Dissertations / Theses on the topic 'Information security management'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Information security management.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Rastogi, Rahul. "Information security service management : a service management approach to information security management." Thesis, Nelson Mandela Metropolitan University, 2011. http://hdl.handle.net/10948/1389.
Full textBjörck, Fredrik. "Discovering information security management /." Stockholm : Department of Computer and Systems Sciences, Stockholm University, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-718.
Full textAlfawaz, Salahuddin M. "Information security management : a case study of an information security culture." Thesis, Queensland University of Technology, 2011. https://eprints.qut.edu.au/41777/1/Salahuddin_Alfawaz_Thesis.pdf.
Full textTyukala, Mkhululi. "Governing information security using organisational information security profiles." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/626.
Full textBurkhead, Randy L. "A phenomenological study of information security incidents experienced by information security professionals providing corporate information security incident management." Thesis, Capella University, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=3682325.
Full textMahmood, Ashrafullah Khalid. "Information Security Management of Healthcare System." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4353.
Full textSharma, Dhirendra S. M. Massachusetts Institute of Technology. "Enterprise Information Security Management Framework [EISMF]." Thesis, Massachusetts Institute of Technology, 2011. http://hdl.handle.net/1721.1/67568.
Full textSoyref, Maxim. "The holistic management of information security processes." Thesis, The University of Sydney, 2014. http://hdl.handle.net/2123/13373.
Full textGutta, Ramamohan. "Managing Security Objectives for Effective Organizational Performance Information Security Management." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7147.
Full textSpandonidis, Bladimiros. "Linking Information Security Awareness to Information Security Management Strategy.A Study in an IT Company." Thesis, Linnéuniversitetet, Institutionen för informatik (IK), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-45894.
Full textHayat, Mohammed Zia. "Information Security Risk Management for Ubiquitous Computing." Thesis, University of Southampton, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.484894.
Full textDhillon, Gurpreet. "Interpreting the management of information systems security." Thesis, London School of Economics and Political Science (University of London), 1995. http://etheses.lse.ac.uk/275/.
Full textCho, Sungback. "Risk analysis and management for information security." Thesis, Royal Holloway, University of London, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.404796.
Full textOgbanufe, Obiageli. "Three Essays on Information Security Risk Management." Thesis, University of North Texas, 2018. https://digital.library.unt.edu/ark:/67531/metadc1157576/.
Full textCarey-Smith, Mark T. "Improving information security management in nonprofit organisations." Thesis, Queensland University of Technology, 2011. https://eprints.qut.edu.au/45717/1/Mark_Carey-Smith_Thesis.pdf.
Full textArmstrong, Helen L. "A soft approach to management of information security." Curtin University of Technology, School of Public Health, 1999. http://espace.library.curtin.edu.au:80/R/?func=dbin-jump-full&object_id=10235.
Full textArmstrong, Helen. "A soft approach to management of information security." Thesis, Curtin University, 1999. http://hdl.handle.net/20.500.11937/1238.
Full textErkan, Ahmet. "An Automated Tool For Information Security Management System." Master's thesis, METU, 2006. http://etd.lib.metu.edu.tr/upload/12607783/index.pdf.
Full textAlbrechtsen, Eirik. "Friend or foe? Information security management of employees." Doctoral thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for industriell økonomi og teknologiledelse, 2008. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-5695.
Full textColes-Kemp, Elizabeth. "The anatomy of an information security management system." Thesis, King's College London (University of London), 2008. https://kclpure.kcl.ac.uk/portal/en/theses/the-anatomy-of-an-information-security-management-system(08ef0714-a5aa-4b6e-b322-8a174da6a2b9).html.
Full textPenjala, J. (Joni). "Information security management in cloud computing:a case study." Master's thesis, University of Oulu, 2019. http://jultika.oulu.fi/Record/nbnfioulu-201906052441.
Full textLebek, Benedikt [Verfasser]. "Contributions to organizational information security / Benedikt Lebek." Hannover : Technische Informationsbibliothek und Universitätsbibliothek Hannover (TIB), 2015. http://d-nb.info/1074966856/34.
Full textWaly, Nesren Saleh. "Organisational information security management : the impact of training and awareness : evaluating the socio-technical impact on organisational information security policy management." Thesis, University of Bradford, 2013. http://hdl.handle.net/10454/5666.
Full textThomson, Kerry-Lynn. "Integrating information security into corporate culture." Thesis, Port Elizabeth Technikon, 2003. http://hdl.handle.net/10948/132.
Full textTshabalala, Obediant. "Critical success factors of information security projects." Thesis, Nelson Mandela Metropolitan University, 2016. http://hdl.handle.net/10948/10397.
Full textUffen, Jörg [Verfasser]. "Information security management and employees' security awareness : an analysis of behavioral determinants / Jörg Uffen." Hannover : Technische Informationsbibliothek und Universitätsbibliothek Hannover (TIB), 2014. http://d-nb.info/1051037875/34.
Full textDe, Lange Joshua. "A framework for information security management in local government." Thesis, Nelson Mandela Metropolitan University, 2017. http://hdl.handle.net/10948/7588.
Full textDomingues, Steve. "Navigating between information security management documents : a modeling methodology." Thesis, Nelson Mandela Metropolitan University, 2010. http://hdl.handle.net/10948/1212.
Full textHassebroek, Pamela Burns. "Institutionalized Environments and Information Security Management: Learning from Y2K." Diss., Available online, Georgia Institute of Technology, 2007, 2007. http://etd.gatech.edu/theses/available/etd-06192007-111256/.
Full textJastiuginas, Saulius. "Information Security Management: The Study of Lithuanian State Institutions." Doctoral thesis, Lithuanian Academic Libraries Network (LABT), 2012. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2012~D_20121227_090041-07949.
Full textHumpert-Vrielink, Frederik. "Die Rolle der Social Media im Information Security Management." Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2014. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-143696.
Full textHumpert-Vrielink, Frederik. "Die Rolle der Social Media im Information Security Management." Technische Universität Dresden, 2011. https://tud.qucosa.de/id/qucosa%3A28085.
Full textLane, Tim. "Information security management in Australian universities : an exploratory analysis." Thesis, Queensland University of Technology, 2007. https://eprints.qut.edu.au/16486/1/Tim_Lane_Thesis.pdf.
Full textLane, Tim. "Information security management in Australian universities : an exploratory analysis." Queensland University of Technology, 2007. http://eprints.qut.edu.au/16486/.
Full textBoshoff, Ryno. "A baseline for information security knowledge for end users." Thesis, Nelson Mandela Metropolitan University, 2012. http://hdl.handle.net/10948/d1013260.
Full textHe, Ying. "Generic security templates for information system security arguments : mapping security arguments within healthcare systems." Thesis, University of Glasgow, 2014. http://theses.gla.ac.uk/5773/.
Full textMartinez, Antonio. "Information management and the biological warfare threat." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://sirsi.nps.navy.mil/uhtbin/hyperion-image/02Mar%5FMartinez.pdf.
Full textBox, Debra. "Business process security maturity: a paradigm convergence." Thesis, Nelson Mandela Metropolitan University, 2008. http://hdl.handle.net/10948/722.
Full textThomson, Kerry-Lynn. "MISSTEV : model for information security shared tacit espoused values." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/717.
Full textFarahmand, Fariborz. "Developing a Risk Management System for Information Systems Security Incidents." Diss., Georgia Institute of Technology, 2004. http://hdl.handle.net/1853/7600.
Full textHove, Cathrine, and Marte Tårnes. "Information Security Incident Management : An Empirical Study of Current Practice." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2013. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-22651.
Full textCallahan, Christopher J. "Security information and event management tools and insider threat detection." Thesis, Monterey, California: Naval Postgraduate School, 2013. http://hdl.handle.net/10945/37596.
Full textHone, Karin. "The information security policy: an important information security management control." Thesis, 2008. http://hdl.handle.net/10210/274.
Full textGovender, Doraval. "Management of security information in the security industry." Thesis, 2012. http://hdl.handle.net/10500/9029.
Full textVenter, Diederik Petrus. "Infosure: an information security management system." Thesis, 2008. http://hdl.handle.net/10210/520.
Full textVon, Solms Rossouw. "Information security management : processes and metrics." Thesis, 2014. http://hdl.handle.net/10210/12038.
Full textWeng, Wen-Hung, and 翁文宏. "The Effect of Information Ethics, Information Security Control and Top Management Support on Information Security." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/32a39j.
Full textDas, Sampat. "Link Management Security in Bluetooth." Thesis, 2015. http://ethesis.nitrkl.ac.in/7988/1/2015_Link_Das.pdf.
Full textLei, Cheng-Chiu, and 雷誠久. "Information Security Management System for the Hospital." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/3fyzjb.
Full textBornman, Werner George. "Information security risk management: a holistic framework." Thesis, 2008. http://hdl.handle.net/10210/265.
Full text