To see the other types of publications on this topic, follow the link: Security company in Noida.

Dissertations / Theses on the topic 'Security company in Noida'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Security company in Noida.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Loiko, V. V., and A. О. Skoriatina. "Economic security fashion company." Thesis, КНУТД, 2016. https://er.knutd.edu.ua/handle/123456789/4885.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gunderson, Renee M. "Network security for a communications company." Online version, 2002. http://www.uwstout.edu/lib/thesis/2002/2002gundersonr.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Spandonidis, Bladimiros. "Linking Information Security Awareness to Information Security Management Strategy.A Study in an IT Company." Thesis, Linnéuniversitetet, Institutionen för informatik (IK), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-45894.

Full text
Abstract:
There is a great concern when it comes to the investigation of the parameters that affect the formulation of an information security management strategy in an organization. Amongst others, information security awareness is of great interest, mainly because it links the implementation of the information security policies to the consciousness and the psychology of the employees of an organization. State it otherwise, the information security awareness positively beholds the role of a bridge so as to help the IS managers to evaluate the level that the critical information of the organization are
APA, Harvard, Vancouver, ISO, and other styles
4

Abrahamsson, Charlotte, and Mattias Wessman. "WLAN Security : IEEE 802.11b or Bluetooth - which standard provides best security methods for companies?" Thesis, Blekinge Tekniska Högskola, Avdelningen för programvarusystem, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2320.

Full text
Abstract:
Which security holes and security methods do IEEE 802.11b and Bluetooth offer? Which standard provides best security methods for companies? These are two interesting questions that this thesis will be about. The purpose is to give companies more information of the security aspects that come with using WLANs. An introduction to the subject of WLAN is presented in order to give an overview before the description of the two WLAN standards; IEEE 802.11b and Bluetooth. The thesis will give an overview of how IEEE 802.11b and Bluetooth works, a in depth description about the security issues of the t
APA, Harvard, Vancouver, ISO, and other styles
5

Peters, Joseph G. "A job task analysis survey for patrol officers in XYZ Security Company." Online version, 2009. http://www.uwstout.edu/lib/thesis/2009/2009petersj.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Qureshi, Muhammad Sohail. "Measuring Efficacy of Information Security Policies : A Case Study of UAE based company." Thesis, KTH, Data- och systemvetenskap, DSV, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-103475.

Full text
Abstract:
Nowadays information security policies are operative in many organizations. Currently few organizations take the pain of verifying the efficacy of these policies. Different standards and procedures exist about methods of measuring efficacy of information security policies. Choosing and implementing them depends mainly on the key performance indicators (KPIs) and key risk indicators (KRIs) of any particular organization. This thesis is a case study of an organization in United Arab Emirates (UAE). The basic aim of the research is to inquire and analyze how the efficacy of the implemented securi
APA, Harvard, Vancouver, ISO, and other styles
7

Owen, Morné. "An enterprise information security model for a micro finance company: a case study." Thesis, Nelson Mandela Metropolitan University, 2009. http://hdl.handle.net/10948/1151.

Full text
Abstract:
The world has entered the information age. How the information is used within an organization will determine success or failure of the organisation. This study aims to provide a model, that once implemented, will provide the required protection for the information assets. The model is based on ISO 27002, an international security standard. The primary objective is to build a model that will provide a holistic security system specifically for a South African Micro Finance Company (MFC). The secondary objectives focuses on successful implementation of such a model, the uniqueness of the MFC that
APA, Harvard, Vancouver, ISO, and other styles
8

Kokt, D., and der Merwe C. A. Van. "The impact of organisational culture on service delivery in a major private security company." Journal for New Generation Sciences, Vol 7, Issue 2: Central University of Technology, Free State, Bloemfontein, 2009. http://hdl.handle.net/11462/535.

Full text
Abstract:
Published Article<br>In today's highly competitive business environment service delivery has become a key issue. Providing quality service could enhance an organisation's competitive advantage with beneficial financial implications. Service delivery requires the full cooperation and commitment of all the employees in the organisation, including management. The culture of the organisation supports this by eliciting a unified response from employees that supports the quality of service rendered to customers. In this regard the paper provides a statistical analysis of the impact of organisational
APA, Harvard, Vancouver, ISO, and other styles
9

Janaby, Mohamad. "The legal regime applicable to private military and security company personnel in armed conflicts." Thesis, University of Aberdeen, 2015. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=228981.

Full text
Abstract:
Private military and security companies (PMSCs) have been extensively used to provide military and security services in various armed conflicts. Aspects of their use have generated concerns that the personnel of these companies are no more than modern mercenaries. This thesis clarifies the legal regime applicable to such companies in armed conflicts. This regime includes both the legal status and legal regulation of PMSC personnel. The aim of this thesis is not to create a new status for PMSC personnel, but to clarify which of the existing legal statuses adopted by international humanitarian l
APA, Harvard, Vancouver, ISO, and other styles
10

Klasson, Sebastian, and Nina Lindström. "Longitudinal analysis of the certificate chains of big tech company domains." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-178396.

Full text
Abstract:
The internet is one of the most widely used mediums for communication in modern society and it has become an everyday necessity for many. It is therefore of utmost importance that it remains as secure as possible. SSL and TLS are the backbones of internet security and an integral part of these technologies are the certificates used. Certificate authorities (CAs) can issue certificates that validate that domains are who they claim to be. If a user trusts a CA they can in turn also trust domains that have been validated by them. CAs can in turn trust other CAs and this, in turn, creates a chain
APA, Harvard, Vancouver, ISO, and other styles
11

Seguin, Kady. "The Voluntary Principles on Security and Human Rights: Assessing impact on company behaviour in Colombia." Thesis, University of Ottawa (Canada), 2009. http://hdl.handle.net/10393/28365.

Full text
Abstract:
The debate over the use of legal regulation and voluntary initiatives for generating responsible business practices from companies operating abroad has raised concerns regarding the effectiveness of voluntary initiatives. A main argument against voluntary initiatives is that companies adopt them solely to boost corporate image, and that implementation has been limited. To provide insight into this debate, research was conducted on the Voluntary Principles on Security and Human Rights (VPs), an initiative in the extractive sector that focuses on safeguarding human rights. The research involved
APA, Harvard, Vancouver, ISO, and other styles
12

Beltrán, Alanis Martha Alicia, and Sánchez Javier Arnulfo Cruz. "An exploratory research : Fear and the need of security interplay as a business mechanism." Thesis, Linköpings universitet, Företagsekonomi, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-71161.

Full text
Abstract:
Background: Humanity builds and writes its history. Overtime the need of feeling secure has been present originated from an emotion, a condition and reaction: the fear of threats or danger. The impact of human fear over the humanity behaviour leads for searching ways of reducing such fear. Consequently, security companies have a potential opportunity for fulfilling this human need reducing the phenomenon of fear. Some organisations and companies discovered that human fear can be used as tool for influencing the individual behaviour and for consumption purposes. Aim: Developing a research and d
APA, Harvard, Vancouver, ISO, and other styles
13

Rose, William B. (William Burford). "The Introduction of Robotic Technology: Perceptions of the Work Force of an Aerospace Defense Company." Thesis, University of North Texas, 1988. https://digital.library.unt.edu/ark:/67531/metadc330596/.

Full text
Abstract:
This dissertation examines the effect that the introduction of an advanced manufacturing technology, specifically robotics, has on the work force of an aerospace defense company. In this endeavor, there are two main objectives. First, this study determines whether workers feel that their jobs are threatened by the introduction of robotic technology. Secondly, the research compares the degree to which workers from different labor types feel this threat. A review of the literature reveals that the technical factors involving manufacturing technology have been thoroughly examined and discussed, b
APA, Harvard, Vancouver, ISO, and other styles
14

Chang, Cody. "Portfolio Company Selection Criteria: Accelerators vs Venture Capitalists." Scholarship @ Claremont, 2013. http://scholarship.claremont.edu/cmc_theses/566.

Full text
Abstract:
The explosive growth of ‘accelerators’ in the United States has given entrepreneurs and their startups the opportunity to pursue seed-stage financing. While the specific economic role of accelerators remains unclear, a study comparing the selection of portfolio companies between accelerators and venture capitalists was performed. A difference of means was performed on the responses per question between the collected 19 accelerators’ response and the 100 venture capitalists’ response, recorded from a prior study. It is found that venture capitalists place significantly more weight, than acceler
APA, Harvard, Vancouver, ISO, and other styles
15

Ferguson, Jason. "An Examination of a Virtual Private Network Implementation to Support a Teleworking Initiative: The Marcus Food Company Inc. Case Study." NSUWorks, 2010. http://nsuworks.nova.edu/gscis_etd/149.

Full text
Abstract:
In this dissertation, the author examined the capabilities of virtual private networks (VPNs) in supporting teleworking environments for small businesses in the food marketing sector. The goal of this research was to develop an implementation model for small businesses in the food marketing sector that use a VPN solution to support teleworker access to corporate resources. The author conducted a case study of the Marcus Food Company (MFC) VPN implementation in conjunction with the system development life cycle (SDLC) methodology to achieve this objective. The SDLC methodology was used to suppo
APA, Harvard, Vancouver, ISO, and other styles
16

Turan, Ali. "The Turan Electric Company - the leader of the turkish market of energy and electrical products." Thesis, Київський національний університет технологій та дизайну, 2017. https://er.knutd.edu.ua/handle/123456789/6676.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Мартиненко, Володимир Олександрович, Владимир Александрович Мартыненко та Volodymyr Oleksandrovych Martynenko. "Фінансово-економічна безпека підприємства та механізм її забезпечення". Thesis, Університет Альфреда Нобеля, 2015. http://essuir.sumdu.edu.ua/handle/123456789/59942.

Full text
Abstract:
На сьогодні розвиток України та її регіонів здійснюється під впливом геополітичних та внутрішніх викликів зростання відкритості економіки, що вимагає змін у підходах до розвитку регіонів України та створенні оптимальних умов для їх розвитку. У свою чергу, це обумовлює необхідність виявлення факторів, які можуть стримати негативні тенденції, що виникли у зв’язку з економічними трансформаціями в державі, та забезпечити підвищення конкурентоспроможності регіонів України на засадах їх саморозвитку та самоорганізації.
APA, Harvard, Vancouver, ISO, and other styles
18

HUANG, WEI-KANG, and 黃緯康. "A Study on the Satisfactory Factors of Service Model of Security Company - A Case Study of Security Company." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/19358357749137057077.

Full text
Abstract:
碩士<br>銘傳大學<br>企業管理學系碩士在職專班<br>105<br>This study mainly discusses the key demands of investors in the use of brokerage services and discusses the importance of key factors of service investors. First, the initial structure is compiled through a literature review. Then the questionnaire for the specialization of ordinary investors in the electronic orders for two rounds of experts is used. Finally, the questionnaire survey of the satisfaction factors of the securities business model established by the Delphi questionnaire was conducted. The results show that the satisfaction factors of the secur
APA, Harvard, Vancouver, ISO, and other styles
19

Horn, Heather Elizabeth. "The management of security officer's performance within a private security company in Gauteng." Diss., 2019. http://hdl.handle.net/10500/25790.

Full text
Abstract:
This study was undertaken to investigate whether there is a performance management system within the security industry, applicable specifically to Security Officers. To investigate which performance factors, apply to security officers and how security officers perceived performance management. The management of Security Officers’ performance is an aspect of management which has not garnered much interest compared to other operational and management areas – hence the paucity of research on the performance management of security officers. They make a major contribution to the labour market with
APA, Harvard, Vancouver, ISO, and other styles
20

YU, HSIU-YIN, and 游秀茵. "Discussion Security Company Maneuverings Staff on Configuration Strategy." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/78534734312980142581.

Full text
Abstract:
碩士<br>華夏科技大學<br>資產與物業管理研究所<br>105<br>Security industry is the high demand for human resources, the use of human resources and the arrangement will be different from the general company's mode of operation, for the security of the arrangement, in addition to the day and night, respectively, there are fixed and mobile protection distinction The current security company in the manpower for the allocation of manpower on the imperfect, so that the emergence of human gaps, the space can be scheduled to be limited. One fixed day off, one flexible day off on the road, replacing the original week off
APA, Harvard, Vancouver, ISO, and other styles
21

Wu, Ming-wei, and 吳銘偉. "Cash-transportation truck scheduling and planning of security company." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/33923084914773454782.

Full text
Abstract:
碩士<br>國立中央大學<br>土木工程研究所<br>98<br>The security companies in Taiwan are mainly in charge of escorting (and delivering) the cash from branches to each major bank and ATM, and also from the companies (i.e. superstore, mall…etc.), which had contract with the security companies, to some specific banks. When the guards from the security company is in charge of the escorting mission of cash-transportation truck, they often faces the risk of robbing, which always causes great property of damage to the clients. In the past 10 years, the robbing incidents in Taiwan have reached up to 35 cases, with an
APA, Harvard, Vancouver, ISO, and other styles
22

彭進興. "CCTV Innovation of Security Industry—Perspective in A Company." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/55595429747824813552.

Full text
Abstract:
碩士<br>國立交通大學<br>管理學院高階主管管理碩士學程<br>95<br>After 911 terrorist attacks in 2001, the demand for the safety and security industry products in the world have been surged dramatically. As a result, the safety and security products immediately have a great outlook for the foreseeing future. The trend of the development of camera products will move more toward to digitization and networking. As such the DVR (Digital Video Recorder), the most critical component of CCTV, has played an even more important role than before. Network communication and system integration will become the basic essential techni
APA, Harvard, Vancouver, ISO, and other styles
23

Yen, Kuo-ping, and 嚴國萍. "Security Company's Business Strategies of Financial Holding Company -A Case Study on T Securities Company." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/77548843856899722879.

Full text
Abstract:
碩士<br>育達商業技術學院<br>企業管理所<br>95<br>In recent years, domestic security market has been influenced heavily by political environment and its policy resulting in the diminishing of the prosperity. The securities either chose to withdraw from the market or adopt the low price policy to face the harsh challenge. After the globalization, domestic investment channels and financial product categories became diversified, external investment also arising to its record high. It squeezes the security market even more. Undoubtedly competition became sever among securities business. The government reformed the
APA, Harvard, Vancouver, ISO, and other styles
24

Lien-chih, Chen, and 陳連枝. "Information Security Management System for the Financial Holding Company ─A Case Study on M Company." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/76879194495393302760.

Full text
Abstract:
碩士<br>長庚大學<br>企業管理研究所<br>91<br>Financial Holding Company how to serve their customers take the advantage of convenient finance service and avoid the dishonor of computer crime and disadvantage of enterprise becoming a new challenge. CNS 17800--Specification for Information Security Management Systems on Information Technology, is published by Economic Bureau on Dec. 5, 2002, which runs an important role on information security, offers establishment and management function for enterprise managers and their staffs. This case study focuses on M company by observing and inves
APA, Harvard, Vancouver, ISO, and other styles
25

MIN, LIU CHIEN, and 柳建民. "Corporetion De-merger Strategy.-A Case of Domestic Security Company." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/13685051844735232776.

Full text
Abstract:
碩士<br>國立臺北大學<br>國際財務金融碩士在職專班<br>94<br>In recent years, acquisition has been the strategy used by business for creating operational effects. Since the announcement and implementation of the Company Merger Law in 2002, the company acquisitions in Taiwan have started to livened. With the rise of large-scale financial holding companies, the merger wave in financial industry becomes more severe. The reason is in that acquisition not only can save the time and strive for the transient business opportunities in the market, but also use current marketing channels, materials and production facilities t
APA, Harvard, Vancouver, ISO, and other styles
26

Tasi, Chia-Hung, and 蔡佳宏. "Developing an Evaluation Model for Digital Security Company in Taiwan." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/93214484838163505823.

Full text
Abstract:
碩士<br>雲林科技大學<br>營建工程系碩士班<br>98<br>National Police Agency first started evaluation on Security Company in Taiwan on Oct. 1994. Because it was unprecedented and there were some differences between capital, type, organization, number of clients and number of employees in every company, couple with the judge teams were found in a very short time and the judges were differ from districts, then cause the evaluation indicators weren’t able to truly evaluate bad or good on the industry. The first evaluation of indicators mainly aimed at business management on authority and lack of considerations from
APA, Harvard, Vancouver, ISO, and other styles
27

Van, Rooyen Bernadette. "Prevention mechanisms to minimise injuries on duty : perceptions of security officers in a private security company." Diss., 2017. http://hdl.handle.net/10500/24015.

Full text
Abstract:
The aim of the study was to determine the causes of IODs in the workplace and to identify possible preventative measures to reduce IODs. A literature review was conducted as part of the study, involving assessment of all related articles and books on the subject of IODs in the workplace. A qualitative research methodology was utilised to conduct the study. The main research instruments were four focus group interviews and eight individual interviews. The study concluded that employees experienced IODs in different ways, with most participants describing negative experiences such as physical p
APA, Harvard, Vancouver, ISO, and other styles
28

Lin, Chih-Hung, and 林志宏. "A Study on Security Management Maturity of the Information Security Management System As B Company Case." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/b8f5xt.

Full text
Abstract:
碩士<br>國立中央大學<br>資訊管理學系在職專班<br>106<br>In the frequent and frequent information security incidents, most enterprise organizations have realized the importance of information security management. The Information Security Management System (ISMS) is an internationally recognized information security management standard and an overall information security management system. Some of these include: information security organizations, information security policies, planning activities, responsibilities, implementation, processes, resources, etc., based on risk assessment practices for establishing, im
APA, Harvard, Vancouver, ISO, and other styles
29

Lee, Yu-Chin, and 李侑晉. "The Study of the Competitive Strategies of the Security Industry ---A Case Study of S.K.S Security Company." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/79909721197597934415.

Full text
Abstract:
碩士<br>逢甲大學<br>經營管理碩士在職專班<br>94<br>Systematic Security Service Company has been flourishing development of 27 years in Taiwan, The Security market in Taiwan from starting, development to stable which just in short over 20 years. Although S.K.S Company and S.E.C.O.M Company take this market together more than 80% of whole Taiwan Security market , that is called duopoly market. AS it is not very difficult to get into this market, there have about 452 security companies in Taiwan since first legal Security Company which was established in 1978. Too many Security Companies result in that the supply
APA, Harvard, Vancouver, ISO, and other styles
30

CHUAN, TSAI JUI, and 蔡瑞娟. "Longitudinal study on the diversification of security employee’s working attitude - A case of the V Security Company." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/8ka6zg.

Full text
Abstract:
碩士<br>國立高雄師範大學<br>人力與知識管理研究所<br>107<br>Nearly four decades of development preservation industry in Taiwan, after the initial embryonic, thriving, diversified development, restructuring and development in four stages, the preservation of the quality of human service staff has always been the biggest issue preservation industry management, this study for 2015 longitudinal changes of preservation services staff working attitude to the development of research projects 2018 questionnaire V security company owned by Sun Yat-sen as people. 1. the security guards working attitude in personality traits
APA, Harvard, Vancouver, ISO, and other styles
31

Ciou, Huei-Mei, and 邱惠梅. "The Wealth Management BusinessStrategies of Security Industry-A Caseof G Company." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/4g63r8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Shih, Hung-Yen, and 施弘彦. "The Study of Integrated Information Security for A Company in Taiwan." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/25495692760386379450.

Full text
Abstract:
碩士<br>國立中興大學<br>高階經理人碩士在職專班<br>101<br>Nowadays, with the help of technologies, organizations are able to provide easy access to information across its boundaries. Along the road, the questions are merged in the prospective of privacy and information security. The study demonstrated a roadmap for integrating information security management solutions within a business setting approaching from four aspects: system, Platforms, infrastructures and security policies. The application of Enterprise Architecture (EA) is practiced for comprehensive and coordinated planning and management of organization
APA, Harvard, Vancouver, ISO, and other styles
33

Tsai, Chin-Tsung, and 蔡錦宗. "The study of a factory intelligent security system on SC Company." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/8eap6a.

Full text
Abstract:
碩士<br>國立臺北科技大學<br>工業工程與管理系EMBA班<br>105<br>Along with the global rapid hair made in science and technology,pursuing efficiency demand is higher and higher, many production units for the pursuit of speed and efficiency gradually ignore security matters, often cause the factory workers, events, and has the phenomenon of deteriorating, Kaohsiung road gas serial explosions since 2014, every two days bombing Chung-rong metal in Kunshan city, A big bang happened in Tianjin city at Aug-15, 2015, the big disaster emerge in endlessly, and has the phenomenon of deteriorating, risk, the purpose of this ar
APA, Harvard, Vancouver, ISO, and other styles
34

徐佳瑄. "A Study of Security Controls on Mobile Devices – Case of T Company." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/6h3n7j.

Full text
Abstract:
碩士<br>東吳大學<br>資訊管理學系<br>104<br>The growth of mobile technology, mobile devices have created new phenomenon for communication and data processing ability for business. One such phenomenon that has emerged in the business environment, which means employees use mobile device to access company resources for work, inside or outside organizational environment. This new phenomenon brings with itself new opportunities, but exists many risks associated with it. This thesis proposes the application of Analytic Hierarchy Process (AHP) for decision makers to deal with security control policy of mobile dev
APA, Harvard, Vancouver, ISO, and other styles
35

Chen, Ren-Jie, and 陳仁傑. "The Impact of Security Firm and Company Characteristics on Stock Recommendation Report." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/46792888329217149137.

Full text
Abstract:
碩士<br>國立東華大學<br>企業管理學系<br>94<br>This paper examines the impact of security firm and company characteristics on stock recommendation report. And forecast accuracy of security firm is measured as the forecast EPS of security firm. We analyze if security firm characteristics will affect forecast accuracy of security firm. In company characteristics section, security firm make their recommendation report if they depend on the basis of past companies’ performance. The results indicate that the number of forecast and the number of company-specific forecasting will affect stock recommendation report;
APA, Harvard, Vancouver, ISO, and other styles
36

Kung, Shu-Fen, and 龔蜀芬. "New business models of structured products:A case study of P security company." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/66736900596835520207.

Full text
Abstract:
碩士<br>國立交通大學<br>管理學院碩士在職專班財務金融組<br>98<br>Structured note have become the most popular financial product in 2007, the last year of bull market. At the same time, structured products issued by the local securities firms create the fever during the bullish atmosphere. However, stock market crush after the sub-prime bubble burst in 2nd half of 2007, this event soon become a global financial crisis in 2008. The sale of all kinds of financial products falls into anxiously frozen. Despite the financial market drop into a new low, those domestic securities firms immediately adjust the direction of is
APA, Harvard, Vancouver, ISO, and other styles
37

Hsu, Ching-Hsiu, and 許清秀. "The relationship between human capital investment and turnover -- A security company case." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/16249463374459692079.

Full text
Abstract:
碩士<br>淡江大學<br>會計學系碩士在職專班<br>94<br>Securities industry is a labor intensive service industry. And it relies on its most important asset--human capital. However, heavy working load and unstable duty time make its employee turnover rate high. Namely, if security companies do not maintain its human capital and manage its human capital investment, they will lose their competitive advantage and reach the limit of their development. Therefore what is the relationship between human capital investment in security industry and its employee turnover becomes a critical issue. The purpose of this paper is
APA, Harvard, Vancouver, ISO, and other styles
38

Hsieh, Ching-Ho, and 謝慶和. "Using Balanced Scorecard to establish the performance measurement indicators for security company." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/41452037293871804923.

Full text
Abstract:
碩士<br>立德管理學院<br>工業管理研究所<br>93<br>ABSTRACT In the last decade, the financial storm has spread over the world. Since Taiwan joins WTO in the early 2002 , the impact for our domestic economy is wide and deep. Financial liberalization, globalization and integration seem to be concerned by international financial industry. Stock market plays an important role of attracting private capital and facilitate financial market. Whether broker or self-operation, securities firms are the essential part of the stock market. It is important issue that how securities firms improve themselves to deal with the e
APA, Harvard, Vancouver, ISO, and other styles
39

Lee, Tzu-I., and 李姿儀. "Human Rearrangement Study of Taiwan Power Company to Enter the Security Business." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/25835594414640539058.

Full text
Abstract:
碩士<br>臺中健康暨管理學院<br>國際企業研究所<br>92<br>When the challenge of privatization is coming, the state-own enterprises must make some reforms to promote competitions. Personnel downsizing is the most common way, otherwise, the state-own enterprises also increase channels to rearrange employees diversely. Taiwan Power Company is a state-own enterprise with personnel downsizing problem. At present, Taiwan Power Company diversifies with the security business actively. Therefore, the purpose of the study investigated the opinions of supervisors and employees about the security business and staff rearrangeme
APA, Harvard, Vancouver, ISO, and other styles
40

Huang, Ju-ming, and 黃如民. "To explore the performance of e-learning implemention in a security company." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/24971962506364743163.

Full text
Abstract:
碩士<br>國立臺北商業技術學院<br>商學研究所<br>98<br>Price competition is no longer a method tor security companies to survive in the era of diversified financial products. Security companies can break through a traditional teaching style with a digital learning methodology to meet the new milestone iii a technological learning era. Not only does c-learning create a top salesperson, but also enhance the competitiveness of enterprises and increase revenue. This study adopts literature analysis and questionnaire survey to investigate training styles being used currently for salespersons working in a security’ com
APA, Harvard, Vancouver, ISO, and other styles
41

Lee, chia-En, and 李加恩. "Strategies of the Security Surveillance Manufacturer –A case study of S Company." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/50172200773135074186.

Full text
Abstract:
碩士<br>國立交通大學<br>管理學院高階主管管理碩士學程<br>96<br>Regard to the international terror attack and disease, anti-terrorist and homeland security becomes the issue to the countries government and the enterprise. In addition, people pay more and more attentions to the security equipment for the individual, the family and the community. Due to the large demands of the security equipments, more and more company and manufacturer focus in surveillance industry. The trend of the development of camera products will be digitization and networking. Network communication and system integration will become the basic e
APA, Harvard, Vancouver, ISO, and other styles
42

Hsieh, Yi Yun, and 謝依耘. "The Study of the Factors Affecting Customer’s Satisfaction on the Security Company." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/61680361901471209948.

Full text
Abstract:
碩士<br>實踐大學<br>企業管理學系碩士在職專班<br>100<br>It has been observed that the number of cases in consolidation of financial institutes has increased after the financial crisis in 2008. Hence, under the umbrella of the equality-controlling structure of the consolidated company, the individual financial institute, which had its own enterprise and individual customer bases, now has to face the issues such as customer base overlapping and resources integration.While the financial industry has been trending towards favoring more consolidation, it becomes a critical competence for a security firm to own the pr
APA, Harvard, Vancouver, ISO, and other styles
43

Chin, Yen Yueh, and 顏月琴. "On supplier selection criteria for security industry:A case study of company A." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/33c5y8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Sibanyoni, Nkosinathi Samuel. "Protecting the protector : exploring work-related challenges experienced by contract security guards employed by a security company in Johannesburg." Thesis, 2014. http://hdl.handle.net/10539/15409.

Full text
Abstract:
The high levels of crimes in society have led people to seek assistance outside public law enforcement agencies such as police and the army, to private law enforcement agencies such as the private security industry. Security guards are involved in providing protection to people, properties and their valuables and in South Africa, they intervene in high crime and violence situations, resulting in their working environment being dangerous and unpredictable. The study aimed to understand some of the factors contributing to the work-related challenges encountered by contract security guard officer
APA, Harvard, Vancouver, ISO, and other styles
45

Huang, Hsueh-Len, and 黃學仁. "Home security systems service quality, customer satisfaction and loyalty of the Study- As an example of a security company." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/76684643497122841573.

Full text
Abstract:
碩士<br>中華大學<br>科技管理學系(所)<br>98<br>System in Taiwan since the establishment of the first security company began 30 years of history has experienced so far remained nearly 300 the number of each company fiercely between the contestants, more than the price, than the service much better than the innovation. However, in recent years due to industrial relocation and the bad economy, cause the system to preserve the high rate of customer cancellation, making the system needed to look for a security company to extend the survival of corporate performance and the next target. In view of Japan's home se
APA, Harvard, Vancouver, ISO, and other styles
46

Tsai, Shang-lun, and 蔡尚倫. "Using Quality Function Deployment in The Study of Service Quality of Security Industry - A Case of the V Security Company." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/99408639404758132081.

Full text
Abstract:
碩士<br>正修科技大學<br>工業工程與管理研究所<br>99<br>The security service firms have been developing in Taiwan for many years. Due to the change of social concepts and the heightened crime rate, the techniques and service of the security firms are increasingly challenged. On the other hand, understanding the needs of consumers is the most important thing. A case company, V-company is studied in this paper. By using questionnaire the data are collected. It examined whether the service quality gap existed by t-Test and further utilized Quality Function Deployment (QFD) and Analytic Hierarchy Process (AHP) to d
APA, Harvard, Vancouver, ISO, and other styles
47

Huang, Chi-Pin, and 黃祺斌. "The Relationships among Company Acquisition, Job Security, Organizational Commitment, and Intention to Quit ─A Case Study of the BEMT Company." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/92012856127135077674.

Full text
Abstract:
碩士<br>立德大學<br>科技管理研究所<br>95<br>Mergers and acquisition(M & A) is one of the strategic modes for enterprise diversification. The studied case was happened in 2005, BASF’s acquisition of Merck electronic chemicals Ltd., effective May 1, 2006, BASF Electronic Materials Taiwan Ltd. became the new name of the former Merck electronic chemicals Ltd.(Taiwan). While expecting synergy of acquisitions, the merger syndrome and post-acquisition integration issue followed, resulted in job insecurity, further affected organizational commitment, and even more, enhanced intention to quit and less competitivene
APA, Harvard, Vancouver, ISO, and other styles
48

Hu, Ruei-shian, and 胡瑞賢. "Information Security Risk Assessment Model – A Case Study of a Semiconductor Assembly Company." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/pxg5vw.

Full text
Abstract:
碩士<br>國立中山大學<br>資訊管理學系研究所<br>96<br>The information security incidents have most often been reported. The loss of enterprise operation is more and more serious because of information security incidents. There are more and more operation risks happening inside the enterprise because of such informational and electronic transformation. Consequently, the requirement to have an effective management framework of information security is more and more urgent. The research adopts the international standard ISO 27001 as the foundation of the information security management framework. And then, risk asse
APA, Harvard, Vancouver, ISO, and other styles
49

Chou, I. Tsen, and 周怡岑. "Deployment Strategies of Information Security Management -A Case of Electronic Component Distributor Company." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/65674852655586327679.

Full text
Abstract:
碩士<br>國立臺灣科技大學<br>資訊管理系<br>94<br>The most Important infrastructure for enterprise is good information environment. The degree of enterprise information relays to maturity and the popularity of electronic commerce, information security events (ex viral dissemination, invasions of hacker, material is divulged and so on) also emerges one after another incessantly. These events have caused enterprises visible and tangible losses. Also therefore enterprises have gradually attached importance to the security of information. Due to the special industrial characteristics of electronics components indu
APA, Harvard, Vancouver, ISO, and other styles
50

Ching-Yi, Wu, and 吳清益. "NCC Information Security Communications Platform Effectiveness Analysis–An Example from A Telecommunications Company." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/q54xxs.

Full text
Abstract:
碩士<br>輔仁大學<br>資訊管理學系<br>101<br>Against the National Communications Commission With the Science and Technology Advisory Group of the Executive Yuan 「system security assurance and anti-hacker control technology research projects」,to build the Internet anti-hacker detection and reporting system of information security From the Republic of China 99 years. To detect anti-hacker technology applications to the domestic (Internet Access Service Provider, IASP) provided Internet service. In This research A Telecommunications Company as a case study,Explore and analyze the effectiveness of the operation
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!