Dissertations / Theses on the topic 'Security risk control measures'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Security risk control measures.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Guillaume, Fumeaux. "Public Software as a Service a Business-Driven Guidance for Risk Control." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-60510.
Full textGerber, Petro. "Addressing the incremental risks associated with social media by using the cobit 5 control framework." Thesis, Stellenbosch : Stellenbosch University, 2015. http://hdl.handle.net/10019.1/96665.
Full textDohnal, Matěj. "Návrh přístupového systému jako součást řešení fyzické bezpečnosti." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2017. http://www.nusl.cz/ntk/nusl-318624.
Full textStein, Michael T. "On the relationship between audit risk and security market measures of risk." Thesis, University of British Columbia, 1988. http://hdl.handle.net/2429/29431.
Full textYalcinkaya, Ramazan. "Risk Assessment of Aviation Security and Evaluation of Aviation Security Policies." Thesis, University of North Texas, 2005. https://digital.library.unt.edu/ark:/67531/metadc4801/.
Full textTansley, Natalie Vanessa. "A methodology for measuring and monitoring IT risk." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/772.
Full textRutherford, Andrew. "Introducing hippocratic log files for personal privacy control." Thesis, Nelson Mandela Metropolitan University, 2005. http://hdl.handle.net/10948/171.
Full textPosthumus, Shaun Murray. "Corporate information risk : an information security governance framework." Thesis, Nelson Mandela Metropolitan University, 2006. http://hdl.handle.net/10948/814.
Full textMetaparti, Satya Prakash. "Risk management initiatives for post 9/11 maritime security." Thesis, Click to view the E-thesis via HKUTO, 2009. http://sunzi.lib.hku.hk/hkuto/record/B42841859.
Full textViljoen, Melanie. "A framework towards effective control in information security governance." Thesis, Nelson Mandela Metropolitan University, 2009. http://hdl.handle.net/10948/887.
Full textOgbanufe, Obiageli. "Three Essays on Information Security Risk Management." Thesis, University of North Texas, 2018. https://digital.library.unt.edu/ark:/67531/metadc1157576/.
Full textLiwång, Hans, Jonas W. Ringsberg, and Martin Norsell. "Quantitative risk analysis : Ship security analysis for effective risk control options." Försvarshögskolan, Militärtekniska avdelningen (MTA), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-3800.
Full textBurdis, Keith Robert. "Distributed authentication for resource control." Thesis, Rhodes University, 2000. http://hdl.handle.net/10962/d1006512.
Full textDe, Villiers R. R. (Raoul Reenen). "The role of risk perception in Internet purchasing behaviour and intention." Thesis, Stellenbosch : Stellenbosch University, 2001. http://hdl.handle.net/10019.1/52570.
Full textXiao, Fei. "Risk based multi-objective security control and congestion management." [Ames, Iowa : Iowa State University], 2007.
Find full textPark, Yongro. "A statistical process control approach for network intrusion detection." Diss., Georgia Institute of Technology, 2005. http://hdl.handle.net/1853/6835.
Full textLategan, Neil. "Epirismm: an enterprise information risk management model." Thesis, Nelson Mandela Metropolitan University, 2006. http://hdl.handle.net/10948/541.
Full textShumaker, Todd, and Dennis Rowlands. "Risk assessment of the Naval Postgraduate School gigabit network." Thesis, Monterey, California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/1351.
Full textKlosinski, Vance J. "Population and resource control measures a conceptual framework for understanding and implementation." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Dec/09Dec%5FKlosinski.pdf.
Full textBragg, Emily. "Security Measures and School Dropout: A Test of Two Competing Theories." Bowling Green State University / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1586517888575557.
Full textZhao, Dong. "Exploring Construction Safety and Control Measures through Electrical Fatalities." Diss., Virginia Tech, 2015. http://hdl.handle.net/10919/71712.
Full textFarahmand, Fariborz. "Developing a Risk Management System for Information Systems Security Incidents." Diss., Georgia Institute of Technology, 2004. http://hdl.handle.net/1853/7600.
Full textOkere, Irene Onyekachi. "A control framework for the assessment of information security culture." Thesis, Nelson Mandela Metropolitan University, 2013. http://hdl.handle.net/10948/d1019861.
Full textBuzdugan, Maria. "Current and emerging air cargo security and facilitation issues." Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=99128.
Full textKim, Duk-Ki. "Geo-strategic approaches to co-operative maritime security in northeast Asia : with particular reference to naval arms control, maritime confidence-building measures and maritime co-operation measures." Thesis, University of Hull, 1998. http://hydra.hull.ac.uk/resources/hull:10446.
Full textHan, Yong-Sup. "Designing and evaluating conventional arms control measures, the case of the Korean Peninsula." Santa Monica, CA : RAND, 1993. http://www.rand.org/pubs/notes/N3411/.
Full textSchuessler, Joseph H. "General Deterrence Theory: Assessing Information Systems Security Effectiveness in Large versus Small Businesses." Thesis, University of North Texas, 2009. https://digital.library.unt.edu/ark:/67531/metadc9829/.
Full textLeloudas, Georgios. "Legal aspects of aviation risk management." Thesis, McGill University, 2003. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=80937.
Full textHe, Yijun, and 何毅俊. "Protecting security in cloud and distributed environments." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2012. http://hub.hku.hk/bib/B49617631.
Full textHart, Dennis. "An approach to vulnerability assessment for Navy Supervisory Control and Data Acquisition (SCADA) system." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Sep%5FHart.pdf.
Full textMegaw, Gregory M. "Phishing within e-commerce: reducing the risk, increasing the trust." Thesis, University of Fort Hare, 2010. http://hdl.handle.net/10353/376.
Full textGerber, Mariana. "The development of a technique to establish the security requirements of an organization." Thesis, Port Elizabeth Technikon, 2001. http://hdl.handle.net/10948/89.
Full textLewis, Brian Michael. "Inventory Control with Risk of Major Supply Chain Disruptions." Diss., Georgia Institute of Technology, 2005. http://hdl.handle.net/1853/7155.
Full textGoss, Ryan Gavin. "Enabling e-learning 2.0 in information security education: a semantic web approach." Thesis, Nelson Mandela Metropolitan University, 2009. http://hdl.handle.net/10948/909.
Full textDeas, Matthew Burns. "Towards a user centric model for identity and access management within the online environment." Thesis, Nelson Mandela Metropolitan University, 2008. http://hdl.handle.net/10948/775.
Full textSalikin, Md Saion. "An improved system of damage limitation for better risk control in radiological protection near environmental level." Thesis, University of St Andrews, 1995. http://hdl.handle.net/10023/13372.
Full textDawson, Robert Edward. "Secure communications for critical infrastructure control systems." Queensland University of Technology, 2008. http://eprints.qut.edu.au/20710/.
Full textChance, Christopher P. "Designing and implementing a network authentication service for providing a secure communication channel." Thesis, Kansas State University, 1986. http://hdl.handle.net/2097/9903.
Full textNisa, Claudia F., Jocelyn J. Bélanger, Daiane G. Faller, et al. "Lives versus Livelihoods? Perceived economic risk has a stronger association with support for COVID-19 preventive measures than perceived health risk." Nature Research, 2021. http://hdl.handle.net/10757/657340.
Full textShade, Molly. "The Burner Project: Privacy and Social Control in a Networked World." Thesis, University of North Texas, 2015. https://digital.library.unt.edu/ark:/67531/metadc801891/.
Full textGerber, Tian Johannes. "VoIP : a corporate governance approach to avoid the risk of civil liability." Thesis, Nelson Mandela Metropolitan University, 2012. http://hdl.handle.net/10948/d1016272.
Full textGwaka, Leon Tinashe. "Social media risks in large and medium enterprises in the Cape Metropole : the role of internal auditors." Thesis, Cape Peninisula University of Technology, 2015. http://hdl.handle.net/20.500.11838/2086.
Full textSahd, Lize-Marie. "A structured approach to the identification of the significant risks related to enterprise mobile solutions at a mobile technology component level." Thesis, Stellenbosch : Stellenbosch University, 2015. http://hdl.handle.net/10019.1/96674.
Full textRamirez, Christina M. "Water security and its importance in protecting public health." Scholarly Commons, 2012. https://scholarlycommons.pacific.edu/uop_etds/820.
Full textKamongi, Patrick. "Ontology Based Security Threat Assessment and Mitigation for Cloud Systems." Thesis, University of North Texas, 2018. https://digital.library.unt.edu/ark:/67531/metadc1404576/.
Full textNcube, Lashias. "Campus policing : an ethnography of the University of Cape Town Campus Control Unit." Master's thesis, University of Cape Town, 1996. http://hdl.handle.net/11427/17205.
Full textWei, Jinpeng. "Improving operating systems security two case studies /." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2009. http://hdl.handle.net/1853/31849.
Full textPerelson, Stephen. "SoDA : a model for the administration of separation of duty requirements in workflow systems." Thesis, Port Elizabeth Technikon, 2001. http://hdl.handle.net/10948/68.
Full textNayak, Ankur Kumar. "Flexible access control for campus and enterprise networks." Thesis, Georgia Institute of Technology, 2010. http://hdl.handle.net/1853/33813.
Full textTimofejevaitė, Raminta. "Socialinės apsaugos priemonės nedarbo rizikos atveju: Lietuvos ir užsienio valstybių patirtis." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2014. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2012~D_20140627_180528-10323.
Full text