Dissertations / Theses on the topic 'Security risk management approach'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Security risk management approach.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Consolini, Todd. "Regional security assessments a strategic approach to securing federal facilities /." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Dec/09Dec%5FConsolini.pdf.
Full textHomer, John. "A comprehensive approach to enterprise network security management." Diss., Manhattan, Kan. : Kansas State University, 2009. http://hdl.handle.net/2097/1372.
Full textCarlsson, Elin, and Moa Mattsson. "The MaRiQ model: A quantitative approach to risk management." Thesis, Uppsala universitet, Avdelningen för datalogi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-385257.
Full textFagade, Tesleem. "A multi-domain approach for security compliance, insider threat modelling and risk management." Thesis, University of Bristol, 2018. http://hdl.handle.net/1983/c7461605-6493-4413-8835-65847df90a57.
Full textKailay, Muninder Pal. "A qualitative approach to computer security risk analysis and management for the commercial sector." Thesis, University of Birmingham, 1995. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.487431.
Full textJackson, David P. "Intelligence-led risk management for homeland security: a collaborative approach for a common goal." Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/10624.
Full textBriouig, Mohamed. "Risk management in liquefied natural gas ports and marine terminals supply chains." Thesis, University of Plymouth, 2014. http://hdl.handle.net/10026.1/3013.
Full textLundberg, Johan. "Dynamic Risk Management in Information Security : A socio-technical approach to mitigate cyber threats in the financial sector." Thesis, Örebro universitet, Handelshögskolan vid Örebro Universitet, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-87359.
Full textHart, Jeremy. "A systems-based approach to integrating security risk management into the management practice & culture of a global multi-national organisation." Thesis, Middlesex University, 2018. http://eprints.mdx.ac.uk/25956/.
Full textSalim, Hamid M. "Cyber safety : a systems thinking and systems theory approach to managing cyber security risks." Thesis, Massachusetts Institute of Technology, 2014. http://hdl.handle.net/1721.1/90804.
Full textSahd, Lize-Marie. "A structured approach to the identification of the significant risks related to enterprise mobile solutions at a mobile technology component level." Thesis, Stellenbosch : Stellenbosch University, 2015. http://hdl.handle.net/10019.1/96674.
Full textThompson, Gabriela. "For effect or affect? : UK defence change : management." Thesis, University of Roehampton, 2017. https://pure.roehampton.ac.uk/portal/en/studentthesis/for-effect-or-affect-uk-defence-change-management(a766fe2c-307b-41c6-97f6-ae2d4d469477).html.
Full textKoudela, Radek. "Hodnocení přístupů k analýze bezpečnostních rizik." Master's thesis, Vysoká škola ekonomická v Praze, 2010. http://www.nusl.cz/ntk/nusl-85251.
Full textBou, Nassar Pascal. "Gestion de la sécurité dans une infrastructure de services dynamique : Une approche par gestion des risques." Phd thesis, INSA de Lyon, 2012. http://tel.archives-ouvertes.fr/tel-00828598.
Full textRastogi, Rahul. "Information security service management : a service management approach to information security management." Thesis, Nelson Mandela Metropolitan University, 2011. http://hdl.handle.net/10948/1389.
Full textDixon, David D. "Leveraging knowledge management tools to support security risk management in the Homeland Security." Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/10593.
Full textCho, Sungback. "Risk analysis and management for information security." Thesis, Royal Holloway, University of London, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.404796.
Full textOgbanufe, Obiageli. "Three Essays on Information Security Risk Management." Thesis, University of North Texas, 2018. https://digital.library.unt.edu/ark:/67531/metadc1157576/.
Full textHayat, Mohammed Zia. "Information Security Risk Management for Ubiquitous Computing." Thesis, University of Southampton, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.484894.
Full textFontoura, Lisandra Manzoni. "PRiMA : project risk management approach." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2006. http://hdl.handle.net/10183/6947.
Full textHasenstab, Alexander Nikolaus. "The thoughtful security practitioner : exploring reflective practice in security risk management." Thesis, University of Portsmouth, 2017. https://researchportal.port.ac.uk/portal/en/theses/the-thoughtful-security-practitioner(f78f3e97-0672-4b47-9633-3e18534db101).html.
Full textBakhsh, Kelarestaghi Kaveh. "A Risk Based Approach to Intelligent Transportation Systems Security." Diss., Virginia Tech, 2019. http://hdl.handle.net/10919/91421.
Full textCheang, Sek Lam. "Electronic commerce and security : risk identification and management." Thesis, University of Macau, 2001. http://umaclib3.umac.mo/record=b1636215.
Full textTalas, Risto Henrik Aleksander. "The efficient relationship between residual security risk and security investment for maritime port facilities." Thesis, City University London, 2010. http://openaccess.city.ac.uk/8730/.
Full textMartins, Sofia Alexandra Casanova. "ANA, SA: a risk management approach." Master's thesis, NSBE - UNL, 2010. http://hdl.handle.net/10362/10335.
Full textFisher, Sara K. "Justice secured implementing a risk-based approach to court security /." Thesis, Monterey, Calif. : Naval Postgraduate School, 2008. http://bosun.nps.edu/uhtbin/hyperion-image.exe/08Mar%5FFisher.pdf.
Full textArmstrong, Helen L. "A soft approach to management of information security." Curtin University of Technology, School of Public Health, 1999. http://espace.library.curtin.edu.au:80/R/?func=dbin-jump-full&object_id=10235.
Full textMeyers, Tommey H. "Safety risk management for Homeland Defense and Security responders." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FMeyers.pdf.
Full textXiao, Fei. "Risk based multi-objective security control and congestion management." [Ames, Iowa : Iowa State University], 2007.
Find full textMetaparti, Satya Prakash. "Risk management initiatives for post 9/11 maritime security." Thesis, Click to view the E-thesis via HKUTO, 2009. http://sunzi.lib.hku.hk/hkuto/record/B42841859.
Full textBrownsword, Michael J. "Formalised approach to the management of risk." Thesis, Cardiff University, 2009. http://orca.cf.ac.uk/54845/.
Full textBenjamin, Nicolas James. "A systematic approach to enterprise risk management." Thesis, Stellenbosch : Stellenbosch University, 2015. http://hdl.handle.net/10019.1/96939.
Full textTeklitz, Allen. "Reliability Approach to Risk Management in Watersheds." University of Cincinnati / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1460729370.
Full textMoe, Lwin P. "Cyber security risk analysis framework : network traffic anomaly detection." Thesis, Massachusetts Institute of Technology, 2018. http://hdl.handle.net/1721.1/118536.
Full textShedden, Jason Patrick. "A qualitative approach to financial risk." Pretoria : [s.n.], 2006. http://upetd.up.ac.za/thesis/available/etd-05092007-152751.
Full textVasilevskaya, Maria. "Security in Embedded Systems : A Model-Based Approach with Risk Metrics." Doctoral thesis, Linköpings universitet, Institutionen för datavetenskap, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-122149.
Full textLiwång, Hans, Jonas W. Ringsberg, and Martin Norsell. "Quantitative risk analysis : Ship security analysis for effective risk control options." Försvarshögskolan, Militärtekniska avdelningen (MTA), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-3800.
Full textFarahmand, Fariborz. "Developing a Risk Management System for Information Systems Security Incidents." Diss., Georgia Institute of Technology, 2004. http://hdl.handle.net/1853/7600.
Full textPaczkowski, John P. "Risk management as strategic change in national homeland security policy." Thesis, Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion-image.exe/07Sep%5FPaczkowski.pdf.
Full textByström, Sten, and Andreas Pierre. "Risk Management in the bidding context A Schedule Risk Analysis Approach." Thesis, Linköping University, Department of Management and Economics, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1703.
Full textLategan, Neil. "Epirismm: an enterprise information risk management model." Thesis, Nelson Mandela Metropolitan University, 2006. http://hdl.handle.net/10948/541.
Full textBurd, Elizabeth L. "Reuse with risk management : a decision support approach." Thesis, University of York, 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.247526.
Full textElmrabit, Nebrase. "A multiple-perspective approach for insider-threat risk prediction in cyber-security." Thesis, Loughborough University, 2018. https://dspace.lboro.ac.uk/2134/36243.
Full textHe, Ying. "Generic security templates for information system security arguments : mapping security arguments within healthcare systems." Thesis, University of Glasgow, 2014. http://theses.gla.ac.uk/5773/.
Full textWolfram, Raphael. "Commercial real estate price risk A risk management approach using capital markets /." St. Gallen, 2007. http://www.biblio.unisg.ch/org/biblio/edoc.nsf/wwwDisplayIdentifier/01666379002/$FILE/01666379002.pdf.
Full textPonenti, Albert M. "An integrative risk management/governance framework for homeland security decision making." Thesis, Monterey, Calif. : Naval Postgraduate School, 2008. http://bosun.nps.edu/uhtbin/hyperion-image.exe/08Mar%5FPonenti.pdf.
Full textLarrimore, Nancy Page. "Risk Management Strategies to Prevent and Mitigate Emerging Operational Security Threats." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/4866.
Full textHolmstedt, Malena. "Social Media Risk Management : and the impact on organization IT security." Thesis, Luleå tekniska universitet, Digitala tjänster och system, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-79296.
Full textLee, Jae Hyung S. M. Massachusetts Institute of Technology. "Systematic approach to analyzing security and vulnerabilities of blockchain systems." Thesis, Massachusetts Institute of Technology, 2019. https://hdl.handle.net/1721.1/121793.
Full textLeloudas, Georgios. "Legal aspects of aviation risk management." Thesis, McGill University, 2003. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=80937.
Full text