technical support solutions to provide support service. 3.Information security technical support for enterprise under cloud information security solutions, consultants believe that still tend to choose technical consultants to support collaborative rather than selecting cloud technology support model of the cloud information security service provider. In the enterprise end, information security hardware device setup and configuration, information security software system deployment and installation, information security network infrastructure, should be supported by professional technical consultants. In addition, information security detection and reporting, information security facility maintenance and warranty, information security education, training and certification, enterprises will continue to request technical support services of consultant.
Chang, Hong-Jen, and 張宏仁. "Interpreting the IT Project Implementation Process:A Case Study on Information Security Software Corporation’s JSOX Implementation." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/39513869705828945381.
Повний текст джерела國立臺灣大學
資訊管理學研究所
99
For a corporation to implement an IT project, in general, had been treated as a “technology” deployment. During the recent years, due to the technology has become more standardized and less additional new technology needed, the business process has become more and more impor-tant to introduce a successful project. This thesis is base on a business case of a leading security software corporation to deliver an IT JSOX compliance project which is newly announced by Japan government to enforce the pub-lic companies which are listed in Japan stock exchange market. According to the nature of this company are a technology leading corporation which might need to closely chase the fast pace technology in the world in order to sustain its leading position. Once the company needs to adopt the JSOX requirements, it introduces the necessities of standard processes and tight approval processes which somehow violate the core culture of this company. However, this is a legal requirements to comply; therefore, there is a specific project team has been formed and successfully passed auditing for 2 successive years. In order to understand how the project team has been successful to give an analysis to generate the valuable key factors for other similar corporation which might have similar type of projects to implement for refer-ences, this research using the technological frame theory model to identify the indicators by giv-ing interviewing with several key members of this project team and try to find out something in-teresting and valuable findings and suggestions. Along with the research, we shall look into how and why the JSOX compliance been formed; key compliance framework in the IT industry that are also perform the similar approach-ing; the key factors and relationship of the organization behavior and personal behavior; also the theory of technological frame’s methodology. Base on the reference theories and frameworks; try to build up the linkage between the case itself with and gathering the finding in between. Also, base on the theories described, through the semi-constructed interviewing methodology to give individual interviewing with several key members of the JSOX project team of the company to come out the basis of this research. Finally, base on the findings have been generated from this research, also my past experience on the implementation of IT projects, summarize the key factors of the success of the im-plementation of the project described and also give the additional suggestions for further imple-mentation, hope to give a full set of reference items for a company who might have the same sit-uation and needs to deploy the compliance-like IT projects. Hopefully, from the planning till full implementation life cycle, the result can help this kind of enterprise to have a better provision to the potential situation they will need to face to.
Chou, Hung-Ting, and 周竑廷. "A Study of Information Security Project Management with Capability Maturity Model Integration and Service Level Agreements." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/71059851978389810809.
Повний текст джерела華梵大學
資訊管理學系碩士班
102
In the 21st century, people for quality and after-sales service requirements of the product after the transaction is getting more attention in the information technology industry for more attention to the overall quality and standards of service, the British Government in 1980 set out the AD an information technology industry management standards framework to both equity as a starting point, clearly defined obligations of the parties in the agreement to ensure product quality and standards. On the military engaged in the information sector after a period of time to find the administrative procedures for public sector construction project information service standards, quality management, and the contract has a sophisticated set of space, this research project to build the core of information security, in order to reduce project build failure conditions, to organize inter-unit group brainstorming discussions to identify the key causes, effects, and perform hierarchical analysis, failure mode and effects analysis by the case brought output weights, as the future of information security project to build a reference to improve military security project build quality.
TU, FANG-SHENG, and 涂芳聖. "A Practice Research of Computer Mediated Communication Software on Team Performance of Outsourcing Project of Information Security." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/57196850656691960646.
Повний текст джерела輔仁大學
資訊管理學系碩士在職專班
105
In recent years, outsourcing has become’s a trend for enterprises to obtain information security system. On information security, it specially need to coordinate the manpower and timetable through various meetings or communication tools to accomplish the established objectives. Due to the rapid development of communication tools, various CMC software provides the instant communication and interaction between the members of the organization, and whether these can help the team to achieve the best team performance. In this research, uses instant messaging software, Email , social networking for the independent variables, on the research to influence process of communication, interaction, social network and team performance. Samples were collected from various information security management professions in Taiwan with 130 valid questionnaires retrieved. In this study, we have 3 result as fellow: 1.Instant messaging software and email all positively influence communication process, team interaction, social networks and project team of the information security project. It show that hat CMC software can improve the team performance of information security project. 2.Most of the project information security team regularly connected through e-mail to do regular progress reports, question replies and discussion. 3.The respondents agree that the mobile communication platform and Facebook are good quality communication tools, but in these two tools is not significant to influence communication process, team interaction, social networks and project team of the information security project.
Lung-Tai, Hung, and 洪隆泰. "A Study of Information Security Management about the Platform of Cash Flow - According to Four Banks Participating in Project C." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/24668681288291038532.
Повний текст джерела國立臺北科技大學
商業自動化與管理研究所
91
Owing to low cost and internetworking of Internet, enterprises can try to reduce the complexity of network control and cost of operation by Internet, and find the benefit from this emerging market. But these enterprises have to think about something that: when we connect to Internet one day, besides enjoying the advantage of low cost, automation, and new business, we have to confront many challenges. In other words, as long as enterprises run business on line, they will face threats. At present, out government drives C plan to run on line. Regardless of any role in C Plan, they have to get all information about goods and trade by the mechanism of on-line cash flow, so we have to ensure that information can move between these inter-organizational systems smoothly and safely. Because of these banks playing an important role in C Plan pay much more attention to information security, according to interviewing some managers of these banks and collecting data relate to information security, we will research needs of information security about C plan by surveying three dimensions: modes of connection, internal security, and running business model. We hope that this research will provide powerful reference resources about information security management when any type of industry wants to run electronic commerce.
Tseng, Yung-Huai, and 曾詠淮. "Strategic Change and Project Management in Response to Service Innovation and Cloud Computing - A Case Study of Information Security Firm." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/00541669724802833253.
Повний текст джерела國立臺灣科技大學
工業管理系
100
More organizations are growing by increasing their service level when they were challenged by growth and competition. They aim at business value by differentiation. In addition to service, here comes another hot topic - Cloud Computing technique. End users are influenced by Cloud Computing for their user experience, and some startup companies are leveraging Cloud Computing to create new business models. These companies provided new products and/or services which incorporated great user experience. How they response in this regards for their strategic change becomes an interesting research issue. Meanwhile, most of products or services are executed as project base currently. It is worthy to investigate how to leverage traditional project management (PM) for the new type of projects with new techniques such as cloud computing. The study is targeted on a world-leading Information Security Firm, and we examine a multi-phases information security project as an in-depth case study. Our research adopted the theory of PMI’s PMBoK to analyze Five Process Groups and Nine Knowledge Areas, to understand the major factors on the strategic change and project management transformation of this firm. The study has observed, interviewed, and collected all the necessary information regarding activities occurred in this project team. The study also analyzed the key factors of strategic changes and project management, and how they responded the changes of PM ecosystem. The project team continually adjusted their operational strategies, project objectives, management mindsets, and processes to fulfill the needs and aligned with their company strategy. They successfully overcome the challenges and fulfill the customer needs by adopting the advantages of Cloud Computing. The study has justified the transformation from a traditional project management style which followed by a waterfall model commonly used in the Information Security Industry to the one incorporating new emerging techniques and new services. Lastly, we propose several explanations and managerial implications regarding why and how we shall change in response to new services and technologies.
Silva, Pedro Miguel Lopes Martins da. "Gestão de cibersegurança em organizações financeiras." Master's thesis, 2018. http://hdl.handle.net/10071/18379.
Повний текст джерелаOne can say that information is the gold of modern age. Organizations are getting increasingly more dependent on information for their business processes and consequently feel the need to protect that precious asset even more. However, the threats that are placed in the context in which organizations carry out their activities are many and very relevant and it has never been as difficult as it is now to protect their internal information. In this context, the concept of cybersecurity becomes highly relevant. Security should no longer be understood as a quasi-exclusive concern of IT, and instead, it has to be understood and addressed as a global concern throughout the organization. In order for it to be effective, cybersecurity management has to be implemented across the organization and it has to be assumed and sponsored by top management. In this regard, it is important that managers start taking cybersecurity management more and more seriously and applying well-recognized cybersecurity management and governance frameworks, in order to provide guarantees in terms of risk control and to address all aspects of the organization, at the processes, people and technologies levels. It is this work’s intent to make a contribution in this sense. Based on the identification and integration of several frameworks and guides related to cybersecurity management, it focuses on the particularities and specific aspects of the financial sector, thus creating a tool that can be used in an organizational environment for the implementation of projects in this area.
Abegão, Ana Margarida Roque Pereira. "Seguro social voluntário on-line." Master's thesis, 2010. http://hdl.handle.net/10071/3903.
Повний текст джерелаBudget constraints, issues related to the quality of public services and the citizens’ level of satisfaction with the new information and communication technologies demand and impose on the Administration new ways to operate. Starting from this demand, the present project aims to implement a model which can translate into modernizing the services composing the voluntary social service insurance of the Social Security System, through the introduction of the information and communication technologies. We want to single out one electronic service – The Voluntary on-line Social Insurance – accessible through the institutional site, www.segsocial. pt, from which the citizens will have access to a range of services such as the enrolment and the annulment of the enrolment on this contributory regime, as well as to a simulator of the monthly amount necessary to pay as contributions to this system. It is therefore our goal, within the sphere of internal procedures, to achieve an increase on the level of efficiency and productivity of the processes, by which the quality of the services offered can be improved, as well as the citizen’s level of satisfaction. It is also our objective, when proposing this model, to be able to treat processes with more transparency, equity and conformity to the law, as these are values associated with public service.