To see the other types of publications on this topic, follow the link: Modern methods of information protection.

Dissertations / Theses on the topic 'Modern methods of information protection'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 25 dissertations / theses for your research on the topic 'Modern methods of information protection.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Толбатов, Андрій Володимирович, Андрей Владимирович Толбатов, Andrii Volodymyrovych Tolbatov та Т. М. Сырицына. "Методы защиты от ошибок при передаче информации". Thesis, Изд-во СумГУ, 2009. http://essuir.sumdu.edu.ua/handle/123456789/4426.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Дядечко, Алла Миколаївна, Алла Николаевна Дядечко, Alla Mykolaivna Diadechko, A. Proshchajlo, and S. Poltavets. "Modern protection of the information." Thesis, Видавництво СумДУ, 2011. http://essuir.sumdu.edu.ua/handle/123456789/13459.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Aderam, Henry Ndejapo Tshapumba. "Consumer protection in online payment methods." Diss., University of Pretoria, 2019. http://hdl.handle.net/2263/73435.

Full text
Abstract:
This research focuses on online payment methods which are premised on electronic funds transfer. It is a general discourse that the use of online payment methods is risky. It is held that the fear of fraud and abuse of a payment system is at the focal point of such risk. Banks which provide these payment systems are usually not prepared to negotiate with their prospective customers. Resultantly, banks contract out of the risk associated with online payments, specifically the liability for unauthorized electronic funds transfers. This culminates in bank’s customers bearing the majority of tha
APA, Harvard, Vancouver, ISO, and other styles
4

Tian, Yuan. "Privacy Preserving Information Sharing in Modern and Emerging Platforms." Research Showcase @ CMU, 2018. http://repository.cmu.edu/dissertations/1186.

Full text
Abstract:
Users share a large amount of information with modern platforms such as web platforms and social platforms for various services. However, they face the risk of information leakage because modern platforms still lack proper security policies. Existing security policies, such as permission systems and isolation, can help regulate information sharing. However, these policies have problems, such as coarse granularity, bad usability, and incompleteness, especially when new features are introduced. I investigate the security impacts of new features in web and mobile platforms and find design problem
APA, Harvard, Vancouver, ISO, and other styles
5

Pramila, A. (Anu). "Benchmarking and modernizing print-cam robust watermarking methods on modern mobile phones." Master's thesis, University of Oulu, 2015. http://urn.fi/URN:NBN:fi:oulu-201504021271.

Full text
Abstract:
Digital watermarking has generally been used for copy-‭ ‬and copyright protection,‭ ‬authentication and,‭ ‬more recently,‭ ‬value-added services.‭ ‬It has been restricted to digital world but by developing methods which are able to read a watermark from a printed image with a camera phone would enable the watermark extraction to be free of time and place. The aim of this work was to compare print-cam robust watermarking methods and illustrate the problems that emerge when the watermarking methods are implemented on a camera phone.‭ ‬This was achieved by selecting three print-cam robust waterm
APA, Harvard, Vancouver, ISO, and other styles
6

Fratesi, Sarah Elizabeth. "The Virtual Landscape of Geological Information Topics, Methods, and Rhetoric in Modern Geology." [Tampa, Fla] : University of South Florida, 2008. http://purl.fcla.edu/usf/dc/et/SFE0002777.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Krasnokutska, Nataliia. "Key trends in modern management." Thesis, NTU "KhPI", 2017. http://repository.kpi.kharkov.ua/handle/KhPI-Press/34935.

Full text
Abstract:
The study has shown the major trends that affect the creation and spread of new methods of management in the information society.The attained results prove the fact that precisely because of the efforts of managers companies can take their rightful place in the business environment, even at the low level of physical resources.
APA, Harvard, Vancouver, ISO, and other styles
8

Shulman, Katharine. "Paintings in Transit: A New Means For Protection of Collections, Balancing Traditional and Modern Conservation Philosophies and Methods." Scholarship @ Claremont, 2015. http://scholarship.claremont.edu/scripps_theses/697.

Full text
Abstract:
This thesis examines the motives behind museum loan and exchange policies and how loans can act as a new avenue for protecting and preserving paintings. When borrowed artworks are transported from one museum to another, there are many variables that come into play and careful planning is necessary for the safety of the object. Specific case studies of several well-known and respected museums that engage in and encourage loans will explore the complex nature of lending policies, their effect on the condition of artworks and their significance and impact on the museum world. This thesis culminat
APA, Harvard, Vancouver, ISO, and other styles
9

Rogers, Jason Lee. "Secure distribution of open source information." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FRogers.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Raybould, Michael, and n/a. "Attitudes and Information Effects in Contingent Valuation of Natural Resources." Griffith University. Australian School of Environmental Studies, 2006. http://www4.gu.edu.au:8080/adt-root/public/adt-QGU20061009.150949.

Full text
Abstract:
This thesis investigated the effects of photographic and text information on respondents' attitudes and willingness-to-pay for a proposed beach protection scheme in the erosion prone Gold Coast region on the east coast of Australia. The research developed two alternative expectancy-value attitude-behaviour models to test residents' attitudes toward relevant targets and behavioural intention, expressed through stated willingness-to-pay, and compared the proposed models with one established attitude-behaviour model. The thesis set out to investigate three central research questions; one question
APA, Harvard, Vancouver, ISO, and other styles
11

Raybould, Michael. "Attitudes and Information Effects in Contingent Valuation of Natural Resources." Thesis, Griffith University, 2006. http://hdl.handle.net/10072/367928.

Full text
Abstract:
This thesis investigated the effects of photographic and text information on respondents' attitudes and willingness-to-pay for a proposed beach protection scheme in the erosion prone Gold Coast region on the east coast of Australia. The research developed two alternative expectancy-value attitude-behaviour models to test residents' attitudes toward relevant targets and behavioural intention, expressed through stated willingness-to-pay, and compared the proposed models with one established attitude-behaviour model. The thesis set out to investigate three central research questions; one question
APA, Harvard, Vancouver, ISO, and other styles
12

Prykhodko, S. B. "Application of Nonlinear Stochastic Differential Systems for Data Protection in Audio and Graphics Files." Thesis, Sumy State University, 2015. http://essuir.sumdu.edu.ua/handle/123456789/41209.

Full text
Abstract:
Data protection in audio and graphics files is one of the significant problems in information security area. This problem is usually solved with cryptographic methods in computer systems, but new solutions are still being searched for. Application of nonlinear stochastic differential systems (SDSs) is one of such new methods [1].
APA, Harvard, Vancouver, ISO, and other styles
13

Schiller, Alexander [Verfasser], Bernd [Akademischer Betreuer] Heinrich, and Mathias [Akademischer Betreuer] Klier. "Concepts and Methods from Artificial Intelligence in Modern Information Systems – Contributions to Data-driven Decision-making and Business Processes / Alexander Schiller ; Bernd Heinrich, Mathias Klier." Regensburg : Universitätsbibliothek Regensburg, 2020. http://d-nb.info/1203875061/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Dart, Martin J. "Cyber security risk management in large Australian healthcare systems - a mixed methods study." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2024. https://ro.ecu.edu.au/theses/2756.

Full text
Abstract:
This thesis investigates cyber security risk and resilience governance challenges impacting large Australian healthcare providers. Using a mixed-methods approach it exploits the benefits of quantitative and qualitative techniques, identifying problem areas where research was previously lacking in order to deliver actionable insights. This includes the Australian context for cyber risk definition and governance, human factors, healthcare data breach occurrences, and cyber incident cost estimation. This study examines 450 source documents for thematic indicators, and 929 Australian healthcare da
APA, Harvard, Vancouver, ISO, and other styles
15

Stauber, Sebastian. "Compliance issues within Europe's General Data Protection Regulation in the context of information security and privacy governance in Swedish corporations : A mixed methods study of compliance practices towards GDPR readiness." Thesis, Internationella Handelshögskolan, Högskolan i Jönköping, IHH, Informatik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-39809.

Full text
Abstract:
The European Union has introduced a new General Data Protection Regulation that regulates all aspects of privacy and data protection for the data of European citizens. To transition to the new rules, companies and public institutions were given two years to adapt their systems and controls. Due to the large area of changes the GDPR requires, many companies are facing severe problems to adapt the rules to be ready for enforcement. This marks the purpose of this study which is to look into compliance practices in the implementation of GDPR requirements. This includes a prospect of compliance mec
APA, Harvard, Vancouver, ISO, and other styles
16

Rahnavard, Nazanin. "Coding for wireless ad-hoc and sensor networks unequal error protection and efficient data broadcasting /." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/26673.

Full text
Abstract:
Thesis (Ph.D)--Electrical and Computer Engineering, Georgia Institute of Technology, 2008.<br>Committee Chair: Professor Faramarz Fekri; Committee Member: Professor Christopher Heil; Committee Member: Professor Ian F. Akyildiz; Committee Member: Professor James H. McClellan; Committee Member: Professor Steven W. McLaughlin. Part of the SMARTech Electronic Thesis and Dissertation Collection.
APA, Harvard, Vancouver, ISO, and other styles
17

Antignac, Thibaud. "Méthodes formelles pour le respect de la vie privée par construction." Thesis, Lyon, INSA, 2015. http://www.theses.fr/2015ISAL0016/document.

Full text
Abstract:
Le respect de la vie privée par construction est de plus en plus mentionné comme une étape essentielle vers une meilleure protection de la vie privée. Les nouvelles technologies de l'information et de la communication donnent naissance à de nouveaux modèles d'affaires et de services. Ces services reposent souvent sur l'exploitation de données personnelles à des fins de personnalisation. Alors que les exigences de respect de la vie privée sont de plus en plus sous tension, il apparaît que les technologies elles-mêmes devraient être utilisées pour proposer des solutions davantage satisfaisantes.
APA, Harvard, Vancouver, ISO, and other styles
18

Van, der Westhuizen Hendrik Petrus Steyn. "Die ontwikkeling van 'n GIS-tegniek om visuele landskap te kwantifiseer." Thesis, Stellenbosch : Stellenbosch University, 2001. http://hdl.handle.net/10019.1/52215.

Full text
Abstract:
Thesis (MA)--Stellenbosch University, 2001.<br>ENGLISH ABSTRACT: The visual landscape is a resource that should be managed sustainably. Sufficient tools for the effective management of visual landscapes are still lacking. Existing visualization software (including 3D Analyst) could be utilized as an aid in visual landscape management, but as such it lacks quantification functionalities. Geographical Information Systems (GIS) could effectively be used in the quantification of visual landscapes. The composition, value and experience of visual landscapes are complex and interrelated. Visua
APA, Harvard, Vancouver, ISO, and other styles
19

Гавриленко, Світлана Юріївна. "Методи та засоби ідентифікації стану комп'ютерних систем критичного застосування для захисту інформації". Thesis, Національний технічний університет "Харківський політехнічний інститут", 2019. http://repository.kpi.kharkov.ua/handle/KhPI-Press/42612.

Full text
Abstract:
Дисертація на здобуття наукового ступеня доктора технічних наук за спеціальністю 05.13.05 – Комп'ютерні системи та компоненти (123 – Комп'ютерна інженерія). – Національний технічний університет "Харківський політехнічний інститут", Міністерство освіти і науки України, Харків, 2019. Дисертацію присвячено підвищенню оперативності та достовірності ідентифікації стану комп'ютерних систем критичного застосування шляхом розробки та удосконалення методів та засобів розпізнавання аномалій та зловживань. Проведено аналіз науково-технічної проблеми ідентифікації стану КСКЗ для захисту даних. Виконано ан
APA, Harvard, Vancouver, ISO, and other styles
20

Гавриленко, Світлана Юріївна. "Методи та засоби ідентифікації стану комп'ютерних систем критичного застосування для захисту інформації". Thesis, Національний технічний університет "Харківський політехнічний інститут", 2019. http://repository.kpi.kharkov.ua/handle/KhPI-Press/42609.

Full text
Abstract:
Дисертація на здобуття наукового ступеня доктора технічних наук за спеціальністю 05.13.05 – комп'ютерні системи та компоненти. – Національний технічний університет "Харківський політехнічний інститут", Харків, 2019. Дисертацію присвячено підвищенню оперативності та достовірності ідентифікації стану комп'ютерних систем критичного застосування шляхом розробки та удосконалення методів та засобів розпізнавання аномалій та зловживань. Проведено аналіз науково-технічної проблеми ідентифікації стану КСКЗ для захисту даних. Виконано порівняльні дослідження існуючих методів та відомих комп'ютеризованих
APA, Harvard, Vancouver, ISO, and other styles
21

Мельничук, Андрій Богданович, та Andrii Melnychuk. "Методи захисту інформації в рамках предметно-орієнтованого проєктування інформаційних систем". Master's thesis, ТНТУ, 2021. http://elartu.tntu.edu.ua/handle/lib/36742.

Full text
Abstract:
«Методи захисту інформації в рамках предметно-орієнтованого проєктування інформаційних систем» // Дипломна робота ОР «Магістр» // Мельничук Андрій Богданович // Тернопільський національний технічний університет імені Івана Пулюя, факультет комп'ютерно інформаційних систем і програмної інженерії, кафедра кібербезпеки, група СБм-61 // Тернопіль, 2021 // С. 61, табл. – 3, рис. – 10, додат. – 1.<br>Предметно-орієнтоване проектування — це підхід до проектування програмного забезпечення. Метод проєктування визначає у собі практики як спілкуватись із спеціалістами, самої, предметної області та
APA, Harvard, Vancouver, ISO, and other styles
22

Caillosse, Pierre. "La paroisse de Soulac de la fin du XVIe au milieu du XIXe siècle : les transformations d’un territoire littoral entre la Gironde et l’Atlantique." Thesis, La Rochelle, 2015. http://www.theses.fr/2015LAROF002/document.

Full text
Abstract:
Située à la pointe du Médoc, la paroisse de Soulac (communes actuelles de Soulac-sur-Mer et du Verdon-sur-Mer, Gironde) est selon une expression médiévale « à la fin des terres ». Prise en tenaille entre l’Atlantique, à l’ouest, et la Gironde, à l’est, son finage comprend un long liseré littoral (14 km de rivages océaniques et 11 km de rives estuariennes) qui l’expose aux phénomènes d’origine naturelle liés à des dynamiques maritimes et fluviomaritimes. Depuis la fin du XVIe siècle, le sable accumulé le long du littoral sous la forme de dunes est porté par le vent sur les habitations et les cu
APA, Harvard, Vancouver, ISO, and other styles
23

Antypenko. "PROBLEMS OF INFORMATION PROTECTION IN MODERN SOCIETY." Thesis, 2018. http://er.nau.edu.ua/handle/NAU/33660.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Luan, Chia-Hsiang, and 欒家祥. "Free Methods for PDF Documents Data Masking - A Way to Abide by Personal Information Protection Act." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/yd5988.

Full text
Abstract:
碩士<br>中國文化大學<br>資訊管理學系碩士在職專班<br>102<br>A research paper by Institute for Information Industry(2012) pointed out that the implementing of Personal Information Protection Act shall be a shock to public department and numbers of Individual enterprises. Without discrimination to all vocations, the new law makes everyone need to give the evidence voluntarily to prove them innocence. Setting up administrative systems of personal information is no more only in public department or few vocations. There is no idea if anybody has no access but to read the document (especially official document) in the
APA, Harvard, Vancouver, ISO, and other styles
25

Clark, James Andrew George Roy. "The near repeat risk calculation of residential burglaries in Hillcrest, KwaZulu-Natal, South Africa : a criminological analysis." Diss., 2018. http://uir.unisa.ac.za/handle/10500/25683.

Full text
Abstract:
Text in English with abstracts in English, isiZulu and Xhosa<br>This research applies the Near Repeat Calculator (NRC) to identify near repeat residential burglary patterns in the Hillcrest (KZN) policing area for the first time. A total of 490 residential burglaries, over a 12-month period, reported to Hillcrest police station were mapped (geocoded) and the near repeat calculations were visualised using the Geographic Information Systems (GIS). The month-to-month near repeat calculations are analysed and suggest that the NRC is a valuable tool that can predict the space-time locations of near
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!