To see the other types of publications on this topic, follow the link: IT Security Governance.

Dissertations / Theses on the topic 'IT Security Governance'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'IT Security Governance.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Kronschnabl, Stefan. "IT-Security Governance /." Regensburg : Univ.-Verl, 2008. http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=017045454&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wu, Yu. "Effects of IT Governance on Information Security." Doctoral diss., University of Central Florida, 2007. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/2127.

Full text
Abstract:
This dissertation is composed by three essays that explore the relationship between good IT governance and effective information security services. Governance steers and verifies performance of fiduciary duties, through the implementation of proper governance mechanisms. With a focus on information security, this essay presents three categories of governance mechanisms – process-based, structural, and relational. When properly instituted, they work together to ensure that IT understands business requirements for information security and strives to fulfill them. An explanation is offered a
APA, Harvard, Vancouver, ISO, and other styles
3

Mishra, Sushma. "DEFINING VALUE BASED INFORMATION SECURITY GOVERNANCE OBJECTIVES." VCU Scholars Compass, 2008. http://scholarscompass.vcu.edu/etd/1755.

Full text
Abstract:
This research argues that the information security governance objectives should be grounded in the values of organizational members. Research literature in decision sciences suggest that individual values play an important role in developing decision objectives. Information security governance objectives, based on values of the stakeholders, are essential for a comprehensive security control program. The study uses Value Theory as a theoretical basis and value focused thinking as a methodology to develop 23 objectives for information security governance. A case study was conducted to reexamine
APA, Harvard, Vancouver, ISO, and other styles
4

Cullen, Patrick Jerome. "Private security in international politics : deconstructing the state's monopoly of security governance." Thesis, London School of Economics and Political Science (University of London), 2009. http://etheses.lse.ac.uk/2744/.

Full text
Abstract:
This thesis examines the theoretical implications of private security for International Relations (IR) theory and global politics from the perspective of a security governance model. It draws upon multi-disciplinary theoretical research on private security to both map the way security governance has been de-linked from the state, as well as to map the public-private hybrids and security networks that constitute private security's continued connection to the state. On one level, this thesis engages in a direct theoretical critique of Realist theory and its Weberian inspired understanding of the
APA, Harvard, Vancouver, ISO, and other styles
5

Davis, Robert Elliot. "Relationship between Corporate Governance and Information Security Governance Effectiveness in United States Corporations." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3873.

Full text
Abstract:
Cyber attackers targeting large corporations achieved a high perimeter penetration success rate during 2013, resulting in many corporations incurring financial losses. Corporate information technology leaders have a fiduciary responsibility to implement information security domain processes that effectually address the challenges for preventing and deterring information security breaches. Grounded in corporate governance theory, the purpose of this correlational study was to examine the relationship between strategic alignment, resource management, risk management, value delivery, performance
APA, Harvard, Vancouver, ISO, and other styles
6

Coertze, Jacques Jacobus. "A framework for information security governance in SMMEs." Thesis, Nelson Mandela Metropolitan University, 2012. http://hdl.handle.net/10948/d1014083.

Full text
Abstract:
It has been found that many small, medium and micro-sized enterprises (SMMEs) do not comply with sound information security governance principles, specifically the principles involved in drafting information security policies and monitoring compliance, mainly as a result of restricted resources and expertise. Research suggests that this problem occurs worldwide and that the impact it has on SMMEs is great. The problem is further compounded by the fact that, in our modern-day information technology environment, many larger organisations are providing SMMEs with access to their networks. This re
APA, Harvard, Vancouver, ISO, and other styles
7

Posthumus, Shaun Murray. "Corporate information risk : an information security governance framework." Thesis, Nelson Mandela Metropolitan University, 2006. http://hdl.handle.net/10948/814.

Full text
Abstract:
Information Security is currently viewed from a technical point of view only. Some authors believe that Information Security is a process that involves more than merely Risk Management at the department level, as it is also a strategic and potentially legal issue. Hence, there is a need to elevate the importance of Information Security to a governance level through Information Security Governance and propose a framework to help guide the Board of Directors in their Information Security Governance efforts. IT is a major facilitator of organizational business processes and these processes manipu
APA, Harvard, Vancouver, ISO, and other styles
8

Brand, Johanna Catherina. "The governance of significant enterprise mobility security risks." Thesis, Stellenbosch : Stellenbosch University, 2013. http://hdl.handle.net/10019.1/85853.

Full text
Abstract:
Thesis (MComm)--Stellenbosch University, 2013.<br>ENGLISH ABSTRACT: Enterprise mobility is emerging as a megatrend in the business world. Numerous risks originate from using mobile devices for business-related tasks and most of these risks pose a significant security threat to organisations’ information. Organisations should therefore apply due care during the process of governing the significant enterprise mobility security risks to ensure an effective process to mitigate the impact of these risks. Information technology (IT) governance frameworks, -models and -standards can provide gu
APA, Harvard, Vancouver, ISO, and other styles
9

Edwards, Charles Kumar. "A Framework for the Governance of Information Security." NSUWorks, 2013. http://nsuworks.nova.edu/gscis_etd/143.

Full text
Abstract:
Information security is a complex issue, which is very critical for success of modern businesses. It can be implemented with the help of well-tested global standards and best practices. However, it has been studied that the human aspects of information security compliance pose significant challenge to its practitioners. There has been significant interest in the recent past on how human compliance to information security policy can be achieved in an organization. Various models have been proposed by these researchers. However, there are very few models that have tried to link human commitment
APA, Harvard, Vancouver, ISO, and other styles
10

Alqurashi, Ezzat. "The viable system model for information security governance." Thesis, University of Southampton, 2015. https://eprints.soton.ac.uk/388392/.

Full text
Abstract:
Information security governance (ISG) has emerged as a new information security (IS) discipline and is considered one of the critical areas of research for enhancing the viability of organisations. This research proposes a viable system model (VSM) for ISG (VSMISG) and investigates its effects. The investigation involves studying the effects of the VSMISG in small, medium and large organisations facing low, medium and high security threat intensity over different time scales. This study also analyses the costs and benefits of changing from the baseline ISG model to the VSMISG. From reviewing t
APA, Harvard, Vancouver, ISO, and other styles
11

Edwards, Charles K. "A framework for the governance of information security." Thesis, Nova Southeastern University, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=3607548.

Full text
Abstract:
<p> Information security is a complex issue, which is very critical for success of modern businesses. It can be implemented with the help of well-tested global standards and best practices. However, it has been studied that the human aspects of information security compliance pose significant challenge to its practitioners. There has been significant interest in the recent past on how human compliance to information security policy can be achieved in an organization. Various models have been proposed by these researchers. However, there are very few models that have tried to link human co
APA, Harvard, Vancouver, ISO, and other styles
12

Pries, Kari Mariska. "Contested concepts and practices in security governance : evolving security approaches in El Salvador." Thesis, University of Glasgow, 2017. http://theses.gla.ac.uk/8070/.

Full text
Abstract:
Hope accompanied El Salvador’s peace agreements, ending 12 years of civil war. New peace and democratic renewal were expected in the tiny Central American state. Instead, extreme violence has persisted as a lived experience for individuals and a part of its state operations. Successive governments proved unable to consolidate control over the post-war crime wave. ‘Tough on crime’ public policy agendas, which included hard-handed violence-repression tactics, had little success in mitigating insecurity. In 2009, a new ex-guerrilla party, the National Liberation Front ‘Farabundo Marti’ (FMLN), wa
APA, Harvard, Vancouver, ISO, and other styles
13

Duncan, Jessica. "The reformed Committee on World Food Security and the global governance of food security." Thesis, City University London, 2014. http://openaccess.city.ac.uk/3511/.

Full text
Abstract:
This research explores the reformed UN Committee on World Food Security (CFS) as an institution addressing a changed world, and as an illustration of evolving global food security governance. The research sets out to answer the extent to which the CFS is realising its reform objectives and how it is positioning itself within a changing architecture of global food security governance. Informed by literature on global governance and embedded neoliberalism, the inquiry centres around three case studies – Civil Society Mechanism, Voluntary Guidelines for the Responsible Governance of Tenure of Lan
APA, Harvard, Vancouver, ISO, and other styles
14

Viljoen, Melanie. "A framework towards effective control in information security governance." Thesis, Nelson Mandela Metropolitan University, 2009. http://hdl.handle.net/10948/887.

Full text
Abstract:
The importance of information in business today has made the need to properly secure this asset evident. Information security has become a responsibility for all managers of an organization. To better support more efficient management of information security, timely information security management information should be made available to all managers. Smaller organizations face special challenges with regard to information security management and reporting due to limited resources (Ross, 2008). This dissertation discusses a Framework for Information Security Management Information (FISMI) that
APA, Harvard, Vancouver, ISO, and other styles
15

Gopalakrishnan, Shweta. "Mapping the elements of governance in international health security." Thesis, Kansas State University, 2011. http://hdl.handle.net/2097/9963.

Full text
Abstract:
Master of Public Health<br>Department of Diagnostic Medicine/Pathobiology<br>Justin J. Kastner<br>Globalization has resulted in closer integration of economies and societies. It has contributed to the emergence of a new world order which involves a vast nexus of global and regional institutions, surrounded by transnational corporations, and non-governmental agencies seeking to influence the agenda and direction of international public policy. Health is a center point of geopolitics, security, trade, and foreign policy. Expansion in the territory of health and an increase in the number of healt
APA, Harvard, Vancouver, ISO, and other styles
16

Berg, Julie. "Polycentric security governance : legitimacy, accountability, and the public interest." Doctoral thesis, University of Cape Town, 2015. http://hdl.handle.net/11427/15493.

Full text
Abstract:
This thesis examines how power is constituted in hybrid polycentric systems of security governance. In particular, the thesis explores how legitimacy - as one form of power - is configured in Improvement Districts in South Africa, with a specific focus on three ways by which it is gained: through promoting public participation in decision-making; through transparent and accountable policing nodes; and through the delivery of effective security for the public good. Polycentric systems of security governance are usually composed of a number of policing or security nodes that are independent of e
APA, Harvard, Vancouver, ISO, and other styles
17

Nyamnjoh, Anye-Nkwenti. "Local ownership and democratic governance in security sector reform." Master's thesis, University of Cape Town, 2016. http://hdl.handle.net/11427/24924.

Full text
Abstract:
Local ownership is a major component of what is considered best practice in contemporary peacebuilding. It seeks to reallocate authority between local and international actors in peacebuilding contexts. In its purest form, it requires that the design, implementation and evaluation of reform should be led by local actors. Therefore, under local ownership, external actors are circumscribed to a supporting role in post-conflict reconstruction. Local ownership is thus a critique of the tendency towards top-down internationally led peacebuilding reform. The primacy of local ownership is evident in
APA, Harvard, Vancouver, ISO, and other styles
18

Phillips, Celeste. "Information security governance implementation within the mobile device environment." Master's thesis, University of Cape Town, 2014. http://hdl.handle.net/11427/8502.

Full text
Abstract:
Includes bibliographical references.<br>Organisational information has been acknowledged to be a valuable asset which must be protected no matter where it is accessed from or how it is accessed. Mobile devices such as smartphones and tablets are becoming a popular means of accessing the organisation's information whether it is on a company-owned or personal mobile device. This has led to an increased awareness of potential risks to the organisation within the mobile device environment which requires organisations to be more vigilant with regards to information security governance. The objectiv
APA, Harvard, Vancouver, ISO, and other styles
19

Olsen, Brett C. "Essays on security issuance." Diss., Columbia, Mo. : University of Missouri-Columbia, 2007. http://hdl.handle.net/10355/6261.

Full text
Abstract:
Thesis (Ph.D.)--University of Missouri-Columbia, 2007.<br>The entire dissertation/thesis text is included in the research.pdf file; the official abstract appears in the short.pdf file (which also appears in the research.pdf); a non-technical general description, or public abstract, appears in the public.pdf file. Title from title screen of research.pdf file (viewed on March 24, 2009) Vita. Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
20

Lemon, Edward James. "Governing Islam and security in Tajikistan and beyond : the emergence of transnational authoritarian security governance." Thesis, University of Exeter, 2016. http://hdl.handle.net/10871/23791.

Full text
Abstract:
Since 2002, the government of post-Soviet Tajikistan has deployed its security apparatus outside of the state’s territorial borders at least 49 times, intimidating, kidnapping and monitoring its citizens. I use the term transnational authoritarian security governance to refer to these border-spanning security practices. Although both secular and religious opponents to the government have been targeted, in this dissertation, I examine how the government of Tajikistan attempts to manage the threat from Islamic ‘extremism.’ I trace the emergence of the securitisation of Islam back to the Soviet U
APA, Harvard, Vancouver, ISO, and other styles
21

SCHROEDER, Ursula C. "The making of the new EU security order : an organizational study of complex security governance." Doctoral thesis, European University Institute, 2007. http://hdl.handle.net/1814/7038.

Full text
Abstract:
Defence date: 7 May 2007<br>Examination Board: Prof. Friedrich Kratochwil (EUI); Prof. Pascal Vennesson (EUI/RSCAS); Prof. Christopher Daase (LMU Munich); Prof. Michael C. Williams (University of Wales, Aberystwyth)<br>PDF of thesis uploaded from the Library digital archive of EUI PhD theses<br>The Organization of European Security Governance investigates what impact the changing nature of security challenges has had on the organization of security governance in Europe. As the most pervasive security challenges today are difficult to classify as either internal or external, the traditional div
APA, Harvard, Vancouver, ISO, and other styles
22

Warmington, Sheray Kimberlyn. "State failure and hybrid security governance : the case of Jamaica." Thesis, University of York, 2017. http://etheses.whiterose.ac.uk/21205/.

Full text
Abstract:
This thesis is concerned with examining the intersection between the failed state and security governance literatures, through the case study of Jamaica. This thesis is primarily concerned with examining the under-researched link between concerns raised in failed state and security governance literatures. The thesis proposes that the presence of state failure and success in the same setting is a direct result of the execution of a problematic security governance framework that impedes the nation’s ability to establish a stable state infrastructure that is capable of fulfilling the welfare need
APA, Harvard, Vancouver, ISO, and other styles
23

Munk, Tine Hojsgaard. "Cyber-security in the European region : anticipatory governance and practices." Thesis, University of Manchester, 2015. https://www.research.manchester.ac.uk/portal/en/theses/cybersecurity-in-the-european-region-anticipatory-governance-and-practices(6658eec7-cc61-4c84-9054-ea40cf405ed9).html.

Full text
Abstract:
This thesis explores the nature of cyber-security at the beginning of the 21st century. In the current security paradigm, security strategies based on anticipatory governance have become essential in the management of the constantly changing cyber-security environment. Thus, this thesis aims to understand security strategies and governance introduced in the European region. The increased dependency on cyber-space is visible in all public-private sectors and governmental operations, as well as communications between groups and individuals. As a result, cyber-attacks on public and private entiti
APA, Harvard, Vancouver, ISO, and other styles
24

McConnell, James Robert. "Essex under Cromwell: Security and Local Governance in the Interregnum." PDXScholar, 2012. https://pdxscholar.library.pdx.edu/open_access_etds/686.

Full text
Abstract:
In 1655, Lord Protector Oliver Cromwell's Council of State commissioned a group of army officers for the purpose of "securing the peace of the commonwealth." Under the authority of the Instrument of Government, a written constitution not sanctioned by Parliament, the Council sent army major-generals into the counties to raise new horse militias and to support them financially with a tax on Royalists which the army officers would also collect. In counties such as Essex--the focus of this study--the major-generals were assisted in their work by small groups of commissioners, mostly local men "we
APA, Harvard, Vancouver, ISO, and other styles
25

Mahncke, Rachel J. "Measuring and applying information security governance within general medical practice." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2016. https://ro.ecu.edu.au/theses/1797.

Full text
Abstract:
Australia is in the process of adopting a national approach towards the secure electronic exchange of health information. The health information contributions of general practices as the primary point of patient medical care, will be critical to the success of an interoperable national healthcare system. Sharing information creates vulnerabilities by increasing exposure to information security threats. Consequently, improvement in information security practice within general practice may positively contribute towards improved patient care by providing access to timely and accurate information.
APA, Harvard, Vancouver, ISO, and other styles
26

Thomson, Kerry-Lynn. "Integrating information security into corporate culture." Thesis, Port Elizabeth Technikon, 2003. http://hdl.handle.net/10948/132.

Full text
Abstract:
Introduction: There are many components that are required for an organisation to be successful in its chosen field. These components vary from corporate culture, to corporate leadership, to effective protection of important assets. These and many more contribute to the success of an organisation. One component that should be a definitive part in the strategy of any organisation is information security. Information security is one of the fastest growing sub-disciplines in the Information Technology industry, indicating the importance of this field (Zylt, 2001, online). Information security is c
APA, Harvard, Vancouver, ISO, and other styles
27

Neville, Karen M. "IS security leveraging the concept of knowledge management." Thesis, University of Bath, 2010. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.527132.

Full text
Abstract:
IS Security (ISS) has become a key element of business risk management and can itself create competitive advantage. Thus, organisations seek practical approaches to protect the operation of the business. Protecting the functionality of an organisation is a difficult task but it is the responsibility of both senior management and ISS functions to do so. An analysis of the ISS literature reveals a paucity of research of ISS management, and a need for research to develop a holistic model for managing ISS knowledge to overcome the ever-increasing number of negative security incidents. The ISS rese
APA, Harvard, Vancouver, ISO, and other styles
28

Farnian, Adnan. "Assessing The Relative Importance of Information Security Governance Processes on Reducing Negative Impacts From Information Security Incidents." Thesis, KTH, Industriella informations- och styrsystem, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-81417.

Full text
Abstract:
Today the extent and value of electronic data is constantly growing. Dealing across the internet depends on how secure consumers believe their personal data are. And therefore, information security becomes essential to any business with any form of web strategy, from simple business-to-consumer, or business-to-business to the use of extranets, e-mail and instants messaging. It matters too any organization that depends on computers for its daily existence. This master thesis has its focus on Information Security Governance. The goal of this thesis was to study different Information Security pro
APA, Harvard, Vancouver, ISO, and other styles
29

Nakueira, Sophie. "New architectures of governance : transnational private actors, enrolment strategies and the security governance of sports mega events." Doctoral thesis, University of Cape Town, 2014. http://hdl.handle.net/11427/12916.

Full text
Abstract:
Includes bibliographical references.<br>The FIFA World Cup has become one of the most sought after sports mega events by many countries in today’s society, as well as one of the most controversial. As I put the finishing touches on this thesis, the FIFA World Cup is taking place in Brazil. As with previous World Cups, the planning stage of the 2014 World Cup has been characterised by protests and considerable criticism, particularly concerned with the expenditures on mega event structures such as stadiums. FIFA, along with host country’s governments, has been a major recipient of criticism. Th
APA, Harvard, Vancouver, ISO, and other styles
30

Quinn, Peter Thomas, and peter quinn@anu edu au. "HUMAN SECURITY AND DEVELOPMENT: THE CASE OF CAMBODIA." The Australian National University. Centre for Asian Societies and Histories, College of Asia & the Pacific, 2008. http://thesis.anu.edu.au./public/adt-ANU20100701.122958.

Full text
Abstract:
Human security was promoted in 1994 by the UNDP as a concept embracing not only freedom from war and violence (or personal security), but also embracing individual�s basic needs for (and rights to) economic security, food security, health security, environmental security, community security and political security. Following this formulation, the concept has been subject to considerable scrutiny particularly in the context of state centric security studies. Extending the concept of security beyond the state to the individual appeared problematic, especially as the mechanisms designed to ma
APA, Harvard, Vancouver, ISO, and other styles
31

Ponenti, Albert M. "An integrative risk management/governance framework for homeland security decision making." Thesis, Monterey, Calif. : Naval Postgraduate School, 2008. http://bosun.nps.edu/uhtbin/hyperion-image.exe/08Mar%5FPonenti.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, March 2008.<br>Thesis Advisor(s): Rollins, John. "March 2008." Description based on title screen as viewed on May 5, 2008 Includes bibliographical references (p.119-124). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
32

Edwards, Adam Michael. "Multi-centred governance in liberal modes of security : a realist approach." Thesis, Cardiff University, 2017. http://orca.cf.ac.uk/103156/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Brereton, Catherine Margaret. "Mapping Grahamstown's security governance network : prospects and problems for democratic policing." Thesis, Rhodes University, 2006. http://hdl.handle.net/10962/d1006323.

Full text
Abstract:
The security of its citizens is often regarded as the democratic state's primary raison d'etre. However, with increasing crime and perceptions of insecurity among citizens, along with actual and perceived state policing inadequacies, citizens around the world have sought to make alternative arrangements for their security. The explosion of private alternatives to state policing has resulted in the need for the replacement of former static definitions of policing by more fluid understandings of what policing entails. Policing is no longer an activity undertaken exclusively by the 'state police.
APA, Harvard, Vancouver, ISO, and other styles
34

Soyref, Maxim. "The holistic management of information security processes." Thesis, The University of Sydney, 2014. http://hdl.handle.net/2123/13373.

Full text
Abstract:
Title: The holistic management of information security processes Keywords: cybersecurity, information security, strategy, security process, security governance, security management This research examines information security management and associated processes within a large Australian financial institution by providing a rich, in-depth view of organisational information security management within the specifics of its dynamic context. Using a single in-depth qualitative case study, this research examines the role of internal and external actors in relation to the information security managemen
APA, Harvard, Vancouver, ISO, and other styles
35

Adjapong, Frederick Kwaku. "Linking Food Security Governance and Changing Food Security Priorities: A Case Study of the Northern Region of Ghana." Ohio University / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou162885878645884.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Mirbaz, Jamshid. "Säkerhetsstyrning inom den Finansiella Sektorn : En Studie på Best Practice hos Tre Svenska Banker." Thesis, KTH, Industriella informations- och styrsystem, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-98863.

Full text
Abstract:
For organizations that handle sensitive information, IT governance and information security are necessities in order to maintain credibility and to conduct its business efficiently. There are several known processes to increase security governance – which is a fusion of information security and IT governance. This master thesis examines if organizations use recognized processes and if it in that case would lead to higher security. The study is qualitative and conducted in the financial sector and based on Best Practice frameworks of the security governance in Swedish banks. Data collection was
APA, Harvard, Vancouver, ISO, and other styles
37

Allen, John Oakley. "Decentralised electricity and its implications for the governance of UK energy security." Thesis, University of Exeter, 2014. http://hdl.handle.net/10871/16387.

Full text
Abstract:
The GB electricity system is in a state of change, both physically and operationally. The future of the electricity system needs to be low carbon and secure. Current system structures revolve around large-scale centralised generation to deliver this security. This thesis argues that with a broad definition of energy security, which reflects the future needs of the electricity system, a decentralised approach would be more beneficial to deliver these needs. This thesis identifies the governance processes that make up current energy security and evaluates how these might change in a system of de
APA, Harvard, Vancouver, ISO, and other styles
38

Coates, A. G. "Constructing security governance : comparing regional narratives of institutionalisation and modalities of cooperation." Thesis, University of Essex, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.502165.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Sakota, Tijana. "Poor governance and terrorism in northern Mozambique since 2017." Diss., University of Pretoria, 2020. http://hdl.handle.net/2263/76224.

Full text
Abstract:
Terrorism emerged in northern Mozambique in 2017 and is ostensibly attributed to Muslim militants. The first attacks occurred on 5 October 2017 in Mocimboa da Praia town in the northern Mozambican province of Cabo Delgado. The group known as ‘Ansar al-Sunnah’ or ‘Al-Shabaab’ appears to be inspired by international terrorist clerics and followers, specifically from Tanzania, such as Sheik Aboud Rogo. These individuals share similar aspirations, including the rejection of Western education and the establishment of Sharia law. The Islamic State Central Africa Province has claimed responsibility f
APA, Harvard, Vancouver, ISO, and other styles
40

Flowers, Jim David. "Explaining policy differences as a function of diverse governance institutions." Diss., Georgia Institute of Technology, 2016. http://hdl.handle.net/1853/54971.

Full text
Abstract:
This study asks the question: “How does the structure of cybersecurity policy relate to differences in structure of policy governance of universities and colleges?” The study has three objectives. First, the study seeks to add to the body of knowledge concerning the relationship between the structure of cybersecurity policy processes and the security policies developed by those processes. Second, the study seeks to demonstrate the usefulness of the Institutional Grammar Tool, Rules Configurations, and other methods employed to analyze institutional configurations. Third, the study seeks to pro
APA, Harvard, Vancouver, ISO, and other styles
41

Viljoen, Stephen. "Applying a framework for IT governance in South African higher education institutions." Thesis, Nelson Mandela Metropolitan University, 2005. http://hdl.handle.net/10948/416.

Full text
Abstract:
Background: Higher Education (HE), through HE Institutions, plays a very important role in society. There is thus a need for this sector to be well managed, especially with regards to planning, organising, and controlling. Corporate Governance has received a lot of attention in recent times, especially to engender trust on the part of the stakeholders. There are many similarities, but also significant differences in the governance of HE institutions and public companies. Information Technology (IT) plays an extremely important role in the modern organisation, creating huge opportunities, but a
APA, Harvard, Vancouver, ISO, and other styles
42

Chau, Foo-cheong Sidney, and 周富祥. "Application the principles of corporate governance to enhance efficiency of airport security services." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2012. http://hub.hku.hk/bib/B5025456X.

Full text
Abstract:
Today, aviation security is at the forefront of public consciousness particularly when they think of their own personal safety. The dramatic and catastrophic attacks of 911, utilizing civil aviation resources has made the world view aviation security with a critical eye. It could be argued that the response by States and individual airports and airlines has been positive and rapid, however the effectiveness has been marginal. Many factors have been proffered as the reason, from ineffective conservative governments, out-dated equipment, old infrastructure to a traditional mind-set that does no
APA, Harvard, Vancouver, ISO, and other styles
43

Girard, Nicholas. "Regional-Scale Food Security Governance in Inuit Settlement Areas: Opportunities and Challenges in Northern Canada." Thesis, Université d'Ottawa / University of Ottawa, 2018. http://hdl.handle.net/10393/37076.

Full text
Abstract:
Food insecurity among northern Inuit communities represents a significant public health challenge that requires immediate and integrated responses. In the Inuvialuit Settlement Region (ISR), in the Northwest Territories (NWT), almost half of households experience some degree of food insecurity (33% moderate, 13% severe), and rates are even higher in Nunavut (35% moderate, 34% severe). Currently, food security issues in the Arctic are being addressed by multiple initiatives at different scales; however, the role that governance and policy plays in fostering or hampering Inuit food security rema
APA, Harvard, Vancouver, ISO, and other styles
44

Shaaban, Hussein Khamis. "Enhancing the governance of information security in developing countries : the case of Zanzibar." Thesis, University of Bedfordshire, 2014. http://hdl.handle.net/10547/315359.

Full text
Abstract:
Organisations in the developing countries need to protect their information assets (IA) in an optimal way. This thesis is based upon the argument that in order to achieve fully effective information security management (ISM) strategy, it is essential to look at information security in a socio-technical context, i.e. the cultural, ethical, moral, legal dimensions, tools, devices and techniques. The motivation for this study originated from the concern of social chaos, which results from ineffective information security practices in organisations in the developing nations. The present strategies
APA, Harvard, Vancouver, ISO, and other styles
45

Pennisi, di Floristella Angela Maria Gabriella. "ASEAN and the Construction of a Regional Security Partnership Achievements and Critical Issues to manage Security Governance in Southeast Asia." Doctoral thesis, Università di Catania, 2012. http://hdl.handle.net/10761/1122.

Full text
Abstract:
The study explores the influence of the ASEAN-centred security system on the attainment of regional security in the Southeast Asian region. ASEAN principles and mechanisms for conflict management are posed under closer scrutiny to analyse the development of regional cooperative relations and practises to face Southeast Asian contemporary security challenges.
APA, Harvard, Vancouver, ISO, and other styles
46

D'ERRICO, ALESSANDRO. "BLACK SANDS: SECURITY AND HUMANITARIAN AID IN CONTEMPORARY LIBYA." Doctoral thesis, Università degli Studi di Milano, 2018. http://hdl.handle.net/2434/597644.

Full text
Abstract:
.How do Non Governmental Organizations (NGOs) interact with global and local (non)state actors in fragile contexts? Which types of governance outcomes does this interaction produce? These aspects remain substantially under researched. None of the strands identified in the literature is substantially able to answer such questions. Moreover, how NGOs make sense of the changes, conflicts, cooperative relationships taking place within governance structures, what roles do NGOs play in the processes through which structures regulate the provision of services, is more assumed than researched. To fil
APA, Harvard, Vancouver, ISO, and other styles
47

Kim, Dongwoo. "A tool for delegative governance? : South Korea's National Security Law and delegative democracy." Thesis, University of British Columbia, 2016. http://hdl.handle.net/2429/58709.

Full text
Abstract:
The paper seeks to clarify the relationship between South Korea’s National Security Law (NSL) and democracy. The NSL is a special law that seeks to address the security threats from North Korea, criticized for limiting fundamental civil and political rights. However, these criticisms have shown limited effectiveness in light of the argument that South Korea has unique security needs that require some compromise. In order to demonstrate more effectively that the NSL is problematic for South Korea’s democracy, I argue that the continued use of the law makes more sense if South Korea is considere
APA, Harvard, Vancouver, ISO, and other styles
48

Ajala, Olayinka Adebayo. "Conflict in the Niger Delta : an analysis of resource governance and human security." Thesis, University of York, 2015. http://etheses.whiterose.ac.uk/8968/.

Full text
Abstract:
The thesis explores the causes and dynamics of the conflict that has lasted for decades in the oil rich Niger Delta region of Nigeria. I critically examined the main theories that have been previously used to explain the conflict particularly the dominant greed/grievance paradigm. I argue that the greed/grievance theory does not adequately explain the conflict as it is difficult to distinguish behaviours that could be labelled as greed or grievance. Instead, the thesis argues that the human security framework better explains the causes and dynamics of the conflict experienced in this region. A
APA, Harvard, Vancouver, ISO, and other styles
49

Topping, John R. "Beyond the Pattern Report : The Governance of Security in Policing with the Community." Thesis, University of Ulster, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.516423.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Perkowski, Nina. "Humanitarianism, human rights, and security in EUropean border governance : the case of Frontex." Thesis, University of Edinburgh, 2017. http://hdl.handle.net/1842/23494.

Full text
Abstract:
This thesis explores the (re-)positioning of the EU border agency Frontex within a wider shift towards humanitarianism and human rights in EUropean border governance. By examining Frontex’s public self-representation through time, it shows that the agency has gradually appropriated humanitarianism and human rights, while at the same time continuing to rely on a conceptualisation of migration as a security issue. The thesis traces this development, outlining how the agency has increasingly mobilised all three discursive formations in its public narratives about itself, border controls, and unau
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!