Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: Information security legislations.

Rozprawy doktorskie na temat „Information security legislations”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 23 najlepszych rozpraw doktorskich naukowych na temat „Information security legislations”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.

1

Wells, William Ward. "Information security program development." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2585.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Banerjea-Brodeur, Nicolas Paul. "Advance passenger information passenger name record : privacy rights and security awareness." Thesis, McGill University, 2003. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=80909.

Pełny tekst źródła
Streszczenie:
An in-depth study of Advance Passenger Information and Passenger Name Record has never been accomplished prior to the events of September 11 th. It is of great importance to distinguish both of these concepts as they entail different legal consequence. API is to be understood as a data transmission that Border Control Authorities possess in advance in order to facilitate the movements of passengers. It is furthermore imperative that harmonization and inter-operability between States be achieved in order for this system to work. Although the obligations seem to appear for air carriers to
Style APA, Harvard, Vancouver, ISO itp.
3

Desai, Mohammed Reza. "An integrated approach for information security compliance in a financial services organisation." Thesis, Cape Peninsula University of Technology, 2016. http://hdl.handle.net/20.500.11838/2396.

Pełny tekst źródła
Streszczenie:
Thesis (MTech (Information Technology))--Cape Peninsula University of Technology, 2016.<br>The aim of this research is to identify and explore the factors affecting information security compliance of information security policies and regulations, in a financial services organisation. The organisation has to comply with information security regulations and legislations by righteousness of its operations in light of the fact that any wrong doing together with misuse of data, are continually expanding. Corporate embarrassments comes about due to rupture of security, results in expanded thoughtful
Style APA, Harvard, Vancouver, ISO itp.
4

Sjöström, Elin. "Ett lapptäcke av säkerhetsskydd över Sverige : Utmaningar för civila verksamheter vid applicering av säkerhetsskyddsanalys för stärkt nationell säkerhet." Thesis, Linköpings universitet, Informatik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-159636.

Pełny tekst źródła
Streszczenie:
Informationssäkerhet är idag någonting som blivit allt viktigare med den ökade mängd information som bearbetas och den ökade risken för antagonistiska händelser. Att bygga upp ett omfattande säkerhetsskydd genom att genomföra en grundläggande säkerhetsskyddsanalys är därför av vikt för de verksamheter som kan påverka Sveriges säkerhet. Denna studie har undersökt detta genom att besvara två frågeställningar: 1.Vilka utmaningar finns det vid applicering av säkerhetsskyddsanalys för civila verksamheter inom Sverige? och 2. Hur bör dessa verksamheter applicera säkerhetsskyddsanalys för att handska
Style APA, Harvard, Vancouver, ISO itp.
5

Кунєв, Ю. Д. "Правове забезпечення інформаційної безпеки як предмет правового дослідження". Thesis, Національний авіаційний університет, 2021. https://er.nau.edu.ua/handle/NAU/53719.

Pełny tekst źródła
Streszczenie:
Мета статті полягає у формулюванні проблем та визначенні теоретичних основ їх розв’язання щодо нормативно-правового регулювання сфери інформаційної безпеки. Методи дослідження: комплексний підхід до створення теоретичної картини об’єкта та застосування методологічної схеми «подвійного знання» про об’єкт як такий та про знання, що його описують і зображують; порівняльно-правового та доктринального пізнання інформаційного законодавства, а також метод узагальнення та моделювання нових теоретичних знань інформаційного права. Результати: визначені проблеми подальшого розвитку правового забезп
Style APA, Harvard, Vancouver, ISO itp.
6

Skolmen, Dayne Edward. "Protection of personal information in the South African cloud computing environment: a framework for cloud computing adoption." Thesis, Nelson Mandela Metropolitan University, 2016. http://hdl.handle.net/10948/12747.

Pełny tekst źródła
Streszczenie:
Cloud Computing has advanced to the point where it may be considered an attractive proposition for an increasing number of South African organisations, yet the adoption of Cloud Computing in South Africa remains relatively low. Many organisations have been hesitant to adopt Cloud solutions owing to a variety of inhibiting factors and concerns that have created mistrust in Cloud Computing. One of the top concerns identified is security within the Cloud Computing environment. The approaching commencement of new data protection legislation in South Africa, known as the Protection of Personal Info
Style APA, Harvard, Vancouver, ISO itp.
7

Kampourakis, Ioannis [Verfasser]. "Dialectics of Transparency and Secrecy in the Information Age : The Role of Whistleblowing Legislation in the Regulatory Governance of Markets and in National Security / Ioannis Kampourakis." Berlin : Freie Universität Berlin, 2019. http://d-nb.info/1195081014/34.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Ledenstam, David, and Gustav Jonasson. "Kom ihåg att glömma bort : Fallstudie av organisationers förändringsarbete ur ett informationssäkerhetsperspektiv." Thesis, Uppsala universitet, Institutionen för informatik och media, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-355584.

Pełny tekst źródła
Streszczenie:
Changes is always a relevant factor in organisations. The 25th of May 2018 the General Data Protection Regulation (GDPR) becomes enforceable as EU law, which will be a cause for change for a lot of organisation’s way of handling data, possibly endangering the information’s security. This essay aims to study three organizations and how they have prepared for GDPR. They will be analyzed from a change-management- and information security perspective, to conclude how the organisations conceive the magnitude of the change, and to see how they have implemented solutions for keeping the data safe aft
Style APA, Harvard, Vancouver, ISO itp.
9

Ratkevičienė, Sigita. "Šengeno informacinės sitemos vaidmuo ir teisinis reglamentavimas užtikrinant valstybių narių saugumą." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2006. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2006~D_20061227_184131-28545.

Pełny tekst źródła
Streszczenie:
In this thesis the role of the Shengen Information Sytem (SIS) in the field of security of the Member States was evaluated and legislation of the aforementioned system was analysed. The curent version of SIS was dissertated and componed with a new version of SIS (SIS II) of with creationis is in progress. The attention was paid to the advantages and disadvantages of both current version of SIS and the new one. Significance of SIS in the field of protection of the Shengen area was evaluated. In the thesis SIS was presented as one of the most important compensatory tools.
Style APA, Harvard, Vancouver, ISO itp.
10

Kroft, Karel. "Audit cloudových služeb pro malé a střední podniky." Master's thesis, Vysoká škola ekonomická v Praze, 2014. http://www.nusl.cz/ntk/nusl-203958.

Pełny tekst źródła
Streszczenie:
Cloud computing brings to the world of information systems many opportunities but also new risks. The main one is decreased customer ability to directly control the security of information and systems, because administration responsibility passes to providers. This thesis focuses on cloud services auditing from the small and medium enterprises perspective. In introduction, this work defines information system audit terminology, characterizes cloud services and analyzes international legislation. Standardization organizations, published standards and methodologies that are widely respected in I
Style APA, Harvard, Vancouver, ISO itp.
11

Silva, Andréia Gonçalves. "Informação legislativa ao alcance do cidadão: contribuição dos sistemas de organização do conhecimento." Universidade de São Paulo, 2015. http://www.teses.usp.br/teses/disponiveis/27/27151/tde-18052015-155605/.

Pełny tekst źródła
Streszczenie:
INTRODUÇÃO: A Lei de Acesso à Informação Pública (LAI) regulamenta o direito à informação estabelecido pela Constituição Federal de 1988, exigindo que os órgãos governamentais garantam o direito de acesso à informação pública mediante procedimentos objetivos e ágeis, de forma transparente, clara e em linguagem de fácil compreensão. Parte-se do pressuposto de que as leis produzidas pelo Legislativo podem ser consideradas \"informação pública\" e por isso devem ser disponibilizadas ao cidadão num formato simples e acessível. Para tanto, precisam ser organizadas, estruturadas e disseminadas, conf
Style APA, Harvard, Vancouver, ISO itp.
12

Parbanath, Steven. "Personal information security : legislation, awareness and attitude." Thesis, 2011. http://hdl.handle.net/10413/9651.

Pełny tekst źródła
Streszczenie:
Ecommerce refers to the buying and selling of products and services electronically via the Internet and other computer networks (Electronic Commerce 2011). The critical components of ecommerce are a well designed website and a merchant account for payment by the customer (Ecommerce critical components 2008). Merchants that sell their products and services via the Internet have a competitive edge over those that do not. It is therefore becoming common practice for both small and large business to transact electronically. With the vast opportunities, new risks and vulnerabilities are introduced.
Style APA, Harvard, Vancouver, ISO itp.
13

Dagada, Rabelani. "Legal and policy aspects to consider when providing information security in the corporate environment." Thesis, 2014. http://hdl.handle.net/10500/18839.

Pełny tekst źródła
Streszczenie:
E-commerce is growing rapidly due to the massive usage of the Internet to conduct commercial transactions. This growth has presented both customers and merchants with many advantages. However, one of the challenges in E-commerce is information security. In order to mitigate e-crime, the South African government promulgated laws that contain information security legal aspects that should be integrated into the establishment of information security. Although several authors have written about legal and policy aspects regarding information security in the South African context, it has not yet bee
Style APA, Harvard, Vancouver, ISO itp.
14

Chiu, Chen-Hui, and 邱貞慧. "The Study on the Legislation of the Classified National Security Information – Focus on the Review and Designation of Secret Information." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/myf2z2.

Pełny tekst źródła
Streszczenie:
碩士<br>東吳大學<br>法律學系<br>96<br>Abstract Due to the fact of scatteration, scarcity, and difficulty on obtaining substantial information, and the inconsistency regarding the administration by public law and criminal law, it has rendered the review and designation of secret information unable to achieve relatively complete and specific investigation in the study of legislation literatures of classified national security information. In view of it, this article would begin with the legislation evolution in the protection of classified national security information , and we should start from domestic
Style APA, Harvard, Vancouver, ISO itp.
15

Lin, Shin-Xing, and 林信興. "A Study on the Legislation of the Classified National Security Information-the Case of Japan (1907-1986)." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/j9m4x8.

Pełny tekst źródła
Streszczenie:
碩士<br>國防大學政治作戰學院<br>政治研究所<br>104<br>The law of national confidentiality protection of Japan has become complete in the process of the Sion-Japanese War of 1894-1895, the Japanese-Russia War of 1904-1905 and World WarⅡ. It is worth to paying attention to the specific secret protection law which was approved in Dec. 2013 because of the exclusivity. On the other hand, the system of secret information protection has been established firmly by constantly revising and accumulative experience of practice in our country. To protect the national security and interests, the framework of modernistic lega
Style APA, Harvard, Vancouver, ISO itp.
16

Tsai, Chia-Ting, and 蔡佳婷. "A Study on Legislation and Implementation of Medical Information Security in Taiwan-From Past Experience to Future Adoption of HIPAA." Thesis, 2002. http://ndltd.ncl.edu.tw/handle/86441629689677709842.

Pełny tekst źródła
Streszczenie:
碩士<br>國立陽明大學<br>衛生資訊與決策研究所<br>90<br>The advance in computer technology has dramatically changed the way of data processing. However, the speedy distribution of information raises a critical issue about how to protect personal information. Regarding medical information, the USA Health Insurance Portability and Accountability Act (HIPAA) is one of the first acts that regulates the uses and distribution of personal medical information. In Taiwan, the "Computer-Processed Personal Data Protection Law" (refer to as "CPPDPL") is functionally similar to HIPAA, although it is not as complete as HIPAA
Style APA, Harvard, Vancouver, ISO itp.
17

London, Ray William. "Comparative data protection and security : a critical evaluation of legal standards." Thesis, 2013. http://hdl.handle.net/10500/13859.

Pełny tekst źródła
Streszczenie:
This study1 addresses the key information technology issues of the age and its unintended consequences. The issues include social control by businesses, governments, and information age Star Chambers. The study focuses on a comparative analysis of data protection, data security, and information privacy (DPSIP) laws, regulations, and practices in five countries. The countries include Australia, Canada, South Africa, the United Kingdom, and the United States. The study addresses relevant international legal standards and justifications. This multidisciplinary analysis includes a systems
Style APA, Harvard, Vancouver, ISO itp.
18

London, R. W. "Comparative data protection and security : a critical evealuation of legal standards." Thesis, 2013. http://hdl.handle.net/10500/13859.

Pełny tekst źródła
Streszczenie:
This study1 addresses the key information technology issues of the age and its unintended consequences. The issues include social control by businesses, governments, and information age Star Chambers. The study focuses on a comparative analysis of data protection, data security, and information privacy (DPSIP) laws, regulations, and practices in five countries. The countries include Australia, Canada, South Africa, the United Kingdom, and the United States. The study addresses relevant international legal standards and justifications. This multidisciplinary analysis includes a systems
Style APA, Harvard, Vancouver, ISO itp.
19

Maguraushe, Kudakwashe. "Development of a diagnostic instrument and privacy model for student personal information privacy perceptions at a Zimbabwean university." Thesis, 2021. http://hdl.handle.net/10500/27557.

Pełny tekst źródła
Streszczenie:
Orientation: The safety of any natural being with respect to the processing of their personal information is an essential human right as specified in the Zimbabwe Data Protection Act (ZDPA) bill. Once enacted, the ZDPA bill will affect universities as public entities. It will directly impact how personal information is collected and processed. The bill will be fundamental in understanding the privacy perceptions of students in relation to privacy awareness, privacy expectations and confidence within university. These need to be understood to give guidelines to universities on the implementat
Style APA, Harvard, Vancouver, ISO itp.
20

Roos, Anneliese. "The law of data (privacy) protection: a comparative and theoretical study." Thesis, 2003. http://hdl.handle.net/10500/1463.

Pełny tekst źródła
Streszczenie:
In present-day society more and more personal information is being collected. The nature of the collection has also changed: more sensitive and potentially prejudicial information is collected. The advent of computers and the development of new telecommunications technology, linking computers in networks (principally the Internet) and enabling the transfer of information between computer systems, have made information increasingly important, and boosted the collection and use of personal information. The risks inherent in the processing of personal information are that the data may be inaccura
Style APA, Harvard, Vancouver, ISO itp.
21

Winkler, Otakar. "Legislativa vztahující se k problému svobodného přístupu k informacím v mezinárodním kontextu." Master's thesis, 2011. http://www.nusl.cz/ntk/nusl-296821.

Pełny tekst źródła
Streszczenie:
The thesis is focused on some questions stemming from the limitations of the right to free access to information in connection with the implementation of classified information protection in the context of activities of state security organizations. The basic legislation covering this area has been summarized. Further, the thesis explores theoretical as well as practical procedures and principles aimed at minimization of both real and potential threats to individual rights and basic principles of the open society in cases of performance of such sorts of limitations. Besides, some examples of t
Style APA, Harvard, Vancouver, ISO itp.
22

Njotini, Mzukisi Niven. "E-crimes and e-authentication - a legal perspective." Thesis, 2016. http://hdl.handle.net/10500/21720.

Pełny tekst źródła
Streszczenie:
E-crimes continue to generate grave challenges to the ICT regulatory agenda. Because e-crimes involve a wrongful appropriation of information online, it is enquired whether information is property which is capable of being stolen. This then requires an investigation to be made of the law of property. The basis for this scrutiny is to establish if information is property for purposes of the law. Following a study of the Roman-Dutch law approach to property, it is argued that the emergence of an information society makes real rights in information possible. This is the position because informati
Style APA, Harvard, Vancouver, ISO itp.
23

Marutha, Ngoako Solomon. "A framework to embed medical records management into the healthcare service delivery in Limpopo Province of South Africa." Thesis, 2016. http://hdl.handle.net/10500/22287.

Pełny tekst źródła
Streszczenie:
The importance of records management to the provision of healthcare services cannot be overemphasised. If medical records are not managed properly, this might result in the provision of poor healthcare services. This is because usually if medical records are not properly managed, the healthcare institutions attain inaccurate, untimely, incomplete and unauthentic records or the records fade completely. Records that are not managed properly are easily lost, modified, altered, misfiled and/or damaged, which results in a struggle to locate them and, eventually, much time is lost. Records
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!