To see the other types of publications on this topic, follow the link: Security risk management approach.

Dissertations / Theses on the topic 'Security risk management approach'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Security risk management approach.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Consolini, Todd. "Regional security assessments a strategic approach to securing federal facilities /." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Dec/09Dec%5FConsolini.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, December 2009.<br>Thesis Advisor(s): Rollins, John. Second Reader: Darken, Rudy. "December 2009." Description based on title screen as viewed on January 26, 2010. Author(s) subject terms: Federal Protective Service, policy option analysis, critical infrastructure and key resources (CI/KR), interdependency, facility security level, government facilities sector, National Infrastructure Protection Plan (NIPP), risk management. Includes bibliographical references (p. 81-83). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
2

Homer, John. "A comprehensive approach to enterprise network security management." Diss., Manhattan, Kan. : Kansas State University, 2009. http://hdl.handle.net/2097/1372.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Carlsson, Elin, and Moa Mattsson. "The MaRiQ model: A quantitative approach to risk management." Thesis, Uppsala universitet, Avdelningen för datalogi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-385257.

Full text
Abstract:
In recent years, cyber attacks and data fraud have become major issues to companies, businesses and nation states alike. The need for more accurate and reliable risk management models is therefore substantial. Today, cybersecurity risk management is often carried out on a qualitative basis, where risks are evaluated to a predefined set of categories such as low, medium or high. This thesis aims to challenge that practice, by presenting a model that quantitatively assesses risks - therefore named MaRiQ (Manage Risks Quantitatively). MaRiQ was developed based on collected requirements and contem
APA, Harvard, Vancouver, ISO, and other styles
4

Fagade, Tesleem. "A multi-domain approach for security compliance, insider threat modelling and risk management." Thesis, University of Bristol, 2018. http://hdl.handle.net/1983/c7461605-6493-4413-8835-65847df90a57.

Full text
Abstract:
Information security is fundamentally concerned with the confidentiality, integrity and availability of information assets at all times. However, given the ubiquitous nature of information systems and organisations’ growing reliance on large-scale interconnected networks;, it means that the prevalence and impact of cyber-attacks will continue to rise. The problem of cybersecurity risks management in corporate organisations is non-trivial, hence, constructing tools that truly satisfy the holistic management of information security is difficult and not readily available. The work described in th
APA, Harvard, Vancouver, ISO, and other styles
5

Kailay, Muninder Pal. "A qualitative approach to computer security risk analysis and management for the commercial sector." Thesis, University of Birmingham, 1995. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.487431.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jackson, David P. "Intelligence-led risk management for homeland security: a collaborative approach for a common goal." Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/10624.

Full text
Abstract:
CHDS State/Local<br>The concept of risk management provides the foundation of the homeland security enterprise. The United States of America faces numerous complex risks ranging from a series of natural hazards, pandemic disease, technological hazards, transnational criminal enterprises and acts of terrorism perpetrated by intelligent adversaries. The management of these risks requires a strategic collaborative effort from the intelligence and risk analysis communities and many stakeholders at all levels of government, including the private sector. Paradoxically, a decentralized collaborative
APA, Harvard, Vancouver, ISO, and other styles
7

Briouig, Mohamed. "Risk management in liquefied natural gas ports and marine terminals supply chains." Thesis, University of Plymouth, 2014. http://hdl.handle.net/10026.1/3013.

Full text
Abstract:
Due to its environmental attributes, Liquefied Natural Gas (LNG) as a clean fossil fuel source of energy has witnessed a steady increase in demand worldwide over the last decade. This increase is mainly attributed to higher demand from the power generation sector as well as from domestic and industrial usages .This growing role of LNG among competing energy sources has raised concerns over the safety and security of the LNG chain of production, transport and distribution and its related infrastructure. Within this context, LNG ports and marine terminals, being strategically located at the mids
APA, Harvard, Vancouver, ISO, and other styles
8

Lundberg, Johan. "Dynamic Risk Management in Information Security : A socio-technical approach to mitigate cyber threats in the financial sector." Thesis, Örebro universitet, Handelshögskolan vid Örebro Universitet, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-87359.

Full text
Abstract:
In the last decade, a new wave of socio-technical cyber threats has emerged that is targeting both the technical and social vulnerabilities of organizations and requires fast and efficient threat mitigations. Yet, it is still common that financial organizations rely on yearly reviewed risk management methodologies that are slow and static to mitigate the ever-changing cyber threats. The purpose of this research is to explore the field of Dynamic Risk Management in Information Security from a socio-technical perspective in order to mitigate both types of threats faster and dynamically to better
APA, Harvard, Vancouver, ISO, and other styles
9

Hart, Jeremy. "A systems-based approach to integrating security risk management into the management practice & culture of a global multi-national organisation." Thesis, Middlesex University, 2018. http://eprints.mdx.ac.uk/25956/.

Full text
Abstract:
I work in the Corporate Security department of a global multi-national company that operates a wide range of businesses in many complex and turbulent environments, including developing countries and those recovering from conflict or similar strife. To help deliver the best level of protection for people, assets and business processes, my project sought to find an innovative, cost-effective and non-disruptive approach to integrating security risk management into the mainstream management practice and culture of my organisation. The solution needed to be responsive both to global corporate polic
APA, Harvard, Vancouver, ISO, and other styles
10

Salim, Hamid M. "Cyber safety : a systems thinking and systems theory approach to managing cyber security risks." Thesis, Massachusetts Institute of Technology, 2014. http://hdl.handle.net/1721.1/90804.

Full text
Abstract:
Thesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, Engineering Systems Division, System Design and Management Program, 2014.<br>Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2014.<br>93<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (pages 148-156).<br>If we are to manage cyber security risks more effectively in today's complex and dynamic Web 2.0 environment, then a new way of thinking is needed to complement traditional approaches. According to Symantec's 2014 In
APA, Harvard, Vancouver, ISO, and other styles
11

Sahd, Lize-Marie. "A structured approach to the identification of the significant risks related to enterprise mobile solutions at a mobile technology component level." Thesis, Stellenbosch : Stellenbosch University, 2015. http://hdl.handle.net/10019.1/96674.

Full text
Abstract:
Thesis (MComm)--Stellenbosch University, 2015.<br>ENGLISH ABSTRACT: The consumerisation of mobile technology is driving the mobile revolution and enterprises are forced to incorporate mobile solutions into their business processes in order to remain competitive. While there are many benefits relating to the investment in and use of mobile technology, significant risks are also being introduced into the business. The fast pace of technological innovation and the rate of adoption of mobile technology by employees has, however, created an environment where enterprises are deploying mobile s
APA, Harvard, Vancouver, ISO, and other styles
12

Thompson, Gabriela. "For effect or affect? : UK defence change : management." Thesis, University of Roehampton, 2017. https://pure.roehampton.ac.uk/portal/en/studentthesis/for-effect-or-affect-uk-defence-change-management(a766fe2c-307b-41c6-97f6-ae2d4d469477).html.

Full text
Abstract:
This thesis is a critical examination of the UK defence discourse. It is an exploration of the dominant explanation of defence in the UK in 2015, as evidenced by the artefacts of the discourse - most importantly, by the voices of those within the community. In doing so, this thesis seeks to challenge the notion that there is only one right way to manage and judge the notion of defence, highlighting the cultural and contextual dependence of such ideas, and the dangers which arise from it. In asking the simple question what is defence? I have aimed at identifying the references and experiences,
APA, Harvard, Vancouver, ISO, and other styles
13

Koudela, Radek. "Hodnocení přístupů k analýze bezpečnostních rizik." Master's thesis, Vysoká škola ekonomická v Praze, 2010. http://www.nusl.cz/ntk/nusl-85251.

Full text
Abstract:
Risk management is a process through which organizations are methodically devoted to the risks associated with their activities in order to get the biggest benefit from their business. It is also a rapidly developing field, where there is a variety of different approaches, methods, methodologies and standards in which may be little confusing. Therefore, this work offers a comprehensive and systematic view on the issue of risk analysis and management. Risk analysis is a cornerstone for effective security management of each company used for identification, description and quantification of risks
APA, Harvard, Vancouver, ISO, and other styles
14

Bou, Nassar Pascal. "Gestion de la sécurité dans une infrastructure de services dynamique : Une approche par gestion des risques." Phd thesis, INSA de Lyon, 2012. http://tel.archives-ouvertes.fr/tel-00828598.

Full text
Abstract:
Les changements de contexte économiques imposent de nouvelles stratégies organisationnelles aux entreprises : recentrages métier et développement de stratégies de collaboration interentreprises. Ces tendances du marché laissent prévoir une croissance exponentielle d'écosystèmes de service accessibles à la fois aux clients finaux et aux partenaires. Tout laisse prévoir que ces écosystèmes s'appuieront largement sur les architectures orientées services permettant de construire des systèmes d'information capable d'avoir l'agilité requise et de supporter l'interconnexion des processus métier colla
APA, Harvard, Vancouver, ISO, and other styles
15

Rastogi, Rahul. "Information security service management : a service management approach to information security management." Thesis, Nelson Mandela Metropolitan University, 2011. http://hdl.handle.net/10948/1389.

Full text
Abstract:
In today’s world, information and the associated Information Technology are critical assets for many organizations. Any information security breach, or compromise of these assets, can lead to serious implications for organizations that are heavily dependent on these assets. For such organizations, information security becomes vital. Organizations deploy an information security infrastructure for protecting their information assets. This infrastructure consists of policies and controls. Organizations also create an information security management system for managing information security in the
APA, Harvard, Vancouver, ISO, and other styles
16

Dixon, David D. "Leveraging knowledge management tools to support security risk management in the Homeland Security." Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/10593.

Full text
Abstract:
CHDS State/Local<br>This thesis examines Knowledge Management (KM) initiatives at the Canadian Institutes of Health Research (CIHR), the United Kingdom (UK), and the National Aeronautics and Space Administration (NASA). The first goal was to identify existing KM approaches that would foster higher levels of knowledge sharing and collaboration among security risk management practitioners within Homeland Security (DHS) agencies to enhance risk-informed decision-making activities. Through the analysis of the three case studies, it was discovered that organizational culture, more than any particu
APA, Harvard, Vancouver, ISO, and other styles
17

Cho, Sungback. "Risk analysis and management for information security." Thesis, Royal Holloway, University of London, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.404796.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Ogbanufe, Obiageli. "Three Essays on Information Security Risk Management." Thesis, University of North Texas, 2018. https://digital.library.unt.edu/ark:/67531/metadc1157576/.

Full text
Abstract:
Today's environment is filled with the proliferation of cyber-attacks that result in losses for organizations and individuals. Hackers often use compromised websites to distribute malware, making it difficult for individuals to detect. The impact of clicking through a link on the Internet that is malware infected can result in consequences such as private information theft and identity theft. Hackers are also known to perpetrate cyber-attacks that result in organizational security breaches that adversely affect organizations' finances, reputation, and market value. Risk management approaches f
APA, Harvard, Vancouver, ISO, and other styles
19

Hayat, Mohammed Zia. "Information Security Risk Management for Ubiquitous Computing." Thesis, University of Southampton, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.484894.

Full text
Abstract:
The potential for rapid and diverse interconnectivity between devices utilising heterogeneous communications interfaces has enabled a truly ubiquitous computing environment. However this has resulted in equally ubiquitous security risks due principally to . the number and complexity of services being run over such networks. As technology advances towards the realisation of a ubiquitous computing environment, what impact does this have on the need to preserve the key information security requirements of: confidentiality: integrity and availability? And how does this influence, future informatio
APA, Harvard, Vancouver, ISO, and other styles
20

Fontoura, Lisandra Manzoni. "PRiMA : project risk management approach." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2006. http://hdl.handle.net/10183/6947.

Full text
Abstract:
Esta tese propõe uma abordagem sistemática para gerenciar riscos em projetos de software, por meio da adaptação de processos. O objetivo da abordagem é permitir a elaboração de um processo específico para um dado projeto, visando minimizar a exposição do projeto aos riscos, identificados de acordo com o contexto do projeto. As atividades, possíveis de serem executadas em processos de projetos de uma organização, são estruturadas em um framework de processo (PRiMA-F), que inclui também os padrões de processo e organizacionais usados para descrever ações preventivas e corretivas aos riscos. A es
APA, Harvard, Vancouver, ISO, and other styles
21

Hasenstab, Alexander Nikolaus. "The thoughtful security practitioner : exploring reflective practice in security risk management." Thesis, University of Portsmouth, 2017. https://researchportal.port.ac.uk/portal/en/theses/the-thoughtful-security-practitioner(f78f3e97-0672-4b47-9633-3e18534db101).html.

Full text
Abstract:
Security risk management is a young, rapidly growing and multifaceted occupation that is concerned with managing internal and external threats to organisations. The occupation is also known and frequently referred to as “corporate security”, “security management” or “in-house security”. Security risk management is part of the private security domain and contributes to the overall security architecture. Reflective practice is a learning tool, which aims to facilitate professional practice and learning by way of conscious cognitive action focusing on professional practice related issues. It is m
APA, Harvard, Vancouver, ISO, and other styles
22

Bakhsh, Kelarestaghi Kaveh. "A Risk Based Approach to Intelligent Transportation Systems Security." Diss., Virginia Tech, 2019. http://hdl.handle.net/10919/91421.

Full text
Abstract:
Security threats to cyber-physical systems are targeting institutions and infrastructure around the world, and the frequency and severity of attacks are on the rise. Healthcare manufacturing, financial services, education, government, and transportation are among the industries that are the most lucrative targets for adversaries. Hacking is not just about companies, organizations, or banks; it also includes critical infrastructure. Wireless Sensors Networks, Vehicle-to-everything communication (V2X), Dynamic Message Signs (DMS), and Traffic Signal Controllers are among major Intelligent Transp
APA, Harvard, Vancouver, ISO, and other styles
23

Cheang, Sek Lam. "Electronic commerce and security : risk identification and management." Thesis, University of Macau, 2001. http://umaclib3.umac.mo/record=b1636215.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Talas, Risto Henrik Aleksander. "The efficient relationship between residual security risk and security investment for maritime port facilities." Thesis, City University London, 2010. http://openaccess.city.ac.uk/8730/.

Full text
Abstract:
The research employs an adaptive cross-disciplinary research strategy in an industrial example to address port facilities’ inability to assess whether their security systems are efficient. The research combines a twin-pronged approach of first, adapting Markowitz (1952) theory of portfolio selection from the field of finance to maritime port security to examine each port facility’s security systems as a portfolio; and secondly, through portfolio optimization to construct the optimum theoretical portfolio of security systems drawn from a number of different port facilities owned by Dubai Ports
APA, Harvard, Vancouver, ISO, and other styles
25

Martins, Sofia Alexandra Casanova. "ANA, SA: a risk management approach." Master's thesis, NSBE - UNL, 2010. http://hdl.handle.net/10362/10335.

Full text
Abstract:
A Work Project, presented as part of the requirements for the Award of a Masters Degree in Finance from the NOVA – School of Business and Economics<br>In 2007, following a series of sector transformations and wanting to be up to speed on industry best practices, ANA – Aeroportos de Portugal, SA, the Portuguese airports manager, adopts an Enterprise Risk Management (ERM) model. In 2009, with a challenging new regulatory model in sight and the idea of an imminent privatization, the company reassesses and restructures the model. This case study follows this transition process, the implementation
APA, Harvard, Vancouver, ISO, and other styles
26

Fisher, Sara K. "Justice secured implementing a risk-based approach to court security /." Thesis, Monterey, Calif. : Naval Postgraduate School, 2008. http://bosun.nps.edu/uhtbin/hyperion-image.exe/08Mar%5FFisher.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, March 2008.<br>Thesis Advisor(s): Bergin, Richard ; Josefek, Robert "March 2008." Description based on title screen as viewed on April 30, 2008. Includes bibliographical references (p. 103-105). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
27

Armstrong, Helen L. "A soft approach to management of information security." Curtin University of Technology, School of Public Health, 1999. http://espace.library.curtin.edu.au:80/R/?func=dbin-jump-full&object_id=10235.

Full text
Abstract:
The key theme of this research is the planning and management of information security and in particular, the research focuses on the involvement of information stakeholders in this process. The main objective of the research is to study the ownership of, and acceptance of responsibility for, information security measures by stakeholders having an interest in that information.
APA, Harvard, Vancouver, ISO, and other styles
28

Meyers, Tommey H. "Safety risk management for Homeland Defense and Security responders." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FMeyers.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, September 2005.<br>Thesis Advisor(s): Paul Pitman. Includes bibliographical references (p.55-59). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
29

Xiao, Fei. "Risk based multi-objective security control and congestion management." [Ames, Iowa : Iowa State University], 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Metaparti, Satya Prakash. "Risk management initiatives for post 9/11 maritime security." Thesis, Click to view the E-thesis via HKUTO, 2009. http://sunzi.lib.hku.hk/hkuto/record/B42841859.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Brownsword, Michael J. "Formalised approach to the management of risk." Thesis, Cardiff University, 2009. http://orca.cf.ac.uk/54845/.

Full text
Abstract:
Taking a pragmatic, systems engineering approach, this thesis identifies a number of fundamental issues that presently arise in risk management, primarily as a result of the overly complex and somewhat outdated approach conventionally taken in process definition and a lack of coherence within the current risk management vocabulary. It is suggested that many recent developments in systems engineering have largely been ignored by the risk management community. The objective of this work is to develop a formalised approach to the management of risk using a model based approach this will enable a
APA, Harvard, Vancouver, ISO, and other styles
32

Benjamin, Nicolas James. "A systematic approach to enterprise risk management." Thesis, Stellenbosch : Stellenbosch University, 2015. http://hdl.handle.net/10019.1/96939.

Full text
Abstract:
Thesis (MEng)--Stellenbosch University, 2015.<br>ENGLISH ABSTRACT: In the current economic climate where credit crises, fluctuating commodity prices, poor governance, rising unemployment and declining consumer spending exist, risk management is of utmost importance. Proclaiming the existence of a risk management strategy is not enough to ensure that an enterprise achieves its objectives. The implementation of a holistic enterprise-wide risk management framework is required in order to execute strategies and achieve objectives effectively and efficiently Two types of risk management have e
APA, Harvard, Vancouver, ISO, and other styles
33

Teklitz, Allen. "Reliability Approach to Risk Management in Watersheds." University of Cincinnati / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1460729370.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Moe, Lwin P. "Cyber security risk analysis framework : network traffic anomaly detection." Thesis, Massachusetts Institute of Technology, 2018. http://hdl.handle.net/1721.1/118536.

Full text
Abstract:
Thesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, System Design and Management Program, 2018.<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (pages 84-86).<br>Cybersecurity is a growing research area with direct commercial impact to organizations and companies in every industry. With all other technological advancements in the Internet of Things (IoT), mobile devices, cloud computing, 5G network, and artificial intelligence, the need for cybersecurity is more critical than ever before. These technologies drive the need for tight
APA, Harvard, Vancouver, ISO, and other styles
35

Shedden, Jason Patrick. "A qualitative approach to financial risk." Pretoria : [s.n.], 2006. http://upetd.up.ac.za/thesis/available/etd-05092007-152751.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Vasilevskaya, Maria. "Security in Embedded Systems : A Model-Based Approach with Risk Metrics." Doctoral thesis, Linköpings universitet, Institutionen för datavetenskap, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-122149.

Full text
Abstract:
The increasing prevalence of embedded devices and a boost in sophisticated attacks against them make embedded system security an intricate and pressing issue. New approaches to support the development of security-enhanced systems need to be explored. We realise that efficient transfer of knowledge from security experts to embedded system engineers is vitally important, but hardly achievable in current practice. This thesis proposes a Security-Enhanced Embedded system Design (SEED) approach, which is a set of concepts, methods, and processes that together aim at addressing this challenge of bri
APA, Harvard, Vancouver, ISO, and other styles
37

Liwång, Hans, Jonas W. Ringsberg, and Martin Norsell. "Quantitative risk analysis : Ship security analysis for effective risk control options." Försvarshögskolan, Militärtekniska avdelningen (MTA), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-3800.

Full text
Abstract:
This study reviews ship security assessment. The objectives are to explore the possibilities for quantifying and performing a more thorough ship security risk analysis than that described in the International Ship and Port Facility Security code and to evaluate to what extent this more detailed analysis increases ship security and facilitate the effective selection of risk control options. The study focuses on Somali-based maritime piracy, using piracy on the Indian Ocean as a case study. Data are collected using questionnaires and interviews with civilian and military security experts who pos
APA, Harvard, Vancouver, ISO, and other styles
38

Farahmand, Fariborz. "Developing a Risk Management System for Information Systems Security Incidents." Diss., Georgia Institute of Technology, 2004. http://hdl.handle.net/1853/7600.

Full text
Abstract:
The Internet and information systems have enabled businesses to reduce costs, attain greater market reach, and develop closer business partnerships along with improved customer relationships. However, using the Internet has led to new risks and concerns. This research provides a management perspective on the issues confronting CIOs and IT managers. It outlines the current state of the art of information security, the important issues confronting managers, security enforcement measure/techniques, and potential threats and attacks. It develops a model for classification of threats and control me
APA, Harvard, Vancouver, ISO, and other styles
39

Paczkowski, John P. "Risk management as strategic change in national homeland security policy." Thesis, Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion-image.exe/07Sep%5FPaczkowski.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, September 2007.<br>Thesis Advisor(s): Bach, Robert. "September 2007." Description based on title screen as viewed on October 23, 2007. Includes bibliographical references (p. 165-178). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
40

Byström, Sten, and Andreas Pierre. "Risk Management in the bidding context A Schedule Risk Analysis Approach." Thesis, Linköping University, Department of Management and Economics, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1703.

Full text
Abstract:
<p>Risk Management has emerged during the last decades and is now considered an indispensable component in management of projects. However, no attention has been directed towards Risk management in the bidding context. Uncertainties, but also the opportunities to affect project success, are extremely high during this phase. The purpose of this thesis has been to design a schedule risk analysis method with supporting methodology based on current research and to verify its usefulness in a business environment. We have conducted a case study at the Business Unit Gripen (BUG) subdivision of SAAB A
APA, Harvard, Vancouver, ISO, and other styles
41

Lategan, Neil. "Epirismm: an enterprise information risk management model." Thesis, Nelson Mandela Metropolitan University, 2006. http://hdl.handle.net/10948/541.

Full text
Abstract:
Today, information is considered a commodity and no enterprise can operate without it. Indeed, the information and the supporting technology are pivotal in all enterprises. However, a major problem being experienced in the business environment is that enterprise risk cannot be managed effectively because business and information-related risk are not congruently aligned with risk management terminology and practices. The business environment and information technology are bound together by information. For this reason, it is imperative that risk management is synergised in the business, ICT (In
APA, Harvard, Vancouver, ISO, and other styles
42

Burd, Elizabeth L. "Reuse with risk management : a decision support approach." Thesis, University of York, 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.247526.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Elmrabit, Nebrase. "A multiple-perspective approach for insider-threat risk prediction in cyber-security." Thesis, Loughborough University, 2018. https://dspace.lboro.ac.uk/2134/36243.

Full text
Abstract:
Currently governments and research communities are concentrating on insider threat matters more than ever, the main reason for this is that the effect of a malicious insider threat is greater than before. Moreover, leaks and the selling of the mass data have become easier, with the use of the dark web. Malicious insiders can leak confidential data while remaining anonymous. Our approach describes the information gained by looking into insider security threats from the multiple perspective concepts that is based on an integrated three-dimensional approach. The three dimensions are human issue,
APA, Harvard, Vancouver, ISO, and other styles
44

He, Ying. "Generic security templates for information system security arguments : mapping security arguments within healthcare systems." Thesis, University of Glasgow, 2014. http://theses.gla.ac.uk/5773/.

Full text
Abstract:
Industry reports indicate that the number of security incidents happened in healthcare organisation is increasing. Lessons learned (i.e. the causes of a security incident and the recommendations intended to avoid any recurrence) from those security incidents should ideally inform information security management systems (ISMS). The sharing of the lessons learned is an essential activity in the “follow-up” phase of security incident response lifecycle, which has long been addressed but not given enough attention in academic and industry. This dissertation proposes a novel approach, the Generic S
APA, Harvard, Vancouver, ISO, and other styles
45

Wolfram, Raphael. "Commercial real estate price risk A risk management approach using capital markets /." St. Gallen, 2007. http://www.biblio.unisg.ch/org/biblio/edoc.nsf/wwwDisplayIdentifier/01666379002/$FILE/01666379002.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Ponenti, Albert M. "An integrative risk management/governance framework for homeland security decision making." Thesis, Monterey, Calif. : Naval Postgraduate School, 2008. http://bosun.nps.edu/uhtbin/hyperion-image.exe/08Mar%5FPonenti.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, March 2008.<br>Thesis Advisor(s): Rollins, John. "March 2008." Description based on title screen as viewed on May 5, 2008 Includes bibliographical references (p.119-124). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
47

Larrimore, Nancy Page. "Risk Management Strategies to Prevent and Mitigate Emerging Operational Security Threats." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/4866.

Full text
Abstract:
Dependence on technology brings security compromises that have become a global threat that costs businesses millions of dollars. More than 7.6 million South Carolinians incurred effects from the 162 security breaches reported in 2011-2015. The purpose of this multiple case study was to explore the risk management strategies small business leaders use to prevent and mitigate operational security threats that produce financial losses. The population for this study consisted of 6 business leaders in South Carolina who have demonstrated successful experience in preventing and mitigating operationa
APA, Harvard, Vancouver, ISO, and other styles
48

Holmstedt, Malena. "Social Media Risk Management : and the impact on organization IT security." Thesis, Luleå tekniska universitet, Digitala tjänster och system, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-79296.

Full text
Abstract:
The purpose of this study was to investigate and try to describe how social media risk management is performed and what impact social media risk management could have on organizations IT security.  The outcome of this study is possible knowledge for researchers and for practitioners in the field, of how social media risk management was handled in some organizations in Sweden and what impact the chosen social media risk management could have on the IT security. This study looked at social media risk management and what impact it could have on organizations IT security through prior studies done
APA, Harvard, Vancouver, ISO, and other styles
49

Lee, Jae Hyung S. M. Massachusetts Institute of Technology. "Systematic approach to analyzing security and vulnerabilities of blockchain systems." Thesis, Massachusetts Institute of Technology, 2019. https://hdl.handle.net/1721.1/121793.

Full text
Abstract:
Thesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, System Design and Management Program, 2019<br>Cataloged from PDF version of thesis. Page 150 blank.<br>Includes bibliographical references (pages 119-149).<br>Recent hacks into blockchain systems and heists from such systems have raised serious questions about whether this new technology can be secured from ongoing, evolving cyberattacks. While the technology is known to provide an environment that is fundamentally safer than other existing centralized systems offer, security professionals warn that the current
APA, Harvard, Vancouver, ISO, and other styles
50

Leloudas, Georgios. "Legal aspects of aviation risk management." Thesis, McGill University, 2003. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=80937.

Full text
Abstract:
The thesis in the first part examines the notion of risk and describes the process of risk management with emphasis on the identification of emerging threats to civil aviation and on the adoption of new risk handling techniques.<br>In the second part, the role of law into the airlines' management regime is examined especially in the light of two prima facie conflicting trends: liberalization of market access and increased State involvement in war risk, safety and security issues. Furthermore, the contractual and tortious/delictual exposures of airlines are being scrutinized and the ways
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!