To see the other types of publications on this topic, follow the link: Security risk control measures.

Dissertations / Theses on the topic 'Security risk control measures'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Security risk control measures.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Guillaume, Fumeaux. "Public Software as a Service a Business-Driven Guidance for Risk Control." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-60510.

Full text
Abstract:
Because cloud computing adoption grows day-by-day, it is essential for theexecutives of a company to be able to rely on a risks management guidanceto fully grasp all the aspects concerning cloud computing security.The concerns of the industry, the security standards, the official guidelines,and the European laws about the security when using cloud serviceshave been analyzed. The risks, the measures, and the obligations have beengathered. This paper, with all these information collected, describes how torun a risk management for public SaaS security keeping a business-drivenmindset. While runni
APA, Harvard, Vancouver, ISO, and other styles
2

Gerber, Petro. "Addressing the incremental risks associated with social media by using the cobit 5 control framework." Thesis, Stellenbosch : Stellenbosch University, 2015. http://hdl.handle.net/10019.1/96665.

Full text
Abstract:
Thesis (MComm)--Stellenbosch University, 2015.<br>ENGLISH ABSTRACT: Social media offers great opportunities for businesses and the use thereof will increase competitiveness. However, social media also introduce significant risks to those who adopt it. A business can use existing IT governance control framework to address the risks introduced by social media. However a business should combine existing control frameworks for adequate and complete IT governance. This study was undertaken to help businesses to identify incremental risks resulting from the adoption of social media and to dev
APA, Harvard, Vancouver, ISO, and other styles
3

Dohnal, Matěj. "Návrh přístupového systému jako součást řešení fyzické bezpečnosti." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2017. http://www.nusl.cz/ntk/nusl-318624.

Full text
Abstract:
This master’s thesis deals with design of an access system as a part of physical security solution for an energy company in the Czech Republic. The access system is designed to meet all legal requirements and conform to ISO 27001 certification. Implementation of the proposed access system is demonstrated on the selected company object, a representative example of connecting the critical infrastructure element and the company's common facility.
APA, Harvard, Vancouver, ISO, and other styles
4

Stein, Michael T. "On the relationship between audit risk and security market measures of risk." Thesis, University of British Columbia, 1988. http://hdl.handle.net/2429/29431.

Full text
Abstract:
This research investigates the relationship between security market measures of risk and audit risk. The auditor's decision making environment is extended to include the actions of the client firm's shareholders. Using the Nash equilibrium concept it is shown that, in equilibrium, the expected costs of auditing increase with the probability of a "bad" outcome in the securities markets. This result obtains in both strict liability and negligence regimes. The result is driven, in part by the insurance role of auditing. In empirical tests an association is established between security risk and au
APA, Harvard, Vancouver, ISO, and other styles
5

Yalcinkaya, Ramazan. "Risk Assessment of Aviation Security and Evaluation of Aviation Security Policies." Thesis, University of North Texas, 2005. https://digital.library.unt.edu/ark:/67531/metadc4801/.

Full text
Abstract:
Comprising many airplanes, airports, aircrew, and employees, aviation industry is a large sector that is very vulnerable to attacks, whether it is from terrorists or criminals. Aviation history is fraught with examples of airport bombings, hijackings, and sabotage terrorist attacks. The most destructive of which is the tragedy of September 11, 2001, the cornerstone of today's aviation security policies. This study uses risk assessment tools to determine the dimensions of danger and threats against the aviation industry and addresses how vulnerable the aviation sector is. After vulnerabilities
APA, Harvard, Vancouver, ISO, and other styles
6

Tansley, Natalie Vanessa. "A methodology for measuring and monitoring IT risk." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/772.

Full text
Abstract:
The primary objective of the research is to develop a methodology for monitoring and measuring IT risks, strictly focusing on internal controls. The research delivers a methodology whereby an organization can measure its system of internal controls, providing assurance that the risks are at an acceptable level. To achieve the primary objective a number of secondary objectives were addressed: What are the drivers forcing organizations to better corporate governance in managing risk? What is IT risk management, specifically focusing on operational risk. What is internal control and specifically
APA, Harvard, Vancouver, ISO, and other styles
7

Rutherford, Andrew. "Introducing hippocratic log files for personal privacy control." Thesis, Nelson Mandela Metropolitan University, 2005. http://hdl.handle.net/10948/171.

Full text
Abstract:
The rapid growth of the Internet has served to intensify existing privacy concerns of the individual, to the point that privacy is the number one concern amongst Internet users today. Tools exist that can provide users with a choice of anonymity or pseudonymity. However, many Web transactions require the release of personally identifying information, thus rendering such tools infeasible in many instances. Since it is then a given that users are often required to release personal information, which could be recorded, it follows that they require a greater degree of control over the information
APA, Harvard, Vancouver, ISO, and other styles
8

Posthumus, Shaun Murray. "Corporate information risk : an information security governance framework." Thesis, Nelson Mandela Metropolitan University, 2006. http://hdl.handle.net/10948/814.

Full text
Abstract:
Information Security is currently viewed from a technical point of view only. Some authors believe that Information Security is a process that involves more than merely Risk Management at the department level, as it is also a strategic and potentially legal issue. Hence, there is a need to elevate the importance of Information Security to a governance level through Information Security Governance and propose a framework to help guide the Board of Directors in their Information Security Governance efforts. IT is a major facilitator of organizational business processes and these processes manipu
APA, Harvard, Vancouver, ISO, and other styles
9

Metaparti, Satya Prakash. "Risk management initiatives for post 9/11 maritime security." Thesis, Click to view the E-thesis via HKUTO, 2009. http://sunzi.lib.hku.hk/hkuto/record/B42841859.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Viljoen, Melanie. "A framework towards effective control in information security governance." Thesis, Nelson Mandela Metropolitan University, 2009. http://hdl.handle.net/10948/887.

Full text
Abstract:
The importance of information in business today has made the need to properly secure this asset evident. Information security has become a responsibility for all managers of an organization. To better support more efficient management of information security, timely information security management information should be made available to all managers. Smaller organizations face special challenges with regard to information security management and reporting due to limited resources (Ross, 2008). This dissertation discusses a Framework for Information Security Management Information (FISMI) that
APA, Harvard, Vancouver, ISO, and other styles
11

Ogbanufe, Obiageli. "Three Essays on Information Security Risk Management." Thesis, University of North Texas, 2018. https://digital.library.unt.edu/ark:/67531/metadc1157576/.

Full text
Abstract:
Today's environment is filled with the proliferation of cyber-attacks that result in losses for organizations and individuals. Hackers often use compromised websites to distribute malware, making it difficult for individuals to detect. The impact of clicking through a link on the Internet that is malware infected can result in consequences such as private information theft and identity theft. Hackers are also known to perpetrate cyber-attacks that result in organizational security breaches that adversely affect organizations' finances, reputation, and market value. Risk management approaches f
APA, Harvard, Vancouver, ISO, and other styles
12

Liwång, Hans, Jonas W. Ringsberg, and Martin Norsell. "Quantitative risk analysis : Ship security analysis for effective risk control options." Försvarshögskolan, Militärtekniska avdelningen (MTA), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-3800.

Full text
Abstract:
This study reviews ship security assessment. The objectives are to explore the possibilities for quantifying and performing a more thorough ship security risk analysis than that described in the International Ship and Port Facility Security code and to evaluate to what extent this more detailed analysis increases ship security and facilitate the effective selection of risk control options. The study focuses on Somali-based maritime piracy, using piracy on the Indian Ocean as a case study. Data are collected using questionnaires and interviews with civilian and military security experts who pos
APA, Harvard, Vancouver, ISO, and other styles
13

Burdis, Keith Robert. "Distributed authentication for resource control." Thesis, Rhodes University, 2000. http://hdl.handle.net/10962/d1006512.

Full text
Abstract:
This thesis examines distributed authentication in the process of controlling computing resources. We investigate user sign-on and two of the main authentication technologies that can be used to control a resource through authentication and providing additional security services. The problems with the existing sign-on scenario are that users have too much credential information to manage and are prompted for this information too often. Single Sign-On (SSO) is a viable solution to this problem if physical procedures are introduced to minimise the risks associated with its use. The Generic Secur
APA, Harvard, Vancouver, ISO, and other styles
14

De, Villiers R. R. (Raoul Reenen). "The role of risk perception in Internet purchasing behaviour and intention." Thesis, Stellenbosch : Stellenbosch University, 2001. http://hdl.handle.net/10019.1/52570.

Full text
Abstract:
Thesis (MComm.)--Stellenbosch University, 2001.<br>ENGLISH ABSTRACT: In recent years the importance and number of users of electronic commerce and its medium, the Internet, have grown substantially. Despite this, the Business-to- Consumer sector has shown slow expansion and limited growth, with the majority of consumers slow to adopt the Internet as a medium for purchase. A probable factor affecting the purchasing behaviour of individuals is the perception of risk of a breach in (credit card) security and/or a violation of privacy. The research discussed here indicates that two closely
APA, Harvard, Vancouver, ISO, and other styles
15

Xiao, Fei. "Risk based multi-objective security control and congestion management." [Ames, Iowa : Iowa State University], 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Park, Yongro. "A statistical process control approach for network intrusion detection." Diss., Georgia Institute of Technology, 2005. http://hdl.handle.net/1853/6835.

Full text
Abstract:
Intrusion detection systems (IDS) have a vital role in protecting computer networks and information systems. In this thesis we applied an SPC monitoring concept to a certain type of traffic data in order to detect a network intrusion. We developed a general SPC intrusion detection approach and described it and the source and the preparation of data used in this thesis. We extracted sample data sets that represent various situations, calculated event intensities for each situation, and stored these sample data sets in the data repository for use in future research. A regular batch mean chart w
APA, Harvard, Vancouver, ISO, and other styles
17

Lategan, Neil. "Epirismm: an enterprise information risk management model." Thesis, Nelson Mandela Metropolitan University, 2006. http://hdl.handle.net/10948/541.

Full text
Abstract:
Today, information is considered a commodity and no enterprise can operate without it. Indeed, the information and the supporting technology are pivotal in all enterprises. However, a major problem being experienced in the business environment is that enterprise risk cannot be managed effectively because business and information-related risk are not congruently aligned with risk management terminology and practices. The business environment and information technology are bound together by information. For this reason, it is imperative that risk management is synergised in the business, ICT (In
APA, Harvard, Vancouver, ISO, and other styles
18

Shumaker, Todd, and Dennis Rowlands. "Risk assessment of the Naval Postgraduate School gigabit network." Thesis, Monterey, California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/1351.

Full text
Abstract:
Approved for public release; distribution is unlimited<br>This research thoroughly examines the current Naval Postgraduate School Gigabit Network security posture, identifies any possible threats or vulnerabilities, and recommends any appropriate safeguards that may be necessary to counter the found threats and vulnerabilities. The research includes any portion of computer security, physical security, personnel security, and communication security that may be applicable to the overall security of both the .mil and .edu domains. The goal of the research was to ensure that the campus network is
APA, Harvard, Vancouver, ISO, and other styles
19

Klosinski, Vance J. "Population and resource control measures a conceptual framework for understanding and implementation." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Dec/09Dec%5FKlosinski.pdf.

Full text
Abstract:
Thesis (M.S. in Defense Analysis)--Naval Postgraduate School, December 2009.<br>Thesis Advisor(s): Simmons, Anna. Second Reader: Lee, Doowan. "December 2009." Description based on title screen as viewed on January 27, 2010. Author(s) subject terms: Population and resource control measures, Population control, Counterinsurgency, COIN, Populationcentric COIN, Social control, Social movement theory. Includes bibliographical references (p. 51-53). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
20

Bragg, Emily. "Security Measures and School Dropout: A Test of Two Competing Theories." Bowling Green State University / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1586517888575557.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Zhao, Dong. "Exploring Construction Safety and Control Measures through Electrical Fatalities." Diss., Virginia Tech, 2015. http://hdl.handle.net/10919/71712.

Full text
Abstract:
Globally, construction is considered a hazardous industry with a disproportionate amount of fatal and non-fatal injuries as compared to other industries. Electrocution is named as one of the "fatal four" causes for construction injuries by the Occupational Safety and Health Administration (OSHA). In the United States, an average of 47.9% electrical fatalities occurred in the construction industry from 2003 to 2012, according to the U.S. Department of Labor. These fatalities include both electrical workers and non-electrical workers. Such a disproportionate rate suggests a need of research to i
APA, Harvard, Vancouver, ISO, and other styles
22

Farahmand, Fariborz. "Developing a Risk Management System for Information Systems Security Incidents." Diss., Georgia Institute of Technology, 2004. http://hdl.handle.net/1853/7600.

Full text
Abstract:
The Internet and information systems have enabled businesses to reduce costs, attain greater market reach, and develop closer business partnerships along with improved customer relationships. However, using the Internet has led to new risks and concerns. This research provides a management perspective on the issues confronting CIOs and IT managers. It outlines the current state of the art of information security, the important issues confronting managers, security enforcement measure/techniques, and potential threats and attacks. It develops a model for classification of threats and control me
APA, Harvard, Vancouver, ISO, and other styles
23

Okere, Irene Onyekachi. "A control framework for the assessment of information security culture." Thesis, Nelson Mandela Metropolitan University, 2013. http://hdl.handle.net/10948/d1019861.

Full text
Abstract:
The modern organisation relies heavily on information to function effectively. With such reliance on information, it is vital that information be protected from both internal (employees) and external threats. The protection of information or information security to a large extent depends on the behaviour of humans (employees) in the organisation. The behaviour of employees is one of the top information security issues facing organisations as the human factor is regarded as the weakest link in the security chain. To address this human factor many researchers have suggested the fostering of a cu
APA, Harvard, Vancouver, ISO, and other styles
24

Buzdugan, Maria. "Current and emerging air cargo security and facilitation issues." Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=99128.

Full text
Abstract:
In the wake of September 11th and following an overemphasis on passenger air travel security, the air cargo system potentially has become the primary target for terrorists. States have undertaken various regulatory approaches that involve technology and operational measures aimed at addressing the perceived security threats in the air cargo industry. This thesis presents both an overview of the potential risks and best security practices identified within several international, regional and national initiatives, including the "authorized economic operator" and "secure supply chain" mechanisms.
APA, Harvard, Vancouver, ISO, and other styles
25

Kim, Duk-Ki. "Geo-strategic approaches to co-operative maritime security in northeast Asia : with particular reference to naval arms control, maritime confidence-building measures and maritime co-operation measures." Thesis, University of Hull, 1998. http://hydra.hull.ac.uk/resources/hull:10446.

Full text
Abstract:
The purpose of this study is to design a co-operative maritime security structure for Northeast Asia through the application of naval arms control and disarmament measures (both structural and operational), maritime confidence-building measures (MCBMs) and maritime cooperation measures (MCMs). In order to construct an analytical framework for such an application it is necessary to introduce sub-objectives. The first is to explore the options for providing co-operative maritime security, such as naval arms control. MCBMs and MCMs, and to assess the value of their contribution to the general co-
APA, Harvard, Vancouver, ISO, and other styles
26

Han, Yong-Sup. "Designing and evaluating conventional arms control measures, the case of the Korean Peninsula." Santa Monica, CA : RAND, 1993. http://www.rand.org/pubs/notes/N3411/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Schuessler, Joseph H. "General Deterrence Theory: Assessing Information Systems Security Effectiveness in Large versus Small Businesses." Thesis, University of North Texas, 2009. https://digital.library.unt.edu/ark:/67531/metadc9829/.

Full text
Abstract:
This research sought to shed light on information systems security (ISS) by conceptualizing an organization's use of countermeasures using general deterrence theory, positing a non-recursive relationship between threats and countermeasures, and by extending the ISS construct developed in prior research. Industry affiliation and organizational size are considered in terms of differences in threats that firms face, the different countermeasures in use by various firms, and ultimately, how a firm's ISS effectiveness is affected. Six information systems professionals were interviewed in order to d
APA, Harvard, Vancouver, ISO, and other styles
28

Leloudas, Georgios. "Legal aspects of aviation risk management." Thesis, McGill University, 2003. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=80937.

Full text
Abstract:
The thesis in the first part examines the notion of risk and describes the process of risk management with emphasis on the identification of emerging threats to civil aviation and on the adoption of new risk handling techniques.<br>In the second part, the role of law into the airlines' management regime is examined especially in the light of two prima facie conflicting trends: liberalization of market access and increased State involvement in war risk, safety and security issues. Furthermore, the contractual and tortious/delictual exposures of airlines are being scrutinized and the ways
APA, Harvard, Vancouver, ISO, and other styles
29

He, Yijun, and 何毅俊. "Protecting security in cloud and distributed environments." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2012. http://hub.hku.hk/bib/B49617631.

Full text
Abstract:
Encryption helps to ensure that information within a session is not compromised. Authentication and access control measures ensure legitimate and appropriate access to information, and prevent inappropriate access to such resources. While encryption, authentication and access control each has its own responsibility in securing a communication session, a combination of these three mechanisms can provide much better protection for information. This thesis addresses encryption, authentication and access control related problems in cloud and distributed environments, since these problems are ver
APA, Harvard, Vancouver, ISO, and other styles
30

Hart, Dennis. "An approach to vulnerability assessment for Navy Supervisory Control and Data Acquisition (SCADA) system." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Sep%5FHart.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, Sept. 2004.<br>Thesis advisor(s): Cynthia E. Irvine, Karen Burke. Includes bibliographical references (p. 161-162). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
31

Megaw, Gregory M. "Phishing within e-commerce: reducing the risk, increasing the trust." Thesis, University of Fort Hare, 2010. http://hdl.handle.net/10353/376.

Full text
Abstract:
E-Commerce has been plagued with problems since its inception and this study examines one of these problems: The lack of user trust in E-Commerce created by the risk of phishing. Phishing has grown exponentially together with the expansion of the Internet. This growth and the advancement of technology has not only benefited honest Internet users, but has enabled criminals to increase their effectiveness which has caused considerable damage to this budding area of commerce. Moreover, it has negatively impacted both the user and online business in breaking down the trust relationship between the
APA, Harvard, Vancouver, ISO, and other styles
32

Gerber, Mariana. "The development of a technique to establish the security requirements of an organization." Thesis, Port Elizabeth Technikon, 2001. http://hdl.handle.net/10948/89.

Full text
Abstract:
To perform their business activities effectively, organizations rely heavily on the use of information (ISO/IEC TR 13335-2, 1996, p 1). Owens (1998) reiterates this by claiming that all organizations depend on information for their everyday operation and without it business will fail to operate (Owens, 1998, p 1-2). For an organization it means that if the right information is not available at the right time, it can make the difference between profit and loss or success and failure (Royds, 2000, p 2). Information is an asset and just like other important business assets within the organization
APA, Harvard, Vancouver, ISO, and other styles
33

Lewis, Brian Michael. "Inventory Control with Risk of Major Supply Chain Disruptions." Diss., Georgia Institute of Technology, 2005. http://hdl.handle.net/1853/7155.

Full text
Abstract:
This thesis studies inventory control with risk of major supply chain disruptions, specifically border closures and congestion. We first investigate an inventory system in which the probability distributions of order leadtimes are dependent on the state of an exogenous Markov process; we will model border disruptions via this exogenous process. We consider stationary, state-dependent basestock policies, which are known to be optimal for the system under study, and develop an expression for the long-run average cost of an arbitrary policy of this form. Restricting our attention to state-invaria
APA, Harvard, Vancouver, ISO, and other styles
34

Goss, Ryan Gavin. "Enabling e-learning 2.0 in information security education: a semantic web approach." Thesis, Nelson Mandela Metropolitan University, 2009. http://hdl.handle.net/10948/909.

Full text
Abstract:
The motivation for this study argued that current information security ed- ucation systems are inadequate for educating all users of computer systems world wide in acting securely during their operations with information sys- tems. There is, therefore, a pervasive need for information security knowledge in all aspects of modern life. E-Learning 2.0 could possi- bly contribute to solving this problem, however, little or no knowledge currently exists regarding the suitability and practicality of using such systems to infer information security knowledge to learners.
APA, Harvard, Vancouver, ISO, and other styles
35

Deas, Matthew Burns. "Towards a user centric model for identity and access management within the online environment." Thesis, Nelson Mandela Metropolitan University, 2008. http://hdl.handle.net/10948/775.

Full text
Abstract:
Today, one is expected to remember multiple user names and passwords for different domains when one wants to access on the Internet. Identity management seeks to solve this problem through creating a digital identity that is exchangeable across organisational boundaries. Through the setup of collaboration agreements between multiple domains, users can easily switch across domains without being required to sign in again. However, use of this technology comes with risks of user identity and personal information being compromised. Criminals make use of spoofed websites and social engineering tech
APA, Harvard, Vancouver, ISO, and other styles
36

Salikin, Md Saion. "An improved system of damage limitation for better risk control in radiological protection near environmental level." Thesis, University of St Andrews, 1995. http://hdl.handle.net/10023/13372.

Full text
Abstract:
In radiological protection, models are used to assess radiation risk by means of extrapolation from high dose and dose rate to low dose and dose rate. In this thesis five main biophysical models of radiation action have been evaluated, appraised and inter-compared. The five models are lethal and potentially lethal (LPL) by Curtis, pairwise lesion interaction (PLI) by Harder, cellular track structure (CTS) by Katz, hit size effectiveness (HSE) by Bond and Varma and track core (TC) by Watt. Each model has been developed based on certain underlying mechanisms or phenomena, to permit interpretatio
APA, Harvard, Vancouver, ISO, and other styles
37

Dawson, Robert Edward. "Secure communications for critical infrastructure control systems." Queensland University of Technology, 2008. http://eprints.qut.edu.au/20710/.

Full text
Abstract:
In March 2000, 1 million litres of raw sewage was released into the water system of Maroochy Shire on Queensland’s sunshine coast. This environmental disaster was caused by a disgruntled ex-contractor using a radio transmitter to illicitly access the electronically controlled pumps in the control system. In 2007 CNN screened video footage of an experimental attack against a electrical generator. The attack caused the generator to shake and smoke, visually showing the damage caused by cyber attack. These attacks highlight the importance of securing the control systems which our critical infrast
APA, Harvard, Vancouver, ISO, and other styles
38

Chance, Christopher P. "Designing and implementing a network authentication service for providing a secure communication channel." Thesis, Kansas State University, 1986. http://hdl.handle.net/2097/9903.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Nisa, Claudia F., Jocelyn J. Bélanger, Daiane G. Faller, et al. "Lives versus Livelihoods? Perceived economic risk has a stronger association with support for COVID-19 preventive measures than perceived health risk." Nature Research, 2021. http://hdl.handle.net/10757/657340.

Full text
Abstract:
This paper examines whether compliance with COVID-19 mitigation measures is motivated by wanting to save lives or save the economy (or both), and which implications this carries to fight the pandemic. National representative samples were collected from 24 countries (N = 25,435). The main predictors were (1) perceived risk to contract coronavirus, (2) perceived risk to suffer economic losses due to coronavirus, and (3) their interaction effect. Individual and country-level variables were added as covariates in multilevel regression models. We examined compliance with various preventive health b
APA, Harvard, Vancouver, ISO, and other styles
40

Shade, Molly. "The Burner Project: Privacy and Social Control in a Networked World." Thesis, University of North Texas, 2015. https://digital.library.unt.edu/ark:/67531/metadc801891/.

Full text
Abstract:
As mobile phones become increasingly ubiquitous in today’s world, academic and public audiences alike are curious about the interaction between mobile technologies and social norms. To investigate this phenomenon, I examined how individuals use technology to actively manage their communication behaviors. Through a three-month research project on usage patterns of Burner, a mobile application, this thesis explores the relationships among technology, culture, and privacy. Burner is a service that equips individuals with the means to create, maintain, and/or dissolve social ties by providing temp
APA, Harvard, Vancouver, ISO, and other styles
41

Gerber, Tian Johannes. "VoIP : a corporate governance approach to avoid the risk of civil liability." Thesis, Nelson Mandela Metropolitan University, 2012. http://hdl.handle.net/10948/d1016272.

Full text
Abstract:
Since the deregulation of Voice over Internet Protocol (VoIP) in 2005, many South African organizations are now attempting to leverage its cost saving and competitive values. However, it has been recently cited that VoIP is one of the greatest new risks to organizations and this risk is cited to increase Information Security insurance premiums in the near future. Due to the dynamic nature of the VoIP technology, regulatory and legislative concerns such as lawful interception of communications and privacy may also contribute to business risk. In order to leverage value from the VoIP implementat
APA, Harvard, Vancouver, ISO, and other styles
42

Gwaka, Leon Tinashe. "Social media risks in large and medium enterprises in the Cape Metropole : the role of internal auditors." Thesis, Cape Peninisula University of Technology, 2015. http://hdl.handle.net/20.500.11838/2086.

Full text
Abstract:
Thesis (MTech (Internal Auditing))--Cape Peninsula University of Technology, 2015.<br>Social media has undoubtedly emerged as one of the greatest developments in this technology driven generation. Despite its existence from years back, social media popularity has recently surged drastically, with billions of users worldwide reported to be on at least one social media platform. This increase in users of social media has further been necessitated by governmental and private-sector initiatives to boost Internet connectivity to bridge the digital divide globally. Mobile Internet access has also f
APA, Harvard, Vancouver, ISO, and other styles
43

Sahd, Lize-Marie. "A structured approach to the identification of the significant risks related to enterprise mobile solutions at a mobile technology component level." Thesis, Stellenbosch : Stellenbosch University, 2015. http://hdl.handle.net/10019.1/96674.

Full text
Abstract:
Thesis (MComm)--Stellenbosch University, 2015.<br>ENGLISH ABSTRACT: The consumerisation of mobile technology is driving the mobile revolution and enterprises are forced to incorporate mobile solutions into their business processes in order to remain competitive. While there are many benefits relating to the investment in and use of mobile technology, significant risks are also being introduced into the business. The fast pace of technological innovation and the rate of adoption of mobile technology by employees has, however, created an environment where enterprises are deploying mobile s
APA, Harvard, Vancouver, ISO, and other styles
44

Ramirez, Christina M. "Water security and its importance in protecting public health." Scholarly Commons, 2012. https://scholarlycommons.pacific.edu/uop_etds/820.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Kamongi, Patrick. "Ontology Based Security Threat Assessment and Mitigation for Cloud Systems." Thesis, University of North Texas, 2018. https://digital.library.unt.edu/ark:/67531/metadc1404576/.

Full text
Abstract:
A malicious actor often relies on security vulnerabilities of IT systems to launch a cyber attack. Most cloud services are supported by an orchestration of large and complex systems which are prone to vulnerabilities, making threat assessment very challenging. In this research, I developed formal and practical ontology-based techniques that enable automated evaluation of a cloud system's security threats. I use an architecture for threat assessment of cloud systems that leverages a dynamically generated ontology knowledge base. I created an ontology model and represented the components of a cl
APA, Harvard, Vancouver, ISO, and other styles
46

Ncube, Lashias. "Campus policing : an ethnography of the University of Cape Town Campus Control Unit." Master's thesis, University of Cape Town, 1996. http://hdl.handle.net/11427/17205.

Full text
Abstract:
Includes bibliography.<br>The aim of undertaking the project was to investigate the activities of the University of Cape Town Campus Control unit. The study is based on the premise that there is an underestimation of Campus Control work. A number of basic questions were examined in the field. The researcher sought to determine, among other things, the extent to which the unit's work is invisible, and the extent to which the university community's reported ambivalence and indifference to Campus Control practice a result of a lack of clarity regarding the role of the unit within the university.
APA, Harvard, Vancouver, ISO, and other styles
47

Wei, Jinpeng. "Improving operating systems security two case studies /." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2009. http://hdl.handle.net/1853/31849.

Full text
Abstract:
Thesis (Ph.D)--Computing, Georgia Institute of Technology, 2010.<br>Committee Chair: Pu, Calton; Committee Member: Ahamad, Mustaque; Committee Member: Blough, Douglas; Committee Member: Giffin, Jonathon; Committee Member: Li, Kang. Part of the SMARTech Electronic Thesis and Dissertation Collection.
APA, Harvard, Vancouver, ISO, and other styles
48

Perelson, Stephen. "SoDA : a model for the administration of separation of duty requirements in workflow systems." Thesis, Port Elizabeth Technikon, 2001. http://hdl.handle.net/10948/68.

Full text
Abstract:
The increasing reliance on information technology to support business processes has emphasised the need for information security mechanisms. This, however, has resulted in an ever-increasing workload in terms of security administration. Security administration encompasses the activity of ensuring the correct enforcement of access control within an organisation. Access rights and their allocation are dictated by the security policies within an organisation. As such, security administration can be seen as a policybased approach. Policy-based approaches promise to lighten the workload of security
APA, Harvard, Vancouver, ISO, and other styles
49

Nayak, Ankur Kumar. "Flexible access control for campus and enterprise networks." Thesis, Georgia Institute of Technology, 2010. http://hdl.handle.net/1853/33813.

Full text
Abstract:
We consider the problem of designing enterprise network security systems which are easy to manage, robust and flexible. This problem is challenging. Today, most approaches rely on host security, middleboxes, and complex interactions between many protocols. To solve this problem, we explore how new programmable networking paradigms can facilitate fine-grained network control. We present Resonance, a system for securing enterprise networks , where the network elements themselves en- force dynamic access control policies through state changes based on both flow-level information and real-time
APA, Harvard, Vancouver, ISO, and other styles
50

Timofejevaitė, Raminta. "Socialinės apsaugos priemonės nedarbo rizikos atveju: Lietuvos ir užsienio valstybių patirtis." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2014. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2012~D_20140627_180528-10323.

Full text
Abstract:
Šiame darbe nagrinėjamas socialinės apsaugos priemonių nedarbo rizikos atveju taikymas. Atskleidžiama nedarbo, kaip socialinės rizikos, samprata ir neigiama įtaka valstybės ekonominei raidai ir gerovei. Apžvelgiamas valstybės garantuojamos socialinės apsaugos nedarbo atveju teisinis reguliavimas Lietuvos Respublikos ir tarptautiniuose teisės aktuose. Aptariami šio instituto teisinio reglamentavimo trūkumai. Darbe analizuojama ne tik Lietuvos, bet ir užsienio valstybių patirtis taikant socialinės apsaugos priemones nedarbo rizikos atveju. Remiantis Statistikos depatamento pateiktais 2010-2011 m
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!