• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 49
  • 16
  • 5
  • 4
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 93
  • 93
  • 25
  • 21
  • 19
  • 19
  • 19
  • 16
  • 16
  • 14
  • 13
  • 11
  • 11
  • 11
  • 10
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

Security vetting in the Department of Home Affairs

Molapo, Kgaugelo January 2017 (has links)
Mini-thesis submitted in fulfilment of the requirements for the Degree of Masters of Management in the field of Security (MM-S) In the Graduate School of Public and Development Management University of Witwatersrand February 2017 / This is a report on Security Vetting in the Department of Home Affairs. The South African Public Service (including the Department of Home Affairs) as an employer has an obligation to deliver services in an accountable and transparent manner and because of that people who obtain employment in the public sector are expected to possess a high level of integrity and professional ethics. The Security Screening Investigation (SSI) commonly known as Security Vetting or Vetting was introduced in government departments with the objective of ensuring that all the individuals employed in government with access to classified information possess the qualities that will enable them “not to cause classified information or material to fall into unauthorised hands, thereby harming or endangering the security and/or interests of the State”. The process of vetting is, however, the mandate of the State Security Agency (SSA), with the responsibility of a larger portion of the vetting process while the smaller portion of the function lies with some government departments, of which the DHA is one. It has been observed that regardless of the decentralization of the functions of vetting by the SSA, there are still challenges that are experienced in DHA with the current vetting approach/strategy. This study was undertaken with the purpose of identifying and describing the challenges relating to the current vetting process in the DHA and as a follow-up to determine the possibility of establishing a strategy that will address the current shortcomings. Interviews were undertaken with Home Affairs officials to collect data on the effectiveness and efficiency of the current vetting strategy in the department, the challenges and the shortcomings concerning vetting, as well as how vetting strategy can be constructed in order to alleviate the challenges and the shortcomings. The findings indicate that the current vetting strategy is neither effective nor efficient. The report further indicates that there are several challenges with the current vetting strategy in DHA, such as DHA reliance on SSA for the completion of the vetting process, a shortage of vetting officers in the department, delayed turnaround times on the conclusion of the vetting process as well as failure in the implementation of the vetting strategy. The conclusion is that the current vetting strategy needs to be reviewed and improved. / MT2017
32

Detection, tracking, and behaviour analysis of moving people in intelligent video surveillance systems a graph based approach /

Conte, Donatello Jolion, Jean-Michel Vento, Mario January 2006 (has links)
Thèse doctorat : Informatique : Villeurbanne, INSA : 2006. / Thèse rédigée en anglais. Titre provenant de l'écran-titre. Bibliogr. p. 88-98.
33

Kompiuterių tinklų saugos modelių sudarymas / Design of Computer Network Security

Ališauskaitė, Vaida 28 January 2008 (has links)
Magistriniame darbe išanalizuoti įvairios paskirties saugos modeliai. Pagal gautus rezultatus sudarytas apibendrintas informacijos saugos praradimo riziką įvertitnantis kompiuterių tinklų saugos modelis. Sukurta grėsmę keliančius įvykius aptinkanti sistema. / The master's work analysis different types of security models. It also proposes a new computer network security reference model, which includes risk management process. A suspicious network events detection system is designed to make network monitoring easier.
34

A Framework for Adaptive Information Security Systems : A Holistic Investigation

Mwakalinga, Jeffy January 2011 (has links)
This research proposes a framework for adaptive information security systems that considers both the technical and social aspects of information systems security. Initial development of information systems security focused on computer technology and communication protocols. Researchers and designers did not consider culture, traditions, ethics, and other social issues of the people using the systems when designing and developing information security systems. They also seemed to ignore environments where these systems run and concentrated only on securing parts of the information systems. Furthermore, they did not pay adequate attention to the enemies of information systemsand the need for adaption to a changing enviroment. The consequences of this lack of attentions to a number of important factors have given us the information security systems that we have today, which appear to be systemically insecure.   To approach this systemic insecurity problem the research was divided into mini studies that were based on the Systemic-Holistic paradigm, Immune System concepts, and Socio-Technical System theory. Applying the holistic research process the author started first by exploring adaptation systems. After exploring these systems, the focus of the research was to understand the systems and features required for making information security systems learn to adapt to the changing environments. Designing and testing the adaptive framework were the next steps. The acquired knowledge from this research was structured into domains in accordance to ontological principles and relationship between domains was studied. These domains were then integrated with the security value-based chain concept, which include deterrence, prevention, detection, response, and recovery functions to create a framework for adaptive information security systems.   The results of the mini studies were reported in a number of papers, which were published in proceedings of international conferences and a journal. For this work, 12 of the thesis papers are included. A framework for adaptive information security system was created. Trials to apply and validate the framework were performed using three methods. The first method was a panel validation, which showed that the framework could be used for providing adaptive security measures and structuring  security work. The second method mapped the framework to the security standards, which showed that the framework was aligned with the major information systems security standards. The third and last validation method was to map the framework with reported ICT crimes cases. The results indicated that most crimes appear to occur because the security systems in place lacked deterrence security measures and had weak prevention, detection, and response security measures. The adaptive information security systems framework was also applied to a number of areas including a secure e-learning, social networks, and telemedicine systems.   It is concluded in this thesis that this adaptive information security system framework can be applied to minimize a number of  systemic insecurity problems and warrants more applied research and practical implementations. / Q 20110608
35

Asynchronous transfer mode security /

Shankaran, Rajan. January 1999 (has links)
Thesis (M. Sc.) (Hons.) -- University of Western Sydney, Nepean, 1999. / Thesis submitted in fulfilment of the requirements for the award of the degree Master of Science (Honors) from the University of Western Sydney, Nepean, School of Computing and Information Technology. Bibliography : p. 87-88.
36

The social impact of using automatic identification technologies and location-based services in national security

Tootell, Holly. January 2007 (has links)
Thesis (Ph.D.)--University of Wollongong, 2007. / Typescript. Includes bibliographical references: p. 172-198.
37

Capacities of erasure networks

Smith, Brian Matthew, January 1900 (has links)
Thesis (Ph. D.)--University of Texas at Austin, 2008. / Vita. Includes bibliographical references.
38

Mobile commerce over GSM a banking perspective on security /

Van der Merwe, Pieter Ben. January 2003 (has links)
Thesis (M. Sc.)(Electronic Engineering)--University of Pretoria, 2004. / Summaries in English and Afrikaans. Includes bibliographical references (125-128).
39

A competitive analysis of digital video surveillance products' manufacturers in Asia Pacific region

Yeung, Alex Tak Lok. January 2005 (has links) (PDF)
Thesis (M.Sc.)--City University of Hong Kong, 2005. / Title from title screen (viewed on Jan. 10, 2006) "A dissertation submitted in partial fulfillment of the requirements for the degree of Master of Science in Engineering Management." Includes bibliographical references.
40

Object recognition using rapid classification trees

Haynes, Keith L. Liu, Xiuwen. January 2006 (has links)
Thesis (Ph. D.)--Florida State University, 2006. / Advisor: Xiuwen Liu, Florida State University, College of Arts and Sciences, Dept. of Computer Science. Title and description from dissertation home page (viewed Sept. 20, 2006). Document formatted into pages; contains xi, 109 pages. Includes bibliographical references.

Page generated in 0.2477 seconds