To see the other types of publications on this topic, follow the link: Information security legislations.

Dissertations / Theses on the topic 'Information security legislations'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 23 dissertations / theses for your research on the topic 'Information security legislations.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Wells, William Ward. "Information security program development." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2585.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Banerjea-Brodeur, Nicolas Paul. "Advance passenger information passenger name record : privacy rights and security awareness." Thesis, McGill University, 2003. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=80909.

Full text
Abstract:
An in-depth study of Advance Passenger Information and Passenger Name Record has never been accomplished prior to the events of September 11 th. It is of great importance to distinguish both of these concepts as they entail different legal consequence. API is to be understood as a data transmission that Border Control Authorities possess in advance in order to facilitate the movements of passengers. It is furthermore imperative that harmonization and inter-operability between States be achieved in order for this system to work. Although the obligations seem to appear for air carriers to
APA, Harvard, Vancouver, ISO, and other styles
3

Desai, Mohammed Reza. "An integrated approach for information security compliance in a financial services organisation." Thesis, Cape Peninsula University of Technology, 2016. http://hdl.handle.net/20.500.11838/2396.

Full text
Abstract:
Thesis (MTech (Information Technology))--Cape Peninsula University of Technology, 2016.<br>The aim of this research is to identify and explore the factors affecting information security compliance of information security policies and regulations, in a financial services organisation. The organisation has to comply with information security regulations and legislations by righteousness of its operations in light of the fact that any wrong doing together with misuse of data, are continually expanding. Corporate embarrassments comes about due to rupture of security, results in expanded thoughtful
APA, Harvard, Vancouver, ISO, and other styles
4

Sjöström, Elin. "Ett lapptäcke av säkerhetsskydd över Sverige : Utmaningar för civila verksamheter vid applicering av säkerhetsskyddsanalys för stärkt nationell säkerhet." Thesis, Linköpings universitet, Informatik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-159636.

Full text
Abstract:
Informationssäkerhet är idag någonting som blivit allt viktigare med den ökade mängd information som bearbetas och den ökade risken för antagonistiska händelser. Att bygga upp ett omfattande säkerhetsskydd genom att genomföra en grundläggande säkerhetsskyddsanalys är därför av vikt för de verksamheter som kan påverka Sveriges säkerhet. Denna studie har undersökt detta genom att besvara två frågeställningar: 1.Vilka utmaningar finns det vid applicering av säkerhetsskyddsanalys för civila verksamheter inom Sverige? och 2. Hur bör dessa verksamheter applicera säkerhetsskyddsanalys för att handska
APA, Harvard, Vancouver, ISO, and other styles
5

Кунєв, Ю. Д. "Правове забезпечення інформаційної безпеки як предмет правового дослідження". Thesis, Національний авіаційний університет, 2021. https://er.nau.edu.ua/handle/NAU/53719.

Full text
Abstract:
Мета статті полягає у формулюванні проблем та визначенні теоретичних основ їх розв’язання щодо нормативно-правового регулювання сфери інформаційної безпеки. Методи дослідження: комплексний підхід до створення теоретичної картини об’єкта та застосування методологічної схеми «подвійного знання» про об’єкт як такий та про знання, що його описують і зображують; порівняльно-правового та доктринального пізнання інформаційного законодавства, а також метод узагальнення та моделювання нових теоретичних знань інформаційного права. Результати: визначені проблеми подальшого розвитку правового забезп
APA, Harvard, Vancouver, ISO, and other styles
6

Skolmen, Dayne Edward. "Protection of personal information in the South African cloud computing environment: a framework for cloud computing adoption." Thesis, Nelson Mandela Metropolitan University, 2016. http://hdl.handle.net/10948/12747.

Full text
Abstract:
Cloud Computing has advanced to the point where it may be considered an attractive proposition for an increasing number of South African organisations, yet the adoption of Cloud Computing in South Africa remains relatively low. Many organisations have been hesitant to adopt Cloud solutions owing to a variety of inhibiting factors and concerns that have created mistrust in Cloud Computing. One of the top concerns identified is security within the Cloud Computing environment. The approaching commencement of new data protection legislation in South Africa, known as the Protection of Personal Info
APA, Harvard, Vancouver, ISO, and other styles
7

Kampourakis, Ioannis [Verfasser]. "Dialectics of Transparency and Secrecy in the Information Age : The Role of Whistleblowing Legislation in the Regulatory Governance of Markets and in National Security / Ioannis Kampourakis." Berlin : Freie Universität Berlin, 2019. http://d-nb.info/1195081014/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ledenstam, David, and Gustav Jonasson. "Kom ihåg att glömma bort : Fallstudie av organisationers förändringsarbete ur ett informationssäkerhetsperspektiv." Thesis, Uppsala universitet, Institutionen för informatik och media, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-355584.

Full text
Abstract:
Changes is always a relevant factor in organisations. The 25th of May 2018 the General Data Protection Regulation (GDPR) becomes enforceable as EU law, which will be a cause for change for a lot of organisation’s way of handling data, possibly endangering the information’s security. This essay aims to study three organizations and how they have prepared for GDPR. They will be analyzed from a change-management- and information security perspective, to conclude how the organisations conceive the magnitude of the change, and to see how they have implemented solutions for keeping the data safe aft
APA, Harvard, Vancouver, ISO, and other styles
9

Ratkevičienė, Sigita. "Šengeno informacinės sitemos vaidmuo ir teisinis reglamentavimas užtikrinant valstybių narių saugumą." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2006. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2006~D_20061227_184131-28545.

Full text
Abstract:
In this thesis the role of the Shengen Information Sytem (SIS) in the field of security of the Member States was evaluated and legislation of the aforementioned system was analysed. The curent version of SIS was dissertated and componed with a new version of SIS (SIS II) of with creationis is in progress. The attention was paid to the advantages and disadvantages of both current version of SIS and the new one. Significance of SIS in the field of protection of the Shengen area was evaluated. In the thesis SIS was presented as one of the most important compensatory tools.
APA, Harvard, Vancouver, ISO, and other styles
10

Kroft, Karel. "Audit cloudových služeb pro malé a střední podniky." Master's thesis, Vysoká škola ekonomická v Praze, 2014. http://www.nusl.cz/ntk/nusl-203958.

Full text
Abstract:
Cloud computing brings to the world of information systems many opportunities but also new risks. The main one is decreased customer ability to directly control the security of information and systems, because administration responsibility passes to providers. This thesis focuses on cloud services auditing from the small and medium enterprises perspective. In introduction, this work defines information system audit terminology, characterizes cloud services and analyzes international legislation. Standardization organizations, published standards and methodologies that are widely respected in I
APA, Harvard, Vancouver, ISO, and other styles
11

Silva, Andréia Gonçalves. "Informação legislativa ao alcance do cidadão: contribuição dos sistemas de organização do conhecimento." Universidade de São Paulo, 2015. http://www.teses.usp.br/teses/disponiveis/27/27151/tde-18052015-155605/.

Full text
Abstract:
INTRODUÇÃO: A Lei de Acesso à Informação Pública (LAI) regulamenta o direito à informação estabelecido pela Constituição Federal de 1988, exigindo que os órgãos governamentais garantam o direito de acesso à informação pública mediante procedimentos objetivos e ágeis, de forma transparente, clara e em linguagem de fácil compreensão. Parte-se do pressuposto de que as leis produzidas pelo Legislativo podem ser consideradas \"informação pública\" e por isso devem ser disponibilizadas ao cidadão num formato simples e acessível. Para tanto, precisam ser organizadas, estruturadas e disseminadas, conf
APA, Harvard, Vancouver, ISO, and other styles
12

Parbanath, Steven. "Personal information security : legislation, awareness and attitude." Thesis, 2011. http://hdl.handle.net/10413/9651.

Full text
Abstract:
Ecommerce refers to the buying and selling of products and services electronically via the Internet and other computer networks (Electronic Commerce 2011). The critical components of ecommerce are a well designed website and a merchant account for payment by the customer (Ecommerce critical components 2008). Merchants that sell their products and services via the Internet have a competitive edge over those that do not. It is therefore becoming common practice for both small and large business to transact electronically. With the vast opportunities, new risks and vulnerabilities are introduced.
APA, Harvard, Vancouver, ISO, and other styles
13

Dagada, Rabelani. "Legal and policy aspects to consider when providing information security in the corporate environment." Thesis, 2014. http://hdl.handle.net/10500/18839.

Full text
Abstract:
E-commerce is growing rapidly due to the massive usage of the Internet to conduct commercial transactions. This growth has presented both customers and merchants with many advantages. However, one of the challenges in E-commerce is information security. In order to mitigate e-crime, the South African government promulgated laws that contain information security legal aspects that should be integrated into the establishment of information security. Although several authors have written about legal and policy aspects regarding information security in the South African context, it has not yet bee
APA, Harvard, Vancouver, ISO, and other styles
14

Chiu, Chen-Hui, and 邱貞慧. "The Study on the Legislation of the Classified National Security Information – Focus on the Review and Designation of Secret Information." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/myf2z2.

Full text
Abstract:
碩士<br>東吳大學<br>法律學系<br>96<br>Abstract Due to the fact of scatteration, scarcity, and difficulty on obtaining substantial information, and the inconsistency regarding the administration by public law and criminal law, it has rendered the review and designation of secret information unable to achieve relatively complete and specific investigation in the study of legislation literatures of classified national security information. In view of it, this article would begin with the legislation evolution in the protection of classified national security information , and we should start from domestic
APA, Harvard, Vancouver, ISO, and other styles
15

Lin, Shin-Xing, and 林信興. "A Study on the Legislation of the Classified National Security Information-the Case of Japan (1907-1986)." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/j9m4x8.

Full text
Abstract:
碩士<br>國防大學政治作戰學院<br>政治研究所<br>104<br>The law of national confidentiality protection of Japan has become complete in the process of the Sion-Japanese War of 1894-1895, the Japanese-Russia War of 1904-1905 and World WarⅡ. It is worth to paying attention to the specific secret protection law which was approved in Dec. 2013 because of the exclusivity. On the other hand, the system of secret information protection has been established firmly by constantly revising and accumulative experience of practice in our country. To protect the national security and interests, the framework of modernistic lega
APA, Harvard, Vancouver, ISO, and other styles
16

Tsai, Chia-Ting, and 蔡佳婷. "A Study on Legislation and Implementation of Medical Information Security in Taiwan-From Past Experience to Future Adoption of HIPAA." Thesis, 2002. http://ndltd.ncl.edu.tw/handle/86441629689677709842.

Full text
Abstract:
碩士<br>國立陽明大學<br>衛生資訊與決策研究所<br>90<br>The advance in computer technology has dramatically changed the way of data processing. However, the speedy distribution of information raises a critical issue about how to protect personal information. Regarding medical information, the USA Health Insurance Portability and Accountability Act (HIPAA) is one of the first acts that regulates the uses and distribution of personal medical information. In Taiwan, the "Computer-Processed Personal Data Protection Law" (refer to as "CPPDPL") is functionally similar to HIPAA, although it is not as complete as HIPAA
APA, Harvard, Vancouver, ISO, and other styles
17

London, Ray William. "Comparative data protection and security : a critical evaluation of legal standards." Thesis, 2013. http://hdl.handle.net/10500/13859.

Full text
Abstract:
This study1 addresses the key information technology issues of the age and its unintended consequences. The issues include social control by businesses, governments, and information age Star Chambers. The study focuses on a comparative analysis of data protection, data security, and information privacy (DPSIP) laws, regulations, and practices in five countries. The countries include Australia, Canada, South Africa, the United Kingdom, and the United States. The study addresses relevant international legal standards and justifications. This multidisciplinary analysis includes a systems
APA, Harvard, Vancouver, ISO, and other styles
18

London, R. W. "Comparative data protection and security : a critical evealuation of legal standards." Thesis, 2013. http://hdl.handle.net/10500/13859.

Full text
Abstract:
This study1 addresses the key information technology issues of the age and its unintended consequences. The issues include social control by businesses, governments, and information age Star Chambers. The study focuses on a comparative analysis of data protection, data security, and information privacy (DPSIP) laws, regulations, and practices in five countries. The countries include Australia, Canada, South Africa, the United Kingdom, and the United States. The study addresses relevant international legal standards and justifications. This multidisciplinary analysis includes a systems
APA, Harvard, Vancouver, ISO, and other styles
19

Maguraushe, Kudakwashe. "Development of a diagnostic instrument and privacy model for student personal information privacy perceptions at a Zimbabwean university." Thesis, 2021. http://hdl.handle.net/10500/27557.

Full text
Abstract:
Orientation: The safety of any natural being with respect to the processing of their personal information is an essential human right as specified in the Zimbabwe Data Protection Act (ZDPA) bill. Once enacted, the ZDPA bill will affect universities as public entities. It will directly impact how personal information is collected and processed. The bill will be fundamental in understanding the privacy perceptions of students in relation to privacy awareness, privacy expectations and confidence within university. These need to be understood to give guidelines to universities on the implementat
APA, Harvard, Vancouver, ISO, and other styles
20

Roos, Anneliese. "The law of data (privacy) protection: a comparative and theoretical study." Thesis, 2003. http://hdl.handle.net/10500/1463.

Full text
Abstract:
In present-day society more and more personal information is being collected. The nature of the collection has also changed: more sensitive and potentially prejudicial information is collected. The advent of computers and the development of new telecommunications technology, linking computers in networks (principally the Internet) and enabling the transfer of information between computer systems, have made information increasingly important, and boosted the collection and use of personal information. The risks inherent in the processing of personal information are that the data may be inaccura
APA, Harvard, Vancouver, ISO, and other styles
21

Winkler, Otakar. "Legislativa vztahující se k problému svobodného přístupu k informacím v mezinárodním kontextu." Master's thesis, 2011. http://www.nusl.cz/ntk/nusl-296821.

Full text
Abstract:
The thesis is focused on some questions stemming from the limitations of the right to free access to information in connection with the implementation of classified information protection in the context of activities of state security organizations. The basic legislation covering this area has been summarized. Further, the thesis explores theoretical as well as practical procedures and principles aimed at minimization of both real and potential threats to individual rights and basic principles of the open society in cases of performance of such sorts of limitations. Besides, some examples of t
APA, Harvard, Vancouver, ISO, and other styles
22

Njotini, Mzukisi Niven. "E-crimes and e-authentication - a legal perspective." Thesis, 2016. http://hdl.handle.net/10500/21720.

Full text
Abstract:
E-crimes continue to generate grave challenges to the ICT regulatory agenda. Because e-crimes involve a wrongful appropriation of information online, it is enquired whether information is property which is capable of being stolen. This then requires an investigation to be made of the law of property. The basis for this scrutiny is to establish if information is property for purposes of the law. Following a study of the Roman-Dutch law approach to property, it is argued that the emergence of an information society makes real rights in information possible. This is the position because informati
APA, Harvard, Vancouver, ISO, and other styles
23

Marutha, Ngoako Solomon. "A framework to embed medical records management into the healthcare service delivery in Limpopo Province of South Africa." Thesis, 2016. http://hdl.handle.net/10500/22287.

Full text
Abstract:
The importance of records management to the provision of healthcare services cannot be overemphasised. If medical records are not managed properly, this might result in the provision of poor healthcare services. This is because usually if medical records are not properly managed, the healthcare institutions attain inaccurate, untimely, incomplete and unauthentic records or the records fade completely. Records that are not managed properly are easily lost, modified, altered, misfiled and/or damaged, which results in a struggle to locate them and, eventually, much time is lost. Records
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!