Dissertations / Theses on the topic 'Cloud security policies compliance'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 26 dissertations / theses for your research on the topic 'Cloud security policies compliance.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Doelitzscher, Frank. "Security audit compliance for cloud computing." Thesis, University of Plymouth, 2014. http://hdl.handle.net/10026.1/3005.
Full textUllah, Kazi Wali. "Automated Security Compliance Tool for the Cloud." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2012. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-19104.
Full textFärjsjö, Felix, and Eric Stenberg. "Ensuring Continuous Security in the Cloud and Compliance with GDPR." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-328620.
Full textBrown, David A. "Examining the Behavioral Intention of Individuals' Compliance with Information Security Policies." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3750.
Full textHanus, Bartlomiej T. "The Impact of Information Security Awareness on Compliance with Information Security Policies: a Phishing Perspective." Thesis, University of North Texas, 2014. https://digital.library.unt.edu/ark:/67531/metadc699974/.
Full textAlmusharraf, Ahlam. "DIVERGENCE IN STAKEHOLDER PERCEPTIONS OF SECURITY POLICIES: A REPGRID ANALYSIS FOR NORM-RULE COMPLIANCE." VCU Scholars Compass, 2016. http://scholarscompass.vcu.edu/etd/4346.
Full textLi, Yanhuang. "Interoperability and Negotiation of Security Policies." Thesis, Télécom Bretagne, 2016. http://www.theses.fr/2016TELB0414/document.
Full textMeng, Tianhui [Verfasser]. "Security and Performance Tradeoff Analysis of Offloading Policies in Mobile Cloud Computing / Tianhui Meng." Berlin : Freie Universität Berlin, 2017. http://d-nb.info/1136903623/34.
Full textBauer, Stefan, Edward Bernroider, and Katharina Chudzikowski. "Prevention is better than cure! Designing information security awareness programs to overcome users' non-compliance with information security policies in banks." Elsevier, 2017. http://dx.doi.org/10.1016/j.cose.2017.04.009.
Full textRODRIGUES, Thiago Gomes. "Cloudacc: a cloud-based accountability framework for federated cloud." Universidade Federal de Pernambuco, 2016. https://repositorio.ufpe.br/handle/123456789/18590.
Full textAnye, Ernest Tamanji. "Factors Affecting Employee Intentions to Comply With Password Policies." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/6965.
Full textKebbedies, Jörg. "Beschreibung, Verarbeitung und Überprüfung clientseitiger Policies für vertrauenswürdige Cloud-Anwendungen." Doctoral thesis, Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2018. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-232760.
Full textTawfique, Khaled, and Arlind Vejseli. "Decision to migrate to the Cloud : A focus on security from the consumer perspective." Thesis, Linnéuniversitetet, Institutionen för informatik (IK), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-71761.
Full textSpandonidis, Bladimiros. "Linking Information Security Awareness to Information Security Management Strategy.A Study in an IT Company." Thesis, Linnéuniversitetet, Institutionen för informatik (IK), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-45894.
Full textAbiodun, Oluwafemi Peter. "Exploring the influence of organisational, environmental, and technological factors on information security policies and compliance at South African higher education institutions: Implications for biomedical research." University of Western Cape, 2020. http://hdl.handle.net/11394/8043.
Full textSANTOS, JULIANA GRACIELA DOS. "ANTECEDENTES DOS BENEFÍCIOS PERCEBIDOS DE COMPLIANCE ÀS POLÍTICAS DE PROTEÇÃO DE DADOS PESSOAIS NAS ORGANIZAÇÕES." Universidade Metodista de Sao Paulo, 2016. http://tede.metodista.br/jspui/handle/tede/1612.
Full textFranc, Karolina. "Vårdanställdas efterlevnad av informationssäkerhetspolicys : faktorer som påverkar efterlevnaden." Thesis, Linköpings universitet, Informatik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-111402.
Full textMalandrin, Leandro José Aguilar Andrijic. "Modelo de suporte a políticas e gestão de riscos de segurança voltado à terceirização de TIC, computação em nuvem e mobilidade." Universidade de São Paulo, 2013. http://www.teses.usp.br/teses/disponiveis/3/3141/tde-27122013-104448/.
Full textChai, Xiao Hong Joanne. "Encouraging employee compliance with information security policies in cloud computing in Hong Kong." Thesis, 2017. http://hdl.handle.net/1959.13/1337592.
Full textAlruwaili, Fahad F. "Information security, privacy, and compliance models for cloud computing services." Thesis, 2016. http://hdl.handle.net/1828/7119.
Full textSadri, Sahba. "Towards Migrating Security Policies along with Virtual Machines in Cloud." Thesis, 2013. http://spectrum.library.concordia.ca/978154/1/Sadri_MASc_S2014.pdf.
Full textButhelezi, Mokateko Portia. "Addressing ambiguity within information security policies in higher education to improve compliance." Diss., 2017. http://hdl.handle.net/10500/23778.
Full textKebbedies, Jörg. "Beschreibung, Verarbeitung und Überprüfung clientseitiger Policies für vertrauenswürdige Cloud-Anwendungen." Doctoral thesis, 2017. https://tud.qucosa.de/id/qucosa%3A30769.
Full textSookdawoor, Oumeshsingh. "An investigation of information security policies and practices in Mauritius." Thesis, 2005. http://hdl.handle.net/10500/1503.
Full textGangire, Yotamu. "Assessing information security compliant behaviour using the self-determination theory." Diss., 2021. http://hdl.handle.net/10500/27798.
Full textPerkins, Catharina Elizabetha. "The management of an information technology infrastructure in schools in the Western Cape Province." Diss., 2012. http://hdl.handle.net/10500/9266.
Full text