Dissertations / Theses on the topic 'Security of business'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Security of business.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Celovsky, Jason. "Social Security : a discussion of the proposed reform /." Staten Island, N.Y. : [s.n.], 2006. http://library.wagner.edu/theses/business/2006/thesis_bus_2006_celov_socia.pdf.
Full textValella, William. "Securing open source Virtual Private Networks a study in Linux security /." [Gainesville, Fla.] : University of Florida, 2001. http://purl.fcla.edu/fcla/etd/UFE0000362.
Full textBox, Debra. "Business process security maturity: a paradigm convergence." Thesis, Nelson Mandela Metropolitan University, 2008. http://hdl.handle.net/10948/722.
Full textAlqatawna, Ja'Far S. "Multi-stakeholder enquiry for securing e-Business environments : a socio-technical security framework." Thesis, Sheffield Hallam University, 2010. http://shura.shu.ac.uk/19255/.
Full textNurse, Jason R. C. "A business-oriented framework for enhancing web services security for e-business." Thesis, University of Warwick, 2010. http://wrap.warwick.ac.uk/34605/.
Full textSpeight, Peter. "Why doesn't security work?" Thesis, University of Portsmouth, 2011. https://researchportal.port.ac.uk/portal/en/theses/why-security-doesnt-work(aaf04447-8601-4388-b40b-1461fdd703fc).html.
Full textArgyropoulos, Nikolaos. "Designing secure business processes from organisational goal models." Thesis, University of Brighton, 2018. https://research.brighton.ac.uk/en/studentTheses/6aca6ecc-0073-48dd-a781-6cb66de28272.
Full textNachtigal, Sharon. "E-business information systems security design paradigm and model." Thesis, Royal Holloway, University of London, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.549582.
Full textSomasekaram, Premathas. "Designing a Business Intelligence Solution for Analyzing Security Data." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-208685.
Full textBarosy, Wileen. "Successful Operational Cyber Security Strategies for Small Businesses." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/6969.
Full textKongnso, Fedinand Jaiventume. "Best Practices to Minimize Data Security Breaches for Increased Business Performance." ScholarWorks, 2015. https://scholarworks.waldenu.edu/dissertations/1825.
Full textPatterson, Joanna. "Cyber-Security Policy Decisions in Small Businesses." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4551.
Full textOlsen, Brett C. "Essays on security issuance." Diss., Columbia, Mo. : University of Missouri-Columbia, 2007. http://hdl.handle.net/10355/6261.
Full textKahle, Kathleen M. "Insider trading and new security issues." Connect to resource, 1996. http://rave.ohiolink.edu/etdc/view.cgi?acc%5Fnum=osu1265127804.
Full textTerrone, Kristen. "The present issue of the unsecure social security system from the perspective of the AICPA and President George W. Bush's Administration /." Staten Island, N.Y. : [s.n.], 2006. http://library.wagner.edu/theses/business/2006/thesis_bus_2006_terro_prese.pdf.
Full textHarris, Mark. "THE SHAPING OF MANAGERS’ SECURITY OBJECTIVES THROUGH INFORMATION SECURITY AWARENESS TRAINING." VCU Scholars Compass, 2010. http://scholarscompass.vcu.edu/etd/2208.
Full textMarais, Terrence K. "Electronic payment and security on the Internet." Thesis, Stellenbosch : Stellenbosch University, 2002. http://hdl.handle.net/10019.1/52819.
Full textTassabehji, Rana. "Secure use of the Internet by business." Thesis, University of Salford, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.366312.
Full textHellqvist, Fredrik. "Design of business information security policy : A case study on Orebro County Council´s work with information security." Thesis, Örebro universitet, Handelshögskolan vid Örebro Universitet, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-35527.
Full textHock, Kevin. "The Integrity Enforcer: Ensuring Program Data and Code Security." Miami University Honors Theses / OhioLINK, 2003. http://rave.ohiolink.edu/etdc/view?acc_num=muhonors1111148755.
Full textBeltrán, Alanis Martha Alicia, and Sánchez Javier Arnulfo Cruz. "An exploratory research : Fear and the need of security interplay as a business mechanism." Thesis, Linköpings universitet, Företagsekonomi, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-71161.
Full textNwachukwu, Ijeoma Ogechi. "Relationship Between Oil Theft, Pipeline Vandalism, and Security Costs With Revenue Losses." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4398.
Full textHartman, Hampus. "Fear of Crime- Among Business Representatives and how it is Affected Through the Security Measures of the Business." Thesis, Malmö högskola, Fakulteten för hälsa och samhälle (HS), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-25339.
Full textVerhun, A. M., and Yu Bondarchuk. "Management of business processes as a tool for ensuring enterprise economic security." Thesis, Київський національний університет технологій та дизайну, 2017. https://er.knutd.edu.ua/handle/123456789/7113.
Full textKennedy-Good, Jonathan. "Dividend yields, business conditions, and expected security returns : a South African perspective." Master's thesis, University of Cape Town, 2003. http://hdl.handle.net/11427/11417.
Full textOkoye, Stella Ifeyinwa. "Strategies to Minimize the Effects of Information Security Threats on Business Performance." Thesis, Walden University, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10606454.
Full textGraisithikul, Gunyarat. "Comparing Access Control Security Policies : A Case Study Using SBVR." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-108306.
Full textIppolito, Steven Christopher. "Convergence -- A Homeland Security and Educational Problem| A Mixed Methodological Study." Thesis, Northcentral University, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10624690.
Full textDomingues, Steve. "Navigating between information security management documents : a modeling methodology." Thesis, Nelson Mandela Metropolitan University, 2010. http://hdl.handle.net/10948/1212.
Full textGuillaume, Fumeaux. "Public Software as a Service a Business-Driven Guidance for Risk Control." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-60510.
Full textScully, Michael N. B. "Network and system security in an information age." Honors in the Major Thesis, University of Central Florida, 2000. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/204.
Full textLindell, Joakim, and Anders Nilsson. "Dominerande affärsmodeller inom området informationssäkerhet." Thesis, Blekinge Tekniska Högskola, Sektionen för management, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1196.
Full textPosthumus, Shaun Murray. "Corporate information risk : an information security governance framework." Thesis, Nelson Mandela Metropolitan University, 2006. http://hdl.handle.net/10948/814.
Full textSowa, Sebastian. "Information-Security-Business-Performance-Measurement und -Management im Kontext von Compliance und Unternehmungszielen." Bochum ISEB, 2009. http://d-nb.info/100063129X/34.
Full textDenton, William F., Lyle P. Ainsworth, and Jonathan C. Byrom. "The Advanced Security Operations Corporation special weapons and tactics initiative: a business plan." Monterey, California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/9893.
Full textERLICH, LEONARDO. "BUSINESS CONTINUITY PLAN: AN EXPLORATORY RESEARCH IN THE STRATEGIC PERSPECTIVE ON INFORMATION SECURITY." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2004. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=5000@1.
Full textAsmah, Gilbert Yaw, and Adebola Abdulrafiu Baruwa. "Managing IT Security In Organizations : A look at Physical and Administrative Controls." Thesis, Jönköping University, JIBS, Business Informatics, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-249.
Full textCook, Kimberly Diane. "Effective Cyber Security Strategies for Small Businesses." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3871.
Full textLevy, Edmund B. "Interagency Coordination of Security Operations at a Large U.S. Seaport." Thesis, Walden University, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=3705026.
Full textEichler, Jörn Gunnar [Verfasser], Claudia [Akademischer Betreuer] Eckert, and Helmut [Akademischer Betreuer] Krcmar. "Model-based Security Engineering of Electronic Business Processes : A framework for security engineering in the domain of business process management / Jörn Gunnar Eichler. Gutachter: Helmut Krcmar ; Claudia Eckert. Betreuer: Claudia Eckert." München : Universitätsbibliothek der TU München, 2015. http://d-nb.info/1074999452/34.
Full textTeesri, Sumuscha. "Implementation business-to-business electronic commerce website using active server pages." CSUSB ScholarWorks, 2000. https://scholarworks.lib.csusb.edu/etd-project/3023.
Full textMathias, Henry. "Analyzing Small Businesses' Adoption of Big Data Security Analytics." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/6614.
Full textThomson, Warren David. "The Influence of Market States on Security Returns." Thesis, Griffith University, 2016. http://hdl.handle.net/10072/366035.
Full textDrake, Paul David. "Communicative action in information security systems : an application of social theory in a technical domain." Thesis, University of Hull, 2005. http://hydra.hull.ac.uk/resources/hull:5623.
Full textZorraquino, Alicia. "Social media and business: balancing risks and opportunities : A literature review." Thesis, Luleå tekniska universitet, Digitala tjänster och system, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-79239.
Full textSaber, Jennifer. "Determining Small Business Cybersecurity Strategies to Prevent Data Breaches." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/4991.
Full textTshabalala, Obediant. "Critical success factors of information security projects." Thesis, Nelson Mandela Metropolitan University, 2016. http://hdl.handle.net/10948/10397.
Full textArlestedt, Rebecka, and Melenie Lindh. "Enterprise Mobility : Defining and evaluating business digitalization." Thesis, Mittuniversitetet, Avdelningen för informations- och kommunikationssystem, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-28264.
Full textTenn, Daniel, and 唐丹尼. "Cascadia Security Services – A Taiwan-based Cyber Security Consulting Business." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/646674.
Full textWu, Chia-Chi, and 吳家麒. "Security Mechanisms for Electronic Business Applications." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/96325104886360331405.
Full text