Dissertations / Theses on the topic 'Organizational information security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Organizational information security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Gutta, Ramamohan. "Managing Security Objectives for Effective Organizational Performance Information Security Management." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7147.
Full textLebek, Benedikt [Verfasser]. "Contributions to organizational information security / Benedikt Lebek." Hannover : Technische Informationsbibliothek und Universitätsbibliothek Hannover (TIB), 2015. http://d-nb.info/1074966856/34.
Full textShropshire, Jordan Douglas. "Predicting compliance with prescribed organizational information security protocols." Diss., Mississippi State : Mississippi State University, 2008. http://library.msstate.edu/etd/show.asp?etd=etd-10202008-120221.
Full textThomsson, Johan. "Organizational effects and management of information security : A cross-sectoral case study of three different organizations." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-66020.
Full textDunkerley, Kimberley. "Developing an Information Systems Security Success Model for Organizational Context." NSUWorks, 2011. http://nsuworks.nova.edu/gscis_etd/141.
Full textRydefelt, Calatayud Leonor. "A holistic model to create organizational information security awareness programs – iSAP." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-48050.
Full textZhang, Jie. "A model of human factors that affect organizational information security effectiveness /." Full text available from ProQuest UM Digital Dissertations, 2006. http://0-proquest.umi.com.umiss.lib.olemiss.edu/pqdweb?index=3&did=1331395881&SrchMode=1&sid=2&Fmt=2&VInst=PROD&VType=PQD&RQT=309&VName=PQD&TS=1218821137&clientId=22256.
Full textAl, Abbasi Hawazin. "Organizational Information Security: Strategies to Minimize Workplace Cyberloafing for Increased Productivity." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/4773.
Full textBox, Debra. "Business process security maturity: a paradigm convergence." Thesis, Nelson Mandela Metropolitan University, 2008. http://hdl.handle.net/10948/722.
Full textLapke, Michael Stephen. "Power Relationships in Information Systems Security Policy Formulation and Implementation." VCU Scholars Compass, 2008. http://scholarscompass.vcu.edu/etd/1239.
Full textEdwards, Madhuri M. "Identifying Factors Contributing Towards Information Security Maturity in an Organization." NSUWorks, 2018. http://nsuworks.nova.edu/gscis_etd/1027.
Full textMaijanen, K. (Karri). "Building inter-organizational trust by implementing information security management system:a review from trust building perspective." Master's thesis, University of Oulu, 2016. http://urn.fi/URN:NBN:fi:oulu-201612033197.
Full textCurran, Theresa. "Standardizing Instructional Definition and Content Supporting Information Security Compliance Requirements." Diss., NSUWorks, 2018. https://nsuworks.nova.edu/gscis_etd/1038.
Full textCaldwell, Russell J. "Information operations (IO) organizational design and procedures." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Mar%5FCaldwell.pdf.
Full textKoskosas, Ioannis Vasileios. "A socio-organizational approach to information systems security management in the context of internet banking." Thesis, Brunel University, 2004. http://bura.brunel.ac.uk/handle/2438/5207.
Full textMcIntosh, Barry Ben. "An Ethnographic Investigation of the Assimilation of New Organizational Members into an Information Security Culture." NSUWorks, 2011. http://nsuworks.nova.edu/gscis_etd/240.
Full textSumner, Jennifer. "HEALTHCARE COMMUNICATION NETWORKS: THE DISSEMINATION OF EMPLOYEE INFORMATION FOR HOSPITAL SECURITY." Doctoral diss., University of Central Florida, 2008. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/3183.
Full textRaymond, Benoit. "Investigating the Relationship between IT and Organizations: A Research Trilogy." Digital Archive @ GSU, 2010. http://digitalarchive.gsu.edu/cis_diss/43.
Full textJohansson, Elin, and Gabriella Elvin. "The impact of organizational culture on information security during development and management of IT systems : A comparative study between Japanese and Swedish banking industry." Thesis, Uppsala universitet, Avdelningen för datalogi, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-324923.
Full textTell, Markus. "Insiderhot : En systematisk litteraturöversikt av insiderhot som utvärderar administrativa säkerhetsåtgärder." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-19764.
Full textKuusinen, Sara, and Kirsi Jokipii. "Utilizing Market Knowledge to Create Competitive Advantage in the Interface of Inter- and Intra-Organizational Coopetition : Case Study: An SME in the Information Security Industry." Thesis, Umeå universitet, Företagsekonomi, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-84251.
Full textCoffey, Andrew Francis. "Measuring Effectiveness in the Domestic Intelligence Community: Taking a Configurational Approach to Explain Organizational Outcomes in the National Network of Fusion Centers." Diss., Virginia Tech, 2015. http://hdl.handle.net/10919/52930.
Full textTejay, Gurvirender. "Shaping Strategic Information Systems Security Initiatives in Organizations." VCU Scholars Compass, 2008. http://scholarscompass.vcu.edu/etd/1576.
Full textShao, X. (Xiuyan). "Understanding information systems (IS) security investments in organizations." Doctoral thesis, Oulun yliopisto, 2015. http://urn.fi/urn:isbn:9789526208930.
Full textOtero, Angel Rafael. "An Information Security Control Assessment Methodology for Organizations." NSUWorks, 2014. http://nsuworks.nova.edu/gscis_etd/266.
Full textAnnamalai, Neelambari. "Information Security Guidelines for Organizations Intending to Adopt Cloudsourcing." Thesis, KTH, Data- och systemvetenskap, DSV, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-155453.
Full textAlkahtani, Hend K. "Raising the information security awareness level in Saudi Arabian organizations through an effective, culturally aware information security framework." Thesis, Loughborough University, 2018. https://dspace.lboro.ac.uk/2134/28120.
Full textAbdul, Talib Yurita Yakimin. "Intrinsic Motivation and Information Systems Security Policy Compliance in Organizations." VCU Scholars Compass, 2015. http://scholarscompass.vcu.edu/etd/3710.
Full textAliti, Admirim, and Deniz Akkaya. "Employees' Role in Improving Information Systems Security." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-13769.
Full textSANTOS, JULIANA GRACIELA DOS. "ANTECEDENTES DOS BENEFÍCIOS PERCEBIDOS DE COMPLIANCE ÀS POLÍTICAS DE PROTEÇÃO DE DADOS PESSOAIS NAS ORGANIZAÇÕES." Universidade Metodista de Sao Paulo, 2016. http://tede.metodista.br/jspui/handle/tede/1612.
Full textSedlack, Derek J. "Reducing Incongruity of Perceptions Related to Information Risk: Dialogical Action Research in Organizations." NSUWorks, 2012. http://nsuworks.nova.edu/gscis_etd/299.
Full textMohialdeen, Haneen, та Johannes Draaijer. "Security Culture in Sweden with Focus on Digital Certificate Culture in Organizations". Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-97573.
Full textHassebroek, Pamela Burns. "Institutionalized Environments and Information Security Management: Learning from Y2K." Diss., Available online, Georgia Institute of Technology, 2007, 2007. http://etd.gatech.edu/theses/available/etd-06192007-111256/.
Full textKamariza, Yvette. "Implementation of information security policies in public organizations : Top management as a success factor." Thesis, Internationella Handelshögskolan, Högskolan i Jönköping, IHH, Informatik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-37823.
Full textMehmood, Furhan, and Rajia Rafique. "Management of operational risks related to information security in financial organizations." Thesis, Mälardalen University, School of Sustainable Development of Society and Technology, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-9823.
Full textBess, Donald Arlo. "Understanding Information Security Culture in an Organization: An Interpretive Case Study." NSUWorks, 2012. http://nsuworks.nova.edu/gscis_etd/88.
Full textMartinez, Antonio. "Information management and the biological warfare threat." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://sirsi.nps.navy.mil/uhtbin/hyperion-image/02Mar%5FMartinez.pdf.
Full textVan, Niekerk Johannes Frederick. "Establishing an information security culture in organizations : an outcomes based education approach." Thesis, Nelson Mandela Metropolitan University, 2005. http://hdl.handle.net/10948/164.
Full textMuñoz, Ruiz Yhoanna Zulimar, and Tello Rogger Ubaldo Fernández. "Plan de comunicación sobre seguridad de la información en una institución educativa de San Juan de Lurigancho: Caso CICA." Master's thesis, Universidad Peruana de Ciencias Aplicadas (UPC), 2020. http://hdl.handle.net/10757/653240.
Full textGustavsson, Simon, and Fredrik Årman. "Bring your own device - a concern for organizations? : A thesis about tech organizations awareness and management of smartwatches." Thesis, Linnéuniversitetet, Institutionen för informatik (IK), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-96411.
Full textMarcos, Conca Alexandre. "A Solution to Selecting Cyber-Security Software Tools for an Organization Using Security Controls." Thesis, KTH, Elkraftteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-205272.
Full textGustafsson, Julia, and Mariam Said. "Security Aspects of Cloud Computing – Perspectives within Organizations." Thesis, Högskolan i Borås, Akademin för bibliotek, information, pedagogik och IT, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-10458.
Full textKoller, Teresa Marie, and Migle Ljung. "Strong Intents Against Weak Links : Towards a Holistic Integration of Behavioral Information Security in Organizations with Strategic Intent." Thesis, Linköpings universitet, Företagsekonomi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-177629.
Full textAli, Mirza Maaz. "Adaptable Information and Data Security Process : A Secure Yet Employee Friendly Process Proposal of IT Security Implementation in Organizations." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-222380.
Full textBerthevas, Jean-François. "Management des réseaux personnels et de la sécurité de l'information dans une perspective d'innovation : le rôle de la culture organisationnelle." Thesis, Aix-Marseille, 2013. http://www.theses.fr/2013AIXM1132.
Full textHolmstedt, Malena. "Social Media Risk Management : and the impact on organization IT security." Thesis, Luleå tekniska universitet, Digitala tjänster och system, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-79296.
Full textKanane, Aahd, and Casandra Grundstrom. "ISM: Irrelevant Soporific Measures - Giving Information Security Management back its groove using sociomateriality." Thesis, Umeå universitet, Institutionen för informatik, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-101978.
Full textAntoniou, George S. "Designing an effective information security policy for exceptional situations in an organization: An experimental study." NSUWorks, 2015. http://nsuworks.nova.edu/gscis_etd/949.
Full textAsp, Sandin Agnes. "A simplified ISMS : Investigating how an ISMS for a smaller organization can be implemented." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-20238.
Full textMay, Jeffrey Lee. "Developing a Multi-Objective Decision Model for Maximizing IS Security within an Organization." VCU Scholars Compass, 2008. http://scholarscompass.vcu.edu/etd/914.
Full text