To see the other types of publications on this topic, follow the link: Security of business.

Dissertations / Theses on the topic 'Security of business'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Security of business.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Celovsky, Jason. "Social Security : a discussion of the proposed reform /." Staten Island, N.Y. : [s.n.], 2006. http://library.wagner.edu/theses/business/2006/thesis_bus_2006_celov_socia.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Valella, William. "Securing open source Virtual Private Networks a study in Linux security /." [Gainesville, Fla.] : University of Florida, 2001. http://purl.fcla.edu/fcla/etd/UFE0000362.

Full text
Abstract:
Thesis (M.S.)--University of Florida, 2001.<br>Title from title page of source document. Document formatted into pages; contains x, 188 p.; also contains graphics. Includes vita. Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
3

Box, Debra. "Business process security maturity: a paradigm convergence." Thesis, Nelson Mandela Metropolitan University, 2008. http://hdl.handle.net/10948/722.

Full text
Abstract:
Information technology developments in software and hardware have enabled radical changes in information systems, culminating in the paradigm Business Process Management. There has been a concomitant rise in the importance of information security and security engineering due to the increased reliance by society on information. Information is seen as a critical success factor which needs protection. Information security is the response to increased hazards created through recent innovations in Web technology and the advent of intra and inter enterprise-wide systems. Security engineering is base
APA, Harvard, Vancouver, ISO, and other styles
4

Alqatawna, Ja'Far S. "Multi-stakeholder enquiry for securing e-Business environments : a socio-technical security framework." Thesis, Sheffield Hallam University, 2010. http://shura.shu.ac.uk/19255/.

Full text
Abstract:
Increasing the security of e-Business is best achieved by considering the environment in which e-Business applications need to be implemented and used; this implies that e-Business should be viewed as a complex socio-technical system with three interconnected and interacting elements: stakeholders, enabling technology, and business processes. This multiple perspective has rarely been captured by previous studies of e-Business security which perceive security from a narrow, single-sided technical view. This thesis argues that the predominant technical security approaches consider neither the mu
APA, Harvard, Vancouver, ISO, and other styles
5

Nurse, Jason R. C. "A business-oriented framework for enhancing web services security for e-business." Thesis, University of Warwick, 2010. http://wrap.warwick.ac.uk/34605/.

Full text
Abstract:
Security within the Web services technology field is a complex and very topical issue. When considering using this technology suite to support interacting e-businesses, literature has shown that the challenge of achieving security becomes even more elusive. This is particularly true with regard to attaining a level of security beyond just applying technologies, that is trusted, endorsed and practiced by all parties involved. Attempting to address these problems, this research proposes BOF4WSS, a Business-Oriented Framework for enhancing Web Services Security in e-business. The novelty and impo
APA, Harvard, Vancouver, ISO, and other styles
6

Speight, Peter. "Why doesn't security work?" Thesis, University of Portsmouth, 2011. https://researchportal.port.ac.uk/portal/en/theses/why-security-doesnt-work(aaf04447-8601-4388-b40b-1461fdd703fc).html.

Full text
Abstract:
This thesis examines a proposition that it is possible to determine why security fails within organisations. Within the thesis, therefore, is a definition of security, both as an abstract noun, but more specifically as a matrix of security manpower, physical security assets, electronic systems and procedures. The operational effectiveness of these four, distinct security facets is often not capable of critical assessment by the very organisation that is paying for these assets and services. It has been necessary, therefore, to both determine and evidence a variety of security failures and, ult
APA, Harvard, Vancouver, ISO, and other styles
7

Argyropoulos, Nikolaos. "Designing secure business processes from organisational goal models." Thesis, University of Brighton, 2018. https://research.brighton.ac.uk/en/studentTheses/6aca6ecc-0073-48dd-a781-6cb66de28272.

Full text
Abstract:
Business processes are essential instruments used for the coordination of organisational activities in order to produce value in the form of products and services. Information security is an important non-functional characteristic of business processes due to the involvement of sensitive data exchanged between their participants. Therefore, potential security shortfalls can severely impact organisational reputation, customer trust and cause compliance issues. Nevertheless, despite its importance, security is often considered as a technical concern and treated as an afterthought during the desi
APA, Harvard, Vancouver, ISO, and other styles
8

Nachtigal, Sharon. "E-business information systems security design paradigm and model." Thesis, Royal Holloway, University of London, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.549582.

Full text
Abstract:
This thesis is concerned with a new approach to Information Systems Security management for an e-business organisation. One of the characteristics of a modern organisation (and especially of an e-business organisation) is the distribution of organisational resources and assets. Management of resources is also distributed between various hierarchical functions. With the move to an e-business mode, the number of users involved in business operations has increased, and these users (both inside and outside the organisation) need access to the organisation's information. Hence, the organisational I
APA, Harvard, Vancouver, ISO, and other styles
9

Somasekaram, Premathas. "Designing a Business Intelligence Solution for Analyzing Security Data." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-208685.

Full text
Abstract:
Business Intelligence is a set of tools and applications that are widely deployed across major corporations today. An appropriate translation for “Business Intelligence” in Swedish is “beslutstöd”, and it clearly describes the purpose of such a solution, andt hat is to collect, compress, consolidate and analyze data from multiple sources, so that critical decisions can be made based on it hence the name “beslutstöd. The focusof Business Intelligence has been on business data, so that trends and patterns of sales, marketing, production and other business areas can be studied. In addition, based
APA, Harvard, Vancouver, ISO, and other styles
10

Barosy, Wileen. "Successful Operational Cyber Security Strategies for Small Businesses." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/6969.

Full text
Abstract:
Cybercriminals threaten strategic and efficient use of the Internet within the business environment. Each year, cybercrimes in the United States cost business leaders approximately $6 billion, and globally, $445 billion. The purpose of this multiple case study was to explore the operational strategies chief information security officers of high-technology companies used to protect their businesses from cyberattacks. Organizational learning theory was the conceptual framework for the study. The population of the study was 3 high-technology business owners operating in Florida who have Internet
APA, Harvard, Vancouver, ISO, and other styles
11

Kongnso, Fedinand Jaiventume. "Best Practices to Minimize Data Security Breaches for Increased Business Performance." ScholarWorks, 2015. https://scholarworks.waldenu.edu/dissertations/1825.

Full text
Abstract:
In the United States, businesses have reported over 2,800 data compromises of an estimated 543 million records, with security breaches costing firms approximately $7.2 million annually. Scholars and industry practitioners have indicated a significant impact of security breaches on consumers and organizations. However, there are limited data on the best practices for minimizing the impact of security breaches on organizational performance. The purpose of this qualitative multicase study was to explore best practices technology leaders use to minimize data security breaches for increased busines
APA, Harvard, Vancouver, ISO, and other styles
12

Patterson, Joanna. "Cyber-Security Policy Decisions in Small Businesses." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4551.

Full text
Abstract:
Cyber-attacks against small businesses are on the rise yet small business owners often lack effective strategies to avoid these attacks. The purpose of this qualitative multiple case study was to explore the strategies small business owners use to make cyber-security decisions. Bertalanffy's general systems theory provided the conceptual framework for this study. A purposive sample of 10 small business owners participated in the interview process and shared their decision-making methodologies and influencers. The small business owners were vetted to ensure their strategies were effective throu
APA, Harvard, Vancouver, ISO, and other styles
13

Olsen, Brett C. "Essays on security issuance." Diss., Columbia, Mo. : University of Missouri-Columbia, 2007. http://hdl.handle.net/10355/6261.

Full text
Abstract:
Thesis (Ph.D.)--University of Missouri-Columbia, 2007.<br>The entire dissertation/thesis text is included in the research.pdf file; the official abstract appears in the short.pdf file (which also appears in the research.pdf); a non-technical general description, or public abstract, appears in the public.pdf file. Title from title screen of research.pdf file (viewed on March 24, 2009) Vita. Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
14

Kahle, Kathleen M. "Insider trading and new security issues." Connect to resource, 1996. http://rave.ohiolink.edu/etdc/view.cgi?acc%5Fnum=osu1265127804.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Terrone, Kristen. "The present issue of the unsecure social security system from the perspective of the AICPA and President George W. Bush's Administration /." Staten Island, N.Y. : [s.n.], 2006. http://library.wagner.edu/theses/business/2006/thesis_bus_2006_terro_prese.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Harris, Mark. "THE SHAPING OF MANAGERS’ SECURITY OBJECTIVES THROUGH INFORMATION SECURITY AWARENESS TRAINING." VCU Scholars Compass, 2010. http://scholarscompass.vcu.edu/etd/2208.

Full text
Abstract:
Information security research states that corporate security policy and information security training should be socio-technical in nature and that corporations should consider training as a primary method of protecting their information systems. However, information security policies and training are predominately technical in nature. In addition, managers creating security policies rely heavily on security guidelines, which are also technically oriented. This study created a series of information security training videos that were viewed by four groups of managers. One video discussed the
APA, Harvard, Vancouver, ISO, and other styles
17

Marais, Terrence K. "Electronic payment and security on the Internet." Thesis, Stellenbosch : Stellenbosch University, 2002. http://hdl.handle.net/10019.1/52819.

Full text
Abstract:
Thesis (MBA)--Stellenbosch University, 2002.<br>ENGLISH ABSTRACT: The greatest potential worry that an on-line shopper has is what happens to his/her credit card details from the moment "submit" is pressed on the computer. Is it possible for someone on the Internet to intercept the message and use credit card details maliciously? Also, there is a lot of talk about personal details being encrypted, but how sure is one that this was indeed the case once "submit" has been pressed? Is there a way in which one can be sure that a transaction will occur only once? Many of the security issues a
APA, Harvard, Vancouver, ISO, and other styles
18

Tassabehji, Rana. "Secure use of the Internet by business." Thesis, University of Salford, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.366312.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Hellqvist, Fredrik. "Design of business information security policy : A case study on Orebro County Council´s work with information security." Thesis, Örebro universitet, Handelshögskolan vid Örebro Universitet, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-35527.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Hock, Kevin. "The Integrity Enforcer: Ensuring Program Data and Code Security." Miami University Honors Theses / OhioLINK, 2003. http://rave.ohiolink.edu/etdc/view?acc_num=muhonors1111148755.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Beltrán, Alanis Martha Alicia, and Sánchez Javier Arnulfo Cruz. "An exploratory research : Fear and the need of security interplay as a business mechanism." Thesis, Linköpings universitet, Företagsekonomi, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-71161.

Full text
Abstract:
Background: Humanity builds and writes its history. Overtime the need of feeling secure has been present originated from an emotion, a condition and reaction: the fear of threats or danger. The impact of human fear over the humanity behaviour leads for searching ways of reducing such fear. Consequently, security companies have a potential opportunity for fulfilling this human need reducing the phenomenon of fear. Some organisations and companies discovered that human fear can be used as tool for influencing the individual behaviour and for consumption purposes. Aim: Developing a research and d
APA, Harvard, Vancouver, ISO, and other styles
22

Nwachukwu, Ijeoma Ogechi. "Relationship Between Oil Theft, Pipeline Vandalism, and Security Costs With Revenue Losses." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4398.

Full text
Abstract:
The oil and gas multinational companies (MNCs) in the Niger Delta continue to face numerous challenges operating in the region, especially concerning the loss of revenue. Based on the resource dependence theory, the purpose of this correlational study was to examine the relationship between oil theft, pipeline vandalism, security costs, and revenue. Eighty-eight mid- to high-level managers of oil and gas completed the Factors That Affect Company Revenue instrument. The results of the multiple linear regression analyses indicated the model was able to significantly predict revenue, F(3,88) = 94
APA, Harvard, Vancouver, ISO, and other styles
23

Hartman, Hampus. "Fear of Crime- Among Business Representatives and how it is Affected Through the Security Measures of the Business." Thesis, Malmö högskola, Fakulteten för hälsa och samhälle (HS), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-25339.

Full text
Abstract:
This study examines how fear of crime is altered in regards to crime-preventive strategies and programs among individuals within businesses. The study also investigates whether perceived risk, previous victimization, and demographics influence the individuals within the businesses fear of crime against their businesses. Based on a theoretical discussion derived from the Vulnerability Perspective, Indirect and Direct Experience with Crime, Ecological Perspective, and the Situational Crime Prevention perspective, this study assesses how individuals within businesses fear of crime affects the bus
APA, Harvard, Vancouver, ISO, and other styles
24

Verhun, A. M., and Yu Bondarchuk. "Management of business processes as a tool for ensuring enterprise economic security." Thesis, Київський національний університет технологій та дизайну, 2017. https://er.knutd.edu.ua/handle/123456789/7113.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Kennedy-Good, Jonathan. "Dividend yields, business conditions, and expected security returns : a South African perspective." Master's thesis, University of Cape Town, 2003. http://hdl.handle.net/11427/11417.

Full text
Abstract:
Bibliography: leaves 93-97.<br>The analysis of this topic has continued to draw attention from academics such as Jensen Johnson and Mercer (1996), Patelis (1997) and Booth and Booth (2001) who examine the results of Fama et al. (1988) under differing monetary policy regimes. Jensen et al. (1996) posit that monetary stringency affects investors' required rate of return, which is consistent with Fama et al.'s (1989) arguments that predictable variation in returns reflects rational variation in required returns. Patelis (1997) finds that monetary variables used in his analysis are marginally sign
APA, Harvard, Vancouver, ISO, and other styles
26

Okoye, Stella Ifeyinwa. "Strategies to Minimize the Effects of Information Security Threats on Business Performance." Thesis, Walden University, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10606454.

Full text
Abstract:
<p> Business leaders in Nigeria are concerned about the high rates of business failure and economic loss from security incidents and may not understand strategies for reducing the effects of information security threats on business performance. Guided by general systems theory and transformational leadership theory, the focus of this exploratory multiple case study was to explore the strategies small and medium-sized enterprise (SME) leaders use to minimize the effects of information security threats on business performance. Semistructured interviews were conducted with 5 SME leaders who worke
APA, Harvard, Vancouver, ISO, and other styles
27

Graisithikul, Gunyarat. "Comparing Access Control Security Policies : A Case Study Using SBVR." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-108306.

Full text
Abstract:
Companies today are required more and more to interconnect their information systems with partners and suppliers in order to be competitive in a global marketplace. A problem of how to compare a security policy between two different companies when they need to agree upon a single security policy has been raised. Can a comparison of two access control policies made through Semantic of Business Vocabulary and Business Rules (SBVR) be more appropriate than the traditional way of intuitively comparing two information security policies? In this research, a case study has been conducted along with t
APA, Harvard, Vancouver, ISO, and other styles
28

Ippolito, Steven Christopher. "Convergence -- A Homeland Security and Educational Problem| A Mixed Methodological Study." Thesis, Northcentral University, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10624690.

Full text
Abstract:
<p> The Secretary of Homeland Security, John Kelly, on April, 2017, at George Washington University, explained the dangers emanting from transnational organized crime (TOC), a rubric for convergent, crime-terror networked systems, as a joint homeland security and homeland security educational problem (HSE). The two-fold research problem for this mixed methodological concurrent-transformative study is: (1) a lack of knowledge regarding threat convergence by scholar-practitioner-administrators, and others, in various disciplines; (2) a lack of empirical data regarding threat convergence in resea
APA, Harvard, Vancouver, ISO, and other styles
29

Domingues, Steve. "Navigating between information security management documents : a modeling methodology." Thesis, Nelson Mandela Metropolitan University, 2010. http://hdl.handle.net/10948/1212.

Full text
Abstract:
Organizations no longer draft their own standards. Instead, organizations take advantage of the available international standards. One standard may not cover all the organization's needs, requiring organizations to implement more than one standard. The same aspect in an organization may be covered by two or more standards, creating an overlap. An awareness of such overlaps led to various institutions creating mapping documents illustrating how a control from one standard relates to a control from a different standard. The mapping documents are consulted by the end user, to identify how a contr
APA, Harvard, Vancouver, ISO, and other styles
30

Guillaume, Fumeaux. "Public Software as a Service a Business-Driven Guidance for Risk Control." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-60510.

Full text
Abstract:
Because cloud computing adoption grows day-by-day, it is essential for theexecutives of a company to be able to rely on a risks management guidanceto fully grasp all the aspects concerning cloud computing security.The concerns of the industry, the security standards, the official guidelines,and the European laws about the security when using cloud serviceshave been analyzed. The risks, the measures, and the obligations have beengathered. This paper, with all these information collected, describes how torun a risk management for public SaaS security keeping a business-drivenmindset. While runni
APA, Harvard, Vancouver, ISO, and other styles
31

Scully, Michael N. B. "Network and system security in an information age." Honors in the Major Thesis, University of Central Florida, 2000. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/204.

Full text
Abstract:
This item is only available in print in the UCF Libraries. If this is your Honors Thesis, you can help us make it available online for use by researchers around the world by following the instructions on the distribution consent form at http://library.ucf.edu/Systems/DigitalInitiatives/DigitalCollections/InternetDistributionConsentAgreementForm.pdf You may also contact the project coordinator, Kerri Bottorff, at kerri.bottorff@ucf.edu for more information.<br>Bachelors<br>Business Administration<br>Management Information Systems
APA, Harvard, Vancouver, ISO, and other styles
32

Lindell, Joakim, and Anders Nilsson. "Dominerande affärsmodeller inom området informationssäkerhet." Thesis, Blekinge Tekniska Högskola, Sektionen för management, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1196.

Full text
Abstract:
Computers together with Internet have been growing enormously, during the last decade and the area of information technology has been growing in the same speed. As long as the surrounding environment evolves, the business models must within the IT-area, keep the same pace. So, how do business corporations handle this change to attract customers? How do the dominant business models look like? In many cases, they are apparently much the same. But what differences can we see and what areas can be improved? We have showed that the IT area isn’t just one, it consist of several segments. These segme
APA, Harvard, Vancouver, ISO, and other styles
33

Posthumus, Shaun Murray. "Corporate information risk : an information security governance framework." Thesis, Nelson Mandela Metropolitan University, 2006. http://hdl.handle.net/10948/814.

Full text
Abstract:
Information Security is currently viewed from a technical point of view only. Some authors believe that Information Security is a process that involves more than merely Risk Management at the department level, as it is also a strategic and potentially legal issue. Hence, there is a need to elevate the importance of Information Security to a governance level through Information Security Governance and propose a framework to help guide the Board of Directors in their Information Security Governance efforts. IT is a major facilitator of organizational business processes and these processes manipu
APA, Harvard, Vancouver, ISO, and other styles
34

Sowa, Sebastian. "Information-Security-Business-Performance-Measurement und -Management im Kontext von Compliance und Unternehmungszielen." Bochum ISEB, 2009. http://d-nb.info/100063129X/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Denton, William F., Lyle P. Ainsworth, and Jonathan C. Byrom. "The Advanced Security Operations Corporation special weapons and tactics initiative: a business plan." Monterey, California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/9893.

Full text
Abstract:
MBA Professional Report<br>The purpose of this MBA Project is to investigate and provide a comprehensive overview of the current state of affairs with regard to the privatized security industry. The project focuses on a business plan that will cover three phases for a start-up company to enter the private security market. The purpose of Advanced Security Operations Corporation (ASOC) is to enter and profit from the growing Privatized Military Industry (PMI) trend. This proposal looks at establishing a network of centralized SWAT teams whose sole mission is to train and conduct SWAT operations.
APA, Harvard, Vancouver, ISO, and other styles
36

ERLICH, LEONARDO. "BUSINESS CONTINUITY PLAN: AN EXPLORATORY RESEARCH IN THE STRATEGIC PERSPECTIVE ON INFORMATION SECURITY." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2004. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=5000@1.

Full text
Abstract:
Todos os dias, diversos sistemas são invadidos, muitas pessoas são vítimas de vírus, os mais variados dados são obtidos ilegalmente e muitas empresas ficam de uma hora para outra sem poder operar normalmente. A segurança da informação se ocupa exatamente da proteção dos recursos de informação de empresas e indivíduos. Dentre os diversos assuntos abrangidos pela segurança da informação, o plano de continuidade de negócios (PCN) é o objeto de estudo deste trabalho. Antes confinado à literatura especializada, o PCN ganhou projeção na mídia há pouco mais de dois anos, quando o mundo ass
APA, Harvard, Vancouver, ISO, and other styles
37

Asmah, Gilbert Yaw, and Adebola Abdulrafiu Baruwa. "Managing IT Security In Organizations : A look at Physical and Administrative Controls." Thesis, Jönköping University, JIBS, Business Informatics, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-249.

Full text
Abstract:
<p>Introduction</p><p>Information technology security or computing system security is one of the most impor-tant issues that businesses all over the world strive to deal with. However, the world has now changed and in essential ways. The desk-top computer and workstation have appeared and proliferated widely. The net effect of all this has been to expose the computer-based information system, i.e. its hardware, its software, its software processes, its databases, its communications to an environment over which no one—not end user, not network admin-istrator or system owner, not even government
APA, Harvard, Vancouver, ISO, and other styles
38

Cook, Kimberly Diane. "Effective Cyber Security Strategies for Small Businesses." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3871.

Full text
Abstract:
Disruptive technologies developed in the digital age expose individuals, businesses, and government entities to potential cyber security vulnerabilities. Through the conceptual framework of general systems theory, this multiple case study was used to explore the strategies among owners of 4 retail small- and medium-size enterprises (SMEs) in Melbourne, Florida, who successfully protected their businesses against cyber attacks. The data were collected from a review of archival company documents and semistructured interviews. Yin's 5-phased cycles for analyzing case studies provided the guidelin
APA, Harvard, Vancouver, ISO, and other styles
39

Levy, Edmund B. "Interagency Coordination of Security Operations at a Large U.S. Seaport." Thesis, Walden University, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=3705026.

Full text
Abstract:
<p> Protecting U.S. transportation hubs against a wide variety of security threats, while avoiding undue interference with the normal operations of the hubs, is one of the greatest challenges facing security agencies. The problem addressed in this study was the limited information on the contributing factors to seaport security. The purpose of this case study was to explore issues that can inhibit efficiency of security agency operation and collaboration and to identify actions that have enhanced collaboration. Based on theories of organizational development, leadership, and security tradecraf
APA, Harvard, Vancouver, ISO, and other styles
40

Eichler, Jörn Gunnar [Verfasser], Claudia [Akademischer Betreuer] Eckert, and Helmut [Akademischer Betreuer] Krcmar. "Model-based Security Engineering of Electronic Business Processes : A framework for security engineering in the domain of business process management / Jörn Gunnar Eichler. Gutachter: Helmut Krcmar ; Claudia Eckert. Betreuer: Claudia Eckert." München : Universitätsbibliothek der TU München, 2015. http://d-nb.info/1074999452/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Teesri, Sumuscha. "Implementation business-to-business electronic commerce website using active server pages." CSUSB ScholarWorks, 2000. https://scholarworks.lib.csusb.edu/etd-project/3023.

Full text
Abstract:
E-commerce is the current approach for doing any type of business online, which uses the superior power of digital information to understand the requirements and preferences of each client and each partner, to adapt products and services for them, and then to distribute the products and services as swiftly as possible.
APA, Harvard, Vancouver, ISO, and other styles
42

Mathias, Henry. "Analyzing Small Businesses' Adoption of Big Data Security Analytics." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/6614.

Full text
Abstract:
Despite the increased cost of data breaches due to advanced, persistent threats from malicious sources, the adoption of big data security analytics among U.S. small businesses has been slow. Anchored in a diffusion of innovation theory, the purpose of this correlational study was to examine ways to increase the adoption of big data security analytics among small businesses in the United States by examining the relationship between small business leaders' perceptions of big data security analytics and their adoption. The research questions were developed to determine how to increase the adoptio
APA, Harvard, Vancouver, ISO, and other styles
43

Thomson, Warren David. "The Influence of Market States on Security Returns." Thesis, Griffith University, 2016. http://hdl.handle.net/10072/366035.

Full text
Abstract:
Business and economic cycles have played a major factor in economies and people lives for centuries; indeed, it could be argued that the economic crises and economic good times affect all people’s wellbeing. As financial markets have developed in modern economies, researchers have observed that market cycles tend to be leading indicators of business cycles. While there is a long history of academic research into business cycles, academic research into how market states differentially influence security returns is a more recent phenomenon. The aim of this thesis is to explore not only new metho
APA, Harvard, Vancouver, ISO, and other styles
44

Drake, Paul David. "Communicative action in information security systems : an application of social theory in a technical domain." Thesis, University of Hull, 2005. http://hydra.hull.ac.uk/resources/hull:5623.

Full text
Abstract:
This thesis is about grounding an increasingly common practice in an established theory where no explicit theory currently exists. The common practice that is the subject of this study is information security. It is commonly held that information security means maintaining the confidentiality, integrity (accuracy) and availability of information. It seems that a whole industry has built up with tools, techniques and consultants to help organisations achieve a successful information security practice. There is even a British Standard containing around 130 controls, and a management system to gu
APA, Harvard, Vancouver, ISO, and other styles
45

Zorraquino, Alicia. "Social media and business: balancing risks and opportunities : A literature review." Thesis, Luleå tekniska universitet, Digitala tjänster och system, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-79239.

Full text
Abstract:
Purpose This thesis analyses what are the current information security risks and opportunities of social media in a business context based on publications from 2015 to 2020. Design/methodology/approach This papers follows a qualitative method, particularly a Systematic Literature Review guided by Okoli and and Schabram (2010), the concept-centric approach described by Webster and Watson (2002) and thematic analysis described by Braun and Clarke (2006). Findings Data leaks, non-compliance and reputational risks seem to be the most significant corporate social media risks. Adopting social media
APA, Harvard, Vancouver, ISO, and other styles
46

Saber, Jennifer. "Determining Small Business Cybersecurity Strategies to Prevent Data Breaches." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/4991.

Full text
Abstract:
Cybercrime is one of the quickest growing areas of criminality. Criminals abuse the speed, accessibility, and privacy of the Internet to commit diverse crimes involving data and identity theft that cause severe damage to victims worldwide. Many small businesses do not have the financial and technological means to protect their systems from cyberattack, making them vulnerable to data breaches. This exploratory multiple case study, grounded in systems thinking theory and routine activities theory, encompassed an investigation of cybersecurity strategies used by 5 small business leaders in Middle
APA, Harvard, Vancouver, ISO, and other styles
47

Tshabalala, Obediant. "Critical success factors of information security projects." Thesis, Nelson Mandela Metropolitan University, 2016. http://hdl.handle.net/10948/10397.

Full text
Abstract:
The research shows the critical success factors when implementing information security projects. Many Information security projects in the past have not been successful because these factors were not identified and emphasised effectively. By identifying these factors the research basically presents a model by which information security projects can be executed with guaranteed success. The factors identified during the study cover the following streams: top management commitment as a factor of success; accountability as a factor of success; responsibility as a factor of success; awareness as a
APA, Harvard, Vancouver, ISO, and other styles
48

Arlestedt, Rebecka, and Melenie Lindh. "Enterprise Mobility : Defining and evaluating business digitalization." Thesis, Mittuniversitetet, Avdelningen för informations- och kommunikationssystem, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-28264.

Full text
Abstract:
Mobile technology has developed rapidly in the recent years and considerably changed the way organizations work. Mobility can bring great benefits to the organizations of which they are at, by e.g. improving employee satisfaction and increase efficiency and productivity. Despite this the development of mobile solutions have grown much faster for individuals than for organizations, with a plethora of devices and applications. The slow enterprise adoption is partly due to the fact that companies need to take information security risks into account at the same time as IT systems need to be rebuil
APA, Harvard, Vancouver, ISO, and other styles
49

Tenn, Daniel, and 唐丹尼. "Cascadia Security Services – A Taiwan-based Cyber Security Consulting Business." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/646674.

Full text
Abstract:
碩士<br>國立臺灣大學<br>企業管理碩士專班<br>106<br>This business plan introduces “Cascadia Security Services”, hereinafter referred to as “Cascadia”. Cascadia is cyber security consulting firm headquartered in Taipei, Taiwan. Cascadia will initiate operations within Taiwan but will seek international expansion in response to a growing need for cyber security services throughout the Asia-Pacific region. Initial service offerings will concentrate on assessment, user education, network hardening, compliance auditing, and penetration testing for government agencies as well as small and medium business enterprises
APA, Harvard, Vancouver, ISO, and other styles
50

Wu, Chia-Chi, and 吳家麒. "Security Mechanisms for Electronic Business Applications." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/96325104886360331405.

Full text
Abstract:
博士<br>國立中正大學<br>資訊工程研究所<br>99<br>With the rapid development of Internet technology, many enterprises substantially adopt information systems to support business activities over the Internet and mobile networks. Both Internet and mobile networks are public; the transactions security and information assets assurance of E-business evolve into serious problems. In the networks, anyone can impersonate the valid entities to steal services or confidential data. Therefore, the mutual authentication is an unavoidable mechanism between the sender and the receiver. Meanwhile, the key agreement mechanism
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!