Dissertations / Theses on the topic 'Cybersecurity management'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Cybersecurity management.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
GARZA, ADRIANA BEATRIZ. "AN ANALYSIS OF THE ETHICS BEHIND CYBERSECURITY MANAGEMENT." Thesis, The University of Arizona, 2016. http://hdl.handle.net/10150/618707.
Full textCheung, Kam Fung. "A Three Stage Approach to Cybersecurity Management for Logistics." Thesis, The University of Sydney, 2021. https://hdl.handle.net/2123/24945.
Full textSchluderberg, Larry E. "Addressing the cybersecurity Malicious Insider threat." Thesis, Utica College, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1571095.
Full textChung, Kristie (Kristie J. ). "Applying systems thinking to healthcare data cybersecurity." Thesis, Massachusetts Institute of Technology, 2015. http://hdl.handle.net/1721.1/105307.
Full textLeon, Ryan James. "An Event Management Framework to Aid Solution Providers in Cybersecurity." Thesis, The George Washington University, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10745141.
Full textBackman, Sarah. "The institutionalization of cybersecurity management at the EU-Level : 2013-2016." Thesis, Försvarshögskolan, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-6236.
Full textWalters, Iva. "Strategies for Recruiting Cybersecurity Professionals in the Financial Service Industry." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3964.
Full textSidhu, Amardeep Singh. "Application of STPA-Sec for analyzing cybersecurity of autonomous mining systems." Thesis, Massachusetts Institute of Technology, 2018. https://hdl.handle.net/1721.1/121800.
Full textSaber, Jennifer. "Determining Small Business Cybersecurity Strategies to Prevent Data Breaches." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/4991.
Full textMurray, Glenn Kristian. "Managing cybersecurity risk for critical infrastructure: A framework to secure critical infrastructure." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2024. https://ro.ecu.edu.au/theses/2864.
Full textLee, Chee Wei S. M. Massachusetts Institute of Technology. "A system theoretic approach to cybersecurity risks analysis of passenger autonomous vehicles." Thesis, Massachusetts Institute of Technology, 2018. http://hdl.handle.net/1721.1/118541.
Full textTisdale, Susan M. "Architecting a Cybersecurity Management Framework| Navigating and Traversing Complexity, Ambiguity, and Agility." Thesis, Robert Morris University, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10825513.
Full textRodrigue, Tiina K. O. "The Power and Politics of Cybersecurity: A Quantitative Study of Federal Cash Windfall Allocation as a Measure of Impact on Comprehensive Cybersecurity Posture." Thesis, The George Washington University, 2021. http://pqdtopen.proquest.com/#viewpdf?dispub=28152128.
Full textUkwuoma, Henry Chima. "Intrusion Detection in Cyber-Physical Systems for enhanced Cybersecurity of Water Management Systems." Electronic Thesis or Diss., IMT Mines Alès, 2025. http://www.theses.fr/2025EMAL0005.
Full textRaina, Ravi. "A systems perspective on cybersecurity in the cloud : frameworks, metrics and migration strategy." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/107602.
Full textTowbin, Ross Stuart. "A Protection Motivation Theory Approach to Healthcare Cybersecurity| A Multiple Case Study." Thesis, Northcentral University, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=13809084.
Full textZiska, Matthew Ryan. "Does Cybersecurity Law and Emergency Management Provide a Framework for National Electric Grid Protection?" ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/4766.
Full textGao, Olivia Qing. "Risk Assessment for IoT : a system evaluation of the smart home and its cybersecurity imperative." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/106247.
Full textSoyref, Maxim. "The holistic management of information security processes." Thesis, The University of Sydney, 2014. http://hdl.handle.net/2123/13373.
Full textSteinbernreiter, Kajsa. ""The cyber war" : A qualitative study investigating the management of cybersecurity in Swedish online fashion companies." Thesis, Högskolan i Borås, Akademin för textil, teknik och ekonomi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-22101.
Full textRassega, Valter. "Cyber security risk management nei servizi pubblici strategici." Doctoral thesis, Universita degli studi di Salerno, 2017. http://hdl.handle.net/10556/2571.
Full textBaker, Wade Henderson. "Toward a Decision Support System for Measuring and Managing Cybersecurity Risk in Supply Chains." Diss., Virginia Tech, 2017. http://hdl.handle.net/10919/85128.
Full textStefanska, Beata, and Fatimah Laura Al-Dawod. "The importance of risk awareness in cybersecurity among companies : A perspective on the role of top management." Thesis, Linköpings universitet, Institutionen för ekonomisk och industriell utveckling, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-177218.
Full textZhang, Chi S. M. Sloan School of Management. "A study on cybersecurity start-ups : a financial approach to analyze industry trends, entrepreneurship ecosystems and start-up exits." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/104506.
Full textIsaacs, Julien(Julien Dylan). "Digital expansionism : exploring the U.S.-China technology dynamic through cybersecurity policy and international marketing strategies in the Cloud Computing Sector." Thesis, Massachusetts Institute of Technology, 2019. https://hdl.handle.net/1721.1/122125.
Full textBenjamin, Victor. "Securing Cyberspace: Analyzing Cybercriminal Communities through Web and Text Mining Perspectives." Diss., The University of Arizona, 2016. http://hdl.handle.net/10150/613280.
Full textBělousov, Petr. "Zvýšení bezpečnosti nasazením SIEM systému v prostředí malého poskytovatele internetu." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2019. http://www.nusl.cz/ntk/nusl-402088.
Full textTakacs, Gergely. "Integration of CTI into security management." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-74246.
Full textLartey, Jerry. "Effective Vulnerability Management for Small Scale Organisations in Ghana." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-75809.
Full textSulanová, Monika. "Strategie pro rozvoj vzdělávání v oblasti bezpečnosti ICT na vysokých školách." Master's thesis, Vysoká škola ekonomická v Praze, 2017. http://www.nusl.cz/ntk/nusl-358805.
Full textArowolo, Olatunji Mujib. "Strategic Cyber-Risk Implications of Cloud Technology Adoption in the U.S. Financial Services Sector." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4347.
Full textCurran, Theresa. "Standardizing Instructional Definition and Content Supporting Information Security Compliance Requirements." Diss., NSUWorks, 2018. https://nsuworks.nova.edu/gscis_etd/1038.
Full textMOKALLED, HASSAN. "The importance to manage data protection in the right way: Problems and solutions." Doctoral thesis, Università degli studi di Genova, 2020. http://hdl.handle.net/11567/997252.
Full textAbu-Shaqra, Baha. "Technoethics and Sensemaking: Risk Assessment and Knowledge Management of Ethical Hacking in a Sociotechnical Society." Thesis, Université d'Ottawa / University of Ottawa, 2020. http://hdl.handle.net/10393/40393.
Full textOkoye, Stella Ifeyinwa. "Strategies to Minimize the Effects of Information Security Threats on Business Performance." Thesis, Walden University, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10606454.
Full textCatena, Joffrey. "La numérisation des services publics et leur délégation à des entités privées." Electronic Thesis or Diss., Toulon, 2024. http://www.theses.fr/2024TOUL0173.
Full textColajanni, Gabriella. "Constrained Optimization Problems in Network Models." Doctoral thesis, Università di Catania, 2019. http://hdl.handle.net/10761/4105.
Full textГриценко, Костянтин Григорович, Константин Григорьевич Гриценко та Kostiantyn Hryhorovych Hrytsenko. "Актуальні напрями підвищення ефективності забезпечення кібербезпеки банку". Thesis, Cумський державний університет, 2020. https://essuir.sumdu.edu.ua/handle/123456789/82886.
Full textDiop, Mamadou Abdoulaye. "Analyse haute performance de masses de données; application à la détection d'anomalie dans le contexte de la gestion d'identité et d'accès." Electronic Thesis or Diss., université Paris-Saclay, 2021. http://www.theses.fr/2021UPASG100.
Full textHemmer, Adrien. "Méthodes de détection pour la sécurité des systèmes IoT hétérogènes." Electronic Thesis or Diss., Université de Lorraine, 2023. http://www.theses.fr/2023LORR0020.
Full textAfzaliSeresht, Neda. "Explainable Intelligence for Comprehensive Interpretation of Cybersecurity Data in Incident Management." Thesis, 2022. https://vuir.vu.edu.au/44414/.
Full text(6613439), Siddharth Chowdhury. "PERCEPTIONS OF PURPLE TEAMS AMONG CYBERSECURITY PROFESSIONALS." Thesis, 2019.
Find full textRajan, R., Nripendra P. Rana, N. Parameswar, S. Dhir, Sushil, and Y. K. Dwivedi. "Developing a modified total interpretive structural model (M-TISM) for organizational strategic cybersecurity management." 2021. http://hdl.handle.net/10454/18482.
Full textFernandes, Ana Rita Gomes Chaves. "Cybersecurity: perspectives from banking & capital markets, insurance and wealth & asset management sectors." Master's thesis, 2018. http://hdl.handle.net/10362/36548.
Full textWan, Youyen, and 萬幼筠. "The study on Taiwan\'s Cybersecurity Management Act: Focus on Critical Information Infrastructure Protection." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/w5ksyu.
Full textMolina, Gabriela del Rocio Roldan. "A decision support system for corporations cyber security risk management." Master's thesis, 2017. http://hdl.handle.net/10400.8/2741.
Full textChen, Pin-Jen, and 陳品任. "The Comparison of Government Cybersecurity Professionals Recruitment and Management in Taiwan (R.O.C) with the United States, Mainland China, Japan and South Korea." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/47038125248506466093.
Full textMozzaquatro, Bruno Augusti. "Security Management Framework for the Internet of Things." Doctoral thesis, 2020. http://hdl.handle.net/10362/116181.
Full textHansch, Gerhard. "Automating Security Risk and Requirements Management for Cyber-Physical Systems." Doctoral thesis, 2020. http://hdl.handle.net/21.11130/00-1735-0000-0005-1517-A.
Full textSantos, Sílvia Quaresma dos. "Comunicação de crises em cibersegurança." Master's thesis, 2021. http://hdl.handle.net/10362/130218.
Full text