Dissertations / Theses on the topic 'Chain of Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Chain of Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Sichel, Alexander R. (Alexander Russell). "Supply chain security along the Columbia River : an analysis of maritime supply chain security with respect to communication between security experts." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/33589.
Full textHoughton, Robert F. "The Chain-Link Fence Model: A Framework for Creating Security Procedures." DigitalCommons@USU, 2013. https://digitalcommons.usu.edu/etd/1967.
Full textGoldman, Eric. "Securing the IT acquisition secruity chain : security concerns and human factors in IT acquisition /." Online version of thesis, 2010. http://hdl.handle.net/1850/12333.
Full textPark, Hong. "Impact of supply chain security orientation on port performance." Thesis, Cardiff University, 2013. http://orca.cf.ac.uk/52117/.
Full textGarshasbi, Farzam, and Ebrahimi Shahram Pasha. "Supply Chain Security Programs Comparing TAPA FSR with ISPS." Thesis, Högskolan i Borås, Institutionen Ingenjörshögskolan, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-16642.
Full textWilliams, Zachary. "Supply chain security an institutional approach to strategies and outcomes /." Diss., Mississippi State : Mississippi State University, 2008. http://library.msstate.edu/etd/show.asp?etd=etd-03312008-163918.
Full textMalinowski, Mateusz Ksawery. "CargoNet : micropower sensate tags for supply-chain management and security." Thesis, Massachusetts Institute of Technology, 2007. http://hdl.handle.net/1721.1/41654.
Full textBarcelos, Mariana Alexandra Aleixo de. "Towards a security framework for the semiconductor supply chain environment." Master's thesis, Universidade de Aveiro, 2018. http://hdl.handle.net/10773/23555.
Full textKlimova, Nadezda, and Anna Akimova. "Supply Chain Security. Tools, Trends, and Techniques : Toyota and Honda cases." Thesis, Internationella Handelshögskolan, Högskolan i Jönköping, IHH, Företagsekonomi, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-15764.
Full textTang, Dawei. "Container Line Supply Chain security analysis under complex and uncertain environment." Thesis, University of Manchester, 2012. https://www.research.manchester.ac.uk/portal/en/theses/container-line-supply-chain-security-analysis-under-complex-and-uncertain-environment(2b058744-e0fc-4b4f-9222-6a4b41cf7348).html.
Full textLoke, Wai Leng. "An evaluation of the value of security in the international marine supply chain." Thesis, University of British Columbia, 2008. http://hdl.handle.net/2429/2519.
Full textChang, Meng Ying M. Eng Massachusetts Institute of Technology /., and Raghavendran Mohan. "Impact of Drug Supply Chain Security Act on US pharmaceutical industry under decentralized information flow." Thesis, Massachusetts Institute of Technology, 2017. http://hdl.handle.net/1721.1/112875.
Full textRodriguez, Cuevas Jose A. "The balloon effect and Mexican homeland security : what it means to be the weakest link in the Americas' security chain." Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/10684.
Full textFarid, Muhammad S. M. Massachusetts Institute of Technology, and Bayu 1969 Hanantasena. "B2B E-commerce : value chain transformation, enablers and barriers, technology, privacy and security." Thesis, Massachusetts Institute of Technology, 2001. http://hdl.handle.net/1721.1/8887.
Full textBellefeuille, Cynthia Lynn. "Quantifying and managing the risk of information security breaches participants in a supply chain." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/33313.
Full textWinkler, Simon. "Supply Chain Finance Der Asset-Based-Financing-Ansatz in Unternehmensnetzwerken /." St. Gallen, 2006. http://www.biblio.unisg.ch/org/biblio/edoc.nsf/wwwDisplayIdentifier/00642892002/$FILE/00642892002.pdf.
Full textLewis, Brian Michael. "Inventory Control with Risk of Major Supply Chain Disruptions." Diss., Georgia Institute of Technology, 2005. http://hdl.handle.net/1853/7155.
Full textChung, Peter Wontae, and Tao Zhang. "A framework to evaluate interoperable data exchange models for Drug Supply Chain Security Act compliance." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/107520.
Full textAgrianidis, Anastasios. "Information Security Training and Serious Games." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-85460.
Full textXue, Hao. "Hardware Security and VLSI Design Optimization." Wright State University / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=wright1546466777397815.
Full textBaker, Wade Henderson. "Toward a Decision Support System for Measuring and Managing Cybersecurity Risk in Supply Chains." Diss., Virginia Tech, 2017. http://hdl.handle.net/10919/85128.
Full textKarlsson, Daniel. "Modelling and Analysis of Swedish Heavy Industry Supply Chain Data Management to Improve Efficiency and Security." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-291230.
Full textManocha, Jitendra. "Using innovation from block chain technology to address privacy and security problems of Internet of Things." Thesis, KTH, Industriell Marknadsföring och Entreprenörskap, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-209682.
Full textMwewa, Lameck [Verfasser]. "Evaluation of Jatropha Biofuels Value Chain for Sustainability and Food Security : a Conceptual Framework Approach / Lameck Mwewa." Gießen : Universitätsbibliothek, 2019. http://d-nb.info/1209134705/34.
Full textMeyers, Jared James. "Training Security Professionals in Social Engineering with OSINT and Sieve." BYU ScholarsArchive, 2018. https://scholarsarchive.byu.edu/etd/6863.
Full textStone, Jamie. "Development of a framework for enhancing resilience in the UK food and drink manufacturing sector." Thesis, Loughborough University, 2018. https://dspace.lboro.ac.uk/2134/33501.
Full textEkwall, Daniel. "Managing the risk for antagonistic threats against the transport network." Doctoral thesis, Göteborg : Borås : Division of Logistics and Transportation, Chalmers University of Technology ; School of Engineering, University of Borås, 2009. http://hdl.handle.net/2320/5033.
Full textJohnson, Ludwig, and Lukas Mårtensson. "Assessing HTTP Security Header implementations : A study of Swedish government agencies’ first line of defense against XSS and client-side supply chain attacks." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-21725.
Full textBa, Hélène Aminatou. "Contribution of contract farming to sustainable value chain upgrading in the Mekong River Delta in Vietnam." Thesis, Paris Est, 2019. http://www.theses.fr/2019PESC0025.
Full textBarkhadle, Hassan. "Contribution du maillon portuaire à la performance de la chaîne logistique globale : cas du port de Djibouti." Thesis, Brest, 2014. http://www.theses.fr/2014BRES0052.
Full textLeonel, Ana Paula da Silva [UNESP]. "Viabilidade econômica de produtos à base de tilápia para alimentação escolar nos municípios de Toledo-PR e Marechal Cândido Rondon-PR." Universidade Estadual Paulista (UNESP), 2016. http://hdl.handle.net/11449/148648.
Full textTrompeter, Philipp, and Paavo Melin. "Examination of the advantageousness of the AEO certification to NORMA Sweden AB." Thesis, Linnéuniversitetet, Institutionen för ekonomistyrning och logistik (ELO), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-57337.
Full textMazaheri, Arsham. "How the ISPS code affects port and port activities." Thesis, Högskolan i Borås, Institutionen Ingenjörshögskolan, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-18834.
Full textRybková, Jana. "Poistný trh Lloyd's of London." Master's thesis, Vysoká škola ekonomická v Praze, 2014. http://www.nusl.cz/ntk/nusl-195502.
Full textHložanka, Filip. "Simulace správy informační bezpečnosti ve fakultním prostředí." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2020. http://www.nusl.cz/ntk/nusl-417806.
Full textRamanauskaitė, Eglė. "Tarptautinės prekybos grandinės saugumo užtikrinimo būdai ir priemonės." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2008. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2008~D_20080121_103841-29060.
Full textFontana, Caio Fernando. "Metodologia para a implantação dos processos da cadeia logística segura." Universidade de São Paulo, 2009. http://www.teses.usp.br/teses/disponiveis/3/3143/tde-12082010-120918/.
Full textBonatto, Heitor. "Segurança na cadeia de suprimentos internacional : protocolo de gestão de risco para o transporte marítimo de cargas less than container load." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2016. http://hdl.handle.net/10183/150492.
Full textCasto, Matthew James. "Multi-Attribute Design for Authentication and Reliability (MADAR)." The Ohio State University, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=osu1512009861557857.
Full textRatnayake, Yohan. "PKI based Encryption for Document Sharing, Optimized Storage, and Proof of Existence in the Cloud." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-182906.
Full textRössler, Rafaela Godoy. "O desafio de alimentar o mundo de maneira sustentável: circuitos curtos agro-alimentares no Brasil e em Portugal." Master's thesis, Universidade de Évora, 2020. http://hdl.handle.net/10174/28974.
Full textPera, Thiago Guilherme. "Modelagem das perdas na agrologística de grãos no Brasil: uma aplicação de programação matemática." Universidade de São Paulo, 2017. http://www.teses.usp.br/teses/disponiveis/3/3148/tde-17072017-160658/.
Full textEirinha, Ana Catarina da Silva. "Perda e desperdício de alimentos ao longo da cadeia alimentar - trabalho de revisão." Bachelor's thesis, [s.n.], 2021. http://hdl.handle.net/10284/9673.
Full textMassimino, Brett J. "Operational Factors Affecting the Confidentiality of Proprietary Digital Assets." The Ohio State University, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=osu1405683732.
Full textBennett, Allison C. (Allison Christine), and Yi Zhuan Chin. "100% container scanning : security policy implications for global supply chains." Thesis, Massachusetts Institute of Technology, 2008. http://hdl.handle.net/1721.1/45248.
Full textZiani, Adel. "Modeling of Secure Dependable (S&D) applications based on patterns for Resource-Constrained Embedded Systems (RCES)." Phd thesis, Université Toulouse le Mirail - Toulouse II, 2013. http://tel.archives-ouvertes.fr/tel-00929836.
Full textRiahi, Ramin. "Enabling security and risk-based operation of container line supply chains under high uncertainties." Thesis, Liverpool John Moores University, 2010. http://researchonline.ljmu.ac.uk/5991/.
Full textKlasson, Sebastian, and Nina Lindström. "Longitudinal analysis of the certificate chains of big tech company domains." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-178396.
Full textSingh, Gurpreet. "Statistical Modeling of Dynamic Risk in Security Systems." Thesis, KTH, Matematisk statistik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-273599.
Full textKissloy, Luitfred Donacian [Verfasser]. "Food security outcomes of smallholders' integration in traditional agricultural value chains in Tanzania and Kenya / Luitfred Donacian Kissloy." Hannover : Technische Informationsbibliothek (TIB), 2016. http://d-nb.info/1126665770/34.
Full text