To see the other types of publications on this topic, follow the link: Governance of security.

Dissertations / Theses on the topic 'Governance of security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Governance of security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Kronschnabl, Stefan. "IT-Security Governance /." Regensburg : Univ.-Verl, 2008. http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=017045454&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wu, Yu. "Effects of IT Governance on Information Security." Doctoral diss., University of Central Florida, 2007. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/2127.

Full text
Abstract:
This dissertation is composed by three essays that explore the relationship between good IT governance and effective information security services. Governance steers and verifies performance of fiduciary duties, through the implementation of proper governance mechanisms. With a focus on information security, this essay presents three categories of governance mechanisms – process-based, structural, and relational. When properly instituted, they work together to ensure that IT understands business requirements for information security and strives to fulfill them. An explanation is offered a
APA, Harvard, Vancouver, ISO, and other styles
3

Mishra, Sushma. "DEFINING VALUE BASED INFORMATION SECURITY GOVERNANCE OBJECTIVES." VCU Scholars Compass, 2008. http://scholarscompass.vcu.edu/etd/1755.

Full text
Abstract:
This research argues that the information security governance objectives should be grounded in the values of organizational members. Research literature in decision sciences suggest that individual values play an important role in developing decision objectives. Information security governance objectives, based on values of the stakeholders, are essential for a comprehensive security control program. The study uses Value Theory as a theoretical basis and value focused thinking as a methodology to develop 23 objectives for information security governance. A case study was conducted to reexamine
APA, Harvard, Vancouver, ISO, and other styles
4

Cullen, Patrick Jerome. "Private security in international politics : deconstructing the state's monopoly of security governance." Thesis, London School of Economics and Political Science (University of London), 2009. http://etheses.lse.ac.uk/2744/.

Full text
Abstract:
This thesis examines the theoretical implications of private security for International Relations (IR) theory and global politics from the perspective of a security governance model. It draws upon multi-disciplinary theoretical research on private security to both map the way security governance has been de-linked from the state, as well as to map the public-private hybrids and security networks that constitute private security's continued connection to the state. On one level, this thesis engages in a direct theoretical critique of Realist theory and its Weberian inspired understanding of the
APA, Harvard, Vancouver, ISO, and other styles
5

Davis, Robert Elliot. "Relationship between Corporate Governance and Information Security Governance Effectiveness in United States Corporations." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3873.

Full text
Abstract:
Cyber attackers targeting large corporations achieved a high perimeter penetration success rate during 2013, resulting in many corporations incurring financial losses. Corporate information technology leaders have a fiduciary responsibility to implement information security domain processes that effectually address the challenges for preventing and deterring information security breaches. Grounded in corporate governance theory, the purpose of this correlational study was to examine the relationship between strategic alignment, resource management, risk management, value delivery, performance
APA, Harvard, Vancouver, ISO, and other styles
6

Brand, Johanna Catherina. "The governance of significant enterprise mobility security risks." Thesis, Stellenbosch : Stellenbosch University, 2013. http://hdl.handle.net/10019.1/85853.

Full text
Abstract:
Thesis (MComm)--Stellenbosch University, 2013.<br>ENGLISH ABSTRACT: Enterprise mobility is emerging as a megatrend in the business world. Numerous risks originate from using mobile devices for business-related tasks and most of these risks pose a significant security threat to organisations’ information. Organisations should therefore apply due care during the process of governing the significant enterprise mobility security risks to ensure an effective process to mitigate the impact of these risks. Information technology (IT) governance frameworks, -models and -standards can provide gu
APA, Harvard, Vancouver, ISO, and other styles
7

Edwards, Charles K. "A framework for the governance of information security." Thesis, Nova Southeastern University, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=3607548.

Full text
Abstract:
<p> Information security is a complex issue, which is very critical for success of modern businesses. It can be implemented with the help of well-tested global standards and best practices. However, it has been studied that the human aspects of information security compliance pose significant challenge to its practitioners. There has been significant interest in the recent past on how human compliance to information security policy can be achieved in an organization. Various models have been proposed by these researchers. However, there are very few models that have tried to link human co
APA, Harvard, Vancouver, ISO, and other styles
8

Alqurashi, Ezzat. "The viable system model for information security governance." Thesis, University of Southampton, 2015. https://eprints.soton.ac.uk/388392/.

Full text
Abstract:
Information security governance (ISG) has emerged as a new information security (IS) discipline and is considered one of the critical areas of research for enhancing the viability of organisations. This research proposes a viable system model (VSM) for ISG (VSMISG) and investigates its effects. The investigation involves studying the effects of the VSMISG in small, medium and large organisations facing low, medium and high security threat intensity over different time scales. This study also analyses the costs and benefits of changing from the baseline ISG model to the VSMISG. From reviewing t
APA, Harvard, Vancouver, ISO, and other styles
9

Coertze, Jacques Jacobus. "A framework for information security governance in SMMEs." Thesis, Nelson Mandela Metropolitan University, 2012. http://hdl.handle.net/10948/d1014083.

Full text
Abstract:
It has been found that many small, medium and micro-sized enterprises (SMMEs) do not comply with sound information security governance principles, specifically the principles involved in drafting information security policies and monitoring compliance, mainly as a result of restricted resources and expertise. Research suggests that this problem occurs worldwide and that the impact it has on SMMEs is great. The problem is further compounded by the fact that, in our modern-day information technology environment, many larger organisations are providing SMMEs with access to their networks. This re
APA, Harvard, Vancouver, ISO, and other styles
10

Posthumus, Shaun Murray. "Corporate information risk : an information security governance framework." Thesis, Nelson Mandela Metropolitan University, 2006. http://hdl.handle.net/10948/814.

Full text
Abstract:
Information Security is currently viewed from a technical point of view only. Some authors believe that Information Security is a process that involves more than merely Risk Management at the department level, as it is also a strategic and potentially legal issue. Hence, there is a need to elevate the importance of Information Security to a governance level through Information Security Governance and propose a framework to help guide the Board of Directors in their Information Security Governance efforts. IT is a major facilitator of organizational business processes and these processes manipu
APA, Harvard, Vancouver, ISO, and other styles
11

Edwards, Charles Kumar. "A Framework for the Governance of Information Security." NSUWorks, 2013. http://nsuworks.nova.edu/gscis_etd/143.

Full text
Abstract:
Information security is a complex issue, which is very critical for success of modern businesses. It can be implemented with the help of well-tested global standards and best practices. However, it has been studied that the human aspects of information security compliance pose significant challenge to its practitioners. There has been significant interest in the recent past on how human compliance to information security policy can be achieved in an organization. Various models have been proposed by these researchers. However, there are very few models that have tried to link human commitment
APA, Harvard, Vancouver, ISO, and other styles
12

Pries, Kari Mariska. "Contested concepts and practices in security governance : evolving security approaches in El Salvador." Thesis, University of Glasgow, 2017. http://theses.gla.ac.uk/8070/.

Full text
Abstract:
Hope accompanied El Salvador’s peace agreements, ending 12 years of civil war. New peace and democratic renewal were expected in the tiny Central American state. Instead, extreme violence has persisted as a lived experience for individuals and a part of its state operations. Successive governments proved unable to consolidate control over the post-war crime wave. ‘Tough on crime’ public policy agendas, which included hard-handed violence-repression tactics, had little success in mitigating insecurity. In 2009, a new ex-guerrilla party, the National Liberation Front ‘Farabundo Marti’ (FMLN), wa
APA, Harvard, Vancouver, ISO, and other styles
13

Duncan, Jessica. "The reformed Committee on World Food Security and the global governance of food security." Thesis, City University London, 2014. http://openaccess.city.ac.uk/3511/.

Full text
Abstract:
This research explores the reformed UN Committee on World Food Security (CFS) as an institution addressing a changed world, and as an illustration of evolving global food security governance. The research sets out to answer the extent to which the CFS is realising its reform objectives and how it is positioning itself within a changing architecture of global food security governance. Informed by literature on global governance and embedded neoliberalism, the inquiry centres around three case studies – Civil Society Mechanism, Voluntary Guidelines for the Responsible Governance of Tenure of Lan
APA, Harvard, Vancouver, ISO, and other styles
14

Berg, Julie. "Polycentric security governance : legitimacy, accountability, and the public interest." Doctoral thesis, University of Cape Town, 2015. http://hdl.handle.net/11427/15493.

Full text
Abstract:
This thesis examines how power is constituted in hybrid polycentric systems of security governance. In particular, the thesis explores how legitimacy - as one form of power - is configured in Improvement Districts in South Africa, with a specific focus on three ways by which it is gained: through promoting public participation in decision-making; through transparent and accountable policing nodes; and through the delivery of effective security for the public good. Polycentric systems of security governance are usually composed of a number of policing or security nodes that are independent of e
APA, Harvard, Vancouver, ISO, and other styles
15

Phillips, Celeste. "Information security governance implementation within the mobile device environment." Master's thesis, University of Cape Town, 2014. http://hdl.handle.net/11427/8502.

Full text
Abstract:
Includes bibliographical references.<br>Organisational information has been acknowledged to be a valuable asset which must be protected no matter where it is accessed from or how it is accessed. Mobile devices such as smartphones and tablets are becoming a popular means of accessing the organisation's information whether it is on a company-owned or personal mobile device. This has led to an increased awareness of potential risks to the organisation within the mobile device environment which requires organisations to be more vigilant with regards to information security governance. The objectiv
APA, Harvard, Vancouver, ISO, and other styles
16

Nyamnjoh, Anye-Nkwenti. "Local ownership and democratic governance in security sector reform." Master's thesis, University of Cape Town, 2016. http://hdl.handle.net/11427/24924.

Full text
Abstract:
Local ownership is a major component of what is considered best practice in contemporary peacebuilding. It seeks to reallocate authority between local and international actors in peacebuilding contexts. In its purest form, it requires that the design, implementation and evaluation of reform should be led by local actors. Therefore, under local ownership, external actors are circumscribed to a supporting role in post-conflict reconstruction. Local ownership is thus a critique of the tendency towards top-down internationally led peacebuilding reform. The primacy of local ownership is evident in
APA, Harvard, Vancouver, ISO, and other styles
17

Viljoen, Melanie. "A framework towards effective control in information security governance." Thesis, Nelson Mandela Metropolitan University, 2009. http://hdl.handle.net/10948/887.

Full text
Abstract:
The importance of information in business today has made the need to properly secure this asset evident. Information security has become a responsibility for all managers of an organization. To better support more efficient management of information security, timely information security management information should be made available to all managers. Smaller organizations face special challenges with regard to information security management and reporting due to limited resources (Ross, 2008). This dissertation discusses a Framework for Information Security Management Information (FISMI) that
APA, Harvard, Vancouver, ISO, and other styles
18

Gopalakrishnan, Shweta. "Mapping the elements of governance in international health security." Thesis, Kansas State University, 2011. http://hdl.handle.net/2097/9963.

Full text
Abstract:
Master of Public Health<br>Department of Diagnostic Medicine/Pathobiology<br>Justin J. Kastner<br>Globalization has resulted in closer integration of economies and societies. It has contributed to the emergence of a new world order which involves a vast nexus of global and regional institutions, surrounded by transnational corporations, and non-governmental agencies seeking to influence the agenda and direction of international public policy. Health is a center point of geopolitics, security, trade, and foreign policy. Expansion in the territory of health and an increase in the number of healt
APA, Harvard, Vancouver, ISO, and other styles
19

Olsen, Brett C. "Essays on security issuance." Diss., Columbia, Mo. : University of Missouri-Columbia, 2007. http://hdl.handle.net/10355/6261.

Full text
Abstract:
Thesis (Ph.D.)--University of Missouri-Columbia, 2007.<br>The entire dissertation/thesis text is included in the research.pdf file; the official abstract appears in the short.pdf file (which also appears in the research.pdf); a non-technical general description, or public abstract, appears in the public.pdf file. Title from title screen of research.pdf file (viewed on March 24, 2009) Vita. Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
20

Lemon, Edward James. "Governing Islam and security in Tajikistan and beyond : the emergence of transnational authoritarian security governance." Thesis, University of Exeter, 2016. http://hdl.handle.net/10871/23791.

Full text
Abstract:
Since 2002, the government of post-Soviet Tajikistan has deployed its security apparatus outside of the state’s territorial borders at least 49 times, intimidating, kidnapping and monitoring its citizens. I use the term transnational authoritarian security governance to refer to these border-spanning security practices. Although both secular and religious opponents to the government have been targeted, in this dissertation, I examine how the government of Tajikistan attempts to manage the threat from Islamic ‘extremism.’ I trace the emergence of the securitisation of Islam back to the Soviet U
APA, Harvard, Vancouver, ISO, and other styles
21

Warmington, Sheray Kimberlyn. "State failure and hybrid security governance : the case of Jamaica." Thesis, University of York, 2017. http://etheses.whiterose.ac.uk/21205/.

Full text
Abstract:
This thesis is concerned with examining the intersection between the failed state and security governance literatures, through the case study of Jamaica. This thesis is primarily concerned with examining the under-researched link between concerns raised in failed state and security governance literatures. The thesis proposes that the presence of state failure and success in the same setting is a direct result of the execution of a problematic security governance framework that impedes the nation’s ability to establish a stable state infrastructure that is capable of fulfilling the welfare need
APA, Harvard, Vancouver, ISO, and other styles
22

McConnell, James Robert. "Essex under Cromwell: Security and Local Governance in the Interregnum." PDXScholar, 2012. https://pdxscholar.library.pdx.edu/open_access_etds/686.

Full text
Abstract:
In 1655, Lord Protector Oliver Cromwell's Council of State commissioned a group of army officers for the purpose of "securing the peace of the commonwealth." Under the authority of the Instrument of Government, a written constitution not sanctioned by Parliament, the Council sent army major-generals into the counties to raise new horse militias and to support them financially with a tax on Royalists which the army officers would also collect. In counties such as Essex--the focus of this study--the major-generals were assisted in their work by small groups of commissioners, mostly local men "we
APA, Harvard, Vancouver, ISO, and other styles
23

Munk, Tine Hojsgaard. "Cyber-security in the European region : anticipatory governance and practices." Thesis, University of Manchester, 2015. https://www.research.manchester.ac.uk/portal/en/theses/cybersecurity-in-the-european-region-anticipatory-governance-and-practices(6658eec7-cc61-4c84-9054-ea40cf405ed9).html.

Full text
Abstract:
This thesis explores the nature of cyber-security at the beginning of the 21st century. In the current security paradigm, security strategies based on anticipatory governance have become essential in the management of the constantly changing cyber-security environment. Thus, this thesis aims to understand security strategies and governance introduced in the European region. The increased dependency on cyber-space is visible in all public-private sectors and governmental operations, as well as communications between groups and individuals. As a result, cyber-attacks on public and private entiti
APA, Harvard, Vancouver, ISO, and other styles
24

Thomson, Kerry-Lynn. "Integrating information security into corporate culture." Thesis, Port Elizabeth Technikon, 2003. http://hdl.handle.net/10948/132.

Full text
Abstract:
Introduction: There are many components that are required for an organisation to be successful in its chosen field. These components vary from corporate culture, to corporate leadership, to effective protection of important assets. These and many more contribute to the success of an organisation. One component that should be a definitive part in the strategy of any organisation is information security. Information security is one of the fastest growing sub-disciplines in the Information Technology industry, indicating the importance of this field (Zylt, 2001, online). Information security is c
APA, Harvard, Vancouver, ISO, and other styles
25

Neville, Karen M. "IS security leveraging the concept of knowledge management." Thesis, University of Bath, 2010. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.527132.

Full text
Abstract:
IS Security (ISS) has become a key element of business risk management and can itself create competitive advantage. Thus, organisations seek practical approaches to protect the operation of the business. Protecting the functionality of an organisation is a difficult task but it is the responsibility of both senior management and ISS functions to do so. An analysis of the ISS literature reveals a paucity of research of ISS management, and a need for research to develop a holistic model for managing ISS knowledge to overcome the ever-increasing number of negative security incidents. The ISS rese
APA, Harvard, Vancouver, ISO, and other styles
26

Farnian, Adnan. "Assessing The Relative Importance of Information Security Governance Processes on Reducing Negative Impacts From Information Security Incidents." Thesis, KTH, Industriella informations- och styrsystem, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-81417.

Full text
Abstract:
Today the extent and value of electronic data is constantly growing. Dealing across the internet depends on how secure consumers believe their personal data are. And therefore, information security becomes essential to any business with any form of web strategy, from simple business-to-consumer, or business-to-business to the use of extranets, e-mail and instants messaging. It matters too any organization that depends on computers for its daily existence. This master thesis has its focus on Information Security Governance. The goal of this thesis was to study different Information Security pro
APA, Harvard, Vancouver, ISO, and other styles
27

Nakueira, Sophie. "New architectures of governance : transnational private actors, enrolment strategies and the security governance of sports mega events." Doctoral thesis, University of Cape Town, 2014. http://hdl.handle.net/11427/12916.

Full text
Abstract:
Includes bibliographical references.<br>The FIFA World Cup has become one of the most sought after sports mega events by many countries in today’s society, as well as one of the most controversial. As I put the finishing touches on this thesis, the FIFA World Cup is taking place in Brazil. As with previous World Cups, the planning stage of the 2014 World Cup has been characterised by protests and considerable criticism, particularly concerned with the expenditures on mega event structures such as stadiums. FIFA, along with host country’s governments, has been a major recipient of criticism. Th
APA, Harvard, Vancouver, ISO, and other styles
28

Quinn, Peter Thomas, and peter quinn@anu edu au. "HUMAN SECURITY AND DEVELOPMENT: THE CASE OF CAMBODIA." The Australian National University. Centre for Asian Societies and Histories, College of Asia & the Pacific, 2008. http://thesis.anu.edu.au./public/adt-ANU20100701.122958.

Full text
Abstract:
Human security was promoted in 1994 by the UNDP as a concept embracing not only freedom from war and violence (or personal security), but also embracing individual�s basic needs for (and rights to) economic security, food security, health security, environmental security, community security and political security. Following this formulation, the concept has been subject to considerable scrutiny particularly in the context of state centric security studies. Extending the concept of security beyond the state to the individual appeared problematic, especially as the mechanisms designed to ma
APA, Harvard, Vancouver, ISO, and other styles
29

Ponenti, Albert M. "An integrative risk management/governance framework for homeland security decision making." Thesis, Monterey, Calif. : Naval Postgraduate School, 2008. http://bosun.nps.edu/uhtbin/hyperion-image.exe/08Mar%5FPonenti.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, March 2008.<br>Thesis Advisor(s): Rollins, John. "March 2008." Description based on title screen as viewed on May 5, 2008 Includes bibliographical references (p.119-124). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
30

Edwards, Adam Michael. "Multi-centred governance in liberal modes of security : a realist approach." Thesis, Cardiff University, 2017. http://orca.cf.ac.uk/103156/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Brereton, Catherine Margaret. "Mapping Grahamstown's security governance network : prospects and problems for democratic policing." Thesis, Rhodes University, 2006. http://hdl.handle.net/10962/d1006323.

Full text
Abstract:
The security of its citizens is often regarded as the democratic state's primary raison d'etre. However, with increasing crime and perceptions of insecurity among citizens, along with actual and perceived state policing inadequacies, citizens around the world have sought to make alternative arrangements for their security. The explosion of private alternatives to state policing has resulted in the need for the replacement of former static definitions of policing by more fluid understandings of what policing entails. Policing is no longer an activity undertaken exclusively by the 'state police.
APA, Harvard, Vancouver, ISO, and other styles
32

Adjapong, Frederick Kwaku. "Linking Food Security Governance and Changing Food Security Priorities: A Case Study of the Northern Region of Ghana." Ohio University / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou162885878645884.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Mirbaz, Jamshid. "Säkerhetsstyrning inom den Finansiella Sektorn : En Studie på Best Practice hos Tre Svenska Banker." Thesis, KTH, Industriella informations- och styrsystem, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-98863.

Full text
Abstract:
For organizations that handle sensitive information, IT governance and information security are necessities in order to maintain credibility and to conduct its business efficiently. There are several known processes to increase security governance – which is a fusion of information security and IT governance. This master thesis examines if organizations use recognized processes and if it in that case would lead to higher security. The study is qualitative and conducted in the financial sector and based on Best Practice frameworks of the security governance in Swedish banks. Data collection was
APA, Harvard, Vancouver, ISO, and other styles
34

Coates, A. G. "Constructing security governance : comparing regional narratives of institutionalisation and modalities of cooperation." Thesis, University of Essex, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.502165.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Allen, John Oakley. "Decentralised electricity and its implications for the governance of UK energy security." Thesis, University of Exeter, 2014. http://hdl.handle.net/10871/16387.

Full text
Abstract:
The GB electricity system is in a state of change, both physically and operationally. The future of the electricity system needs to be low carbon and secure. Current system structures revolve around large-scale centralised generation to deliver this security. This thesis argues that with a broad definition of energy security, which reflects the future needs of the electricity system, a decentralised approach would be more beneficial to deliver these needs. This thesis identifies the governance processes that make up current energy security and evaluates how these might change in a system of de
APA, Harvard, Vancouver, ISO, and other styles
36

Sakota, Tijana. "Poor governance and terrorism in northern Mozambique since 2017." Diss., University of Pretoria, 2020. http://hdl.handle.net/2263/76224.

Full text
Abstract:
Terrorism emerged in northern Mozambique in 2017 and is ostensibly attributed to Muslim militants. The first attacks occurred on 5 October 2017 in Mocimboa da Praia town in the northern Mozambican province of Cabo Delgado. The group known as ‘Ansar al-Sunnah’ or ‘Al-Shabaab’ appears to be inspired by international terrorist clerics and followers, specifically from Tanzania, such as Sheik Aboud Rogo. These individuals share similar aspirations, including the rejection of Western education and the establishment of Sharia law. The Islamic State Central Africa Province has claimed responsibility f
APA, Harvard, Vancouver, ISO, and other styles
37

Flowers, Jim David. "Explaining policy differences as a function of diverse governance institutions." Diss., Georgia Institute of Technology, 2016. http://hdl.handle.net/1853/54971.

Full text
Abstract:
This study asks the question: “How does the structure of cybersecurity policy relate to differences in structure of policy governance of universities and colleges?” The study has three objectives. First, the study seeks to add to the body of knowledge concerning the relationship between the structure of cybersecurity policy processes and the security policies developed by those processes. Second, the study seeks to demonstrate the usefulness of the Institutional Grammar Tool, Rules Configurations, and other methods employed to analyze institutional configurations. Third, the study seeks to pro
APA, Harvard, Vancouver, ISO, and other styles
38

Viljoen, Stephen. "Applying a framework for IT governance in South African higher education institutions." Thesis, Nelson Mandela Metropolitan University, 2005. http://hdl.handle.net/10948/416.

Full text
Abstract:
Background: Higher Education (HE), through HE Institutions, plays a very important role in society. There is thus a need for this sector to be well managed, especially with regards to planning, organising, and controlling. Corporate Governance has received a lot of attention in recent times, especially to engender trust on the part of the stakeholders. There are many similarities, but also significant differences in the governance of HE institutions and public companies. Information Technology (IT) plays an extremely important role in the modern organisation, creating huge opportunities, but a
APA, Harvard, Vancouver, ISO, and other styles
39

Chau, Foo-cheong Sidney, and 周富祥. "Application the principles of corporate governance to enhance efficiency of airport security services." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2012. http://hub.hku.hk/bib/B5025456X.

Full text
Abstract:
Today, aviation security is at the forefront of public consciousness particularly when they think of their own personal safety. The dramatic and catastrophic attacks of 911, utilizing civil aviation resources has made the world view aviation security with a critical eye. It could be argued that the response by States and individual airports and airlines has been positive and rapid, however the effectiveness has been marginal. Many factors have been proffered as the reason, from ineffective conservative governments, out-dated equipment, old infrastructure to a traditional mind-set that does no
APA, Harvard, Vancouver, ISO, and other styles
40

Girard, Nicholas. "Regional-Scale Food Security Governance in Inuit Settlement Areas: Opportunities and Challenges in Northern Canada." Thesis, Université d'Ottawa / University of Ottawa, 2018. http://hdl.handle.net/10393/37076.

Full text
Abstract:
Food insecurity among northern Inuit communities represents a significant public health challenge that requires immediate and integrated responses. In the Inuvialuit Settlement Region (ISR), in the Northwest Territories (NWT), almost half of households experience some degree of food insecurity (33% moderate, 13% severe), and rates are even higher in Nunavut (35% moderate, 34% severe). Currently, food security issues in the Arctic are being addressed by multiple initiatives at different scales; however, the role that governance and policy plays in fostering or hampering Inuit food security rema
APA, Harvard, Vancouver, ISO, and other styles
41

Shaaban, Hussein Khamis. "Enhancing the governance of information security in developing countries : the case of Zanzibar." Thesis, University of Bedfordshire, 2014. http://hdl.handle.net/10547/315359.

Full text
Abstract:
Organisations in the developing countries need to protect their information assets (IA) in an optimal way. This thesis is based upon the argument that in order to achieve fully effective information security management (ISM) strategy, it is essential to look at information security in a socio-technical context, i.e. the cultural, ethical, moral, legal dimensions, tools, devices and techniques. The motivation for this study originated from the concern of social chaos, which results from ineffective information security practices in organisations in the developing nations. The present strategies
APA, Harvard, Vancouver, ISO, and other styles
42

Topping, John R. "Beyond the Pattern Report : The Governance of Security in Policing with the Community." Thesis, University of Ulster, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.516423.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Perkowski, Nina. "Humanitarianism, human rights, and security in EUropean border governance : the case of Frontex." Thesis, University of Edinburgh, 2017. http://hdl.handle.net/1842/23494.

Full text
Abstract:
This thesis explores the (re-)positioning of the EU border agency Frontex within a wider shift towards humanitarianism and human rights in EUropean border governance. By examining Frontex’s public self-representation through time, it shows that the agency has gradually appropriated humanitarianism and human rights, while at the same time continuing to rely on a conceptualisation of migration as a security issue. The thesis traces this development, outlining how the agency has increasingly mobilised all three discursive formations in its public narratives about itself, border controls, and unau
APA, Harvard, Vancouver, ISO, and other styles
44

Thomas, Maurice A. "Evaluating Electronic Health Records Interoperability Symbiotic Relationship to Information Management Governance Security Risks." Thesis, Northcentral University, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=13808526.

Full text
Abstract:
<p> A major initiative in the U.S. healthcare care industry is to establish a nationwide health information network securing the sharing of information between all involved U.S. healthcare stakeholders. However, implementing an interoperability solution is a massive, complex, and enduring effort with significant challenges such as inconsistent technology and data standards, as well as complex privacy and security issues. The purpose of this qualitative, case study is to examine the impacts of interoperability initiatives involving the U.S. government and to provide an understanding of the info
APA, Harvard, Vancouver, ISO, and other styles
45

Foord, Wayne. "Energy scarcity and food security : strategies for transition to resilient food system governance." Thesis, Queen's University Belfast, 2016. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.705918.

Full text
Abstract:
This thesis addresses the impacts of emerging energy scarcity on food security, and explores strategies for transition to a sustainable food system. The core research questions focus on the transition movement, its political strategy, and proposals for food sustainability. Contextual questions include: What post-peak oil scenarios are plausible/implausible given current evidence regarding global oil production, and available energy alternatives? Do any current trends indicate the unfolding of one scenario, in particular? And how might this scenario impact on food security, and what are the imp
APA, Harvard, Vancouver, ISO, and other styles
46

Kim, Dongwoo. "A tool for delegative governance? : South Korea's National Security Law and delegative democracy." Thesis, University of British Columbia, 2016. http://hdl.handle.net/2429/58709.

Full text
Abstract:
The paper seeks to clarify the relationship between South Korea’s National Security Law (NSL) and democracy. The NSL is a special law that seeks to address the security threats from North Korea, criticized for limiting fundamental civil and political rights. However, these criticisms have shown limited effectiveness in light of the argument that South Korea has unique security needs that require some compromise. In order to demonstrate more effectively that the NSL is problematic for South Korea’s democracy, I argue that the continued use of the law makes more sense if South Korea is considere
APA, Harvard, Vancouver, ISO, and other styles
47

Ajala, Olayinka Adebayo. "Conflict in the Niger Delta : an analysis of resource governance and human security." Thesis, University of York, 2015. http://etheses.whiterose.ac.uk/8968/.

Full text
Abstract:
The thesis explores the causes and dynamics of the conflict that has lasted for decades in the oil rich Niger Delta region of Nigeria. I critically examined the main theories that have been previously used to explain the conflict particularly the dominant greed/grievance paradigm. I argue that the greed/grievance theory does not adequately explain the conflict as it is difficult to distinguish behaviours that could be labelled as greed or grievance. Instead, the thesis argues that the human security framework better explains the causes and dynamics of the conflict experienced in this region. A
APA, Harvard, Vancouver, ISO, and other styles
48

Council, Claude L. III. "An Investigation of a COBIT Systems Security IT Governance Initiative in Higher Education." NSUWorks, 2006. http://nsuworks.nova.edu/gscis_etd/465.

Full text
Abstract:
The problem investigated, in this study, was the difficulty in implementing COBIT's Systems Security, an Information Technology governance program, at South Louisiana Community College (SLCC). The goal of the researcher was to examine the managerial .aspects of introducing COBIT's fifth Delivery and Support process (DS5), successes, and the needs of a medium sized institution of higher education. The DS5 process pertains to ensuring network security. The researcher used COBIT's critical success factors, key goal indicators, key performance indicators, maturity models, audit guidelines, and dia
APA, Harvard, Vancouver, ISO, and other styles
49

Larsson, Oscar. "The Governmentality of Meta-governance : Identifying Theoretical and Empirical Challenges of Network Governance in the Political Field of Security and Beyond." Doctoral thesis, Uppsala universitet, Statsvetenskapliga institutionen, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-259746.

Full text
Abstract:
Meta-governance recently emerged in the field of governance as a new approach which claims that its use enables modern states to overcome problems associated with network governance. This thesis shares the view that networks are an important feature of contemporary politics which must be taken seriously, but it also maintains that networks pose substantial analytical and political challenges. It proceeds to investigate the potential possibilities and problems associated with meta-governance on both theoretical and empirical levels. The theoretical discussion examines meta-governance in relatio
APA, Harvard, Vancouver, ISO, and other styles
50

Mutlu, Can E. "Insecurity Communities: Technologies of Insecurity Governance Under the European Neighbourhood Policy." Thèse, Université d'Ottawa / University of Ottawa, 2013. http://hdl.handle.net/10393/24334.

Full text
Abstract:
This dissertation explores the European Union’s (EU) European Neighbourhood Policy (ENP) as a technology of insecurity governance in order to better understand insecurity management practices of the EU bureaucracies and policy elites. The central argument of the project is that security communities are insecurity communities. Rather than trying to maintain a state of non-war, insecurity communities establish and further develop a constant productive field of insecurity management that aims to identify and govern threats and unease. The projects core contributions rest with the security communi
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!