• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 33
  • 10
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 55
  • 55
  • 55
  • 55
  • 27
  • 26
  • 19
  • 14
  • 11
  • 10
  • 10
  • 10
  • 10
  • 9
  • 9
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
41

Enabling e-learning 2.0 in information security education: a semantic web approach

Goss, Ryan Gavin January 2009 (has links)
The motivation for this study argued that current information security ed- ucation systems are inadequate for educating all users of computer systems world wide in acting securely during their operations with information sys- tems. There is, therefore, a pervasive need for information security knowledge in all aspects of modern life. E-Learning 2.0 could possi- bly contribute to solving this problem, however, little or no knowledge currently exists regarding the suitability and practicality of using such systems to infer information security knowledge to learners.
42

Leadership in local government computer service organizations within the state of California

Beavan, Robert Benjamin 01 January 1993 (has links)
Situational leadership -- Management coaching -- Leadership principles.
43

Minimizing the naming facilities requiring protection in a computing utility.

Bratt, Richard Glenn. January 1975 (has links)
Thesis: M.S., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 1975 / Bibliography: leaves 129-130. / M.S. / M.S. Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science
44

Acceptance of technology, quality, and customer satisfaction with information technology department in a community college: a case study

Nwankwo, Charles 28 August 2008 (has links)
Not available / text
45

Acceptance of technology, quality, and customer satisfaction with information technology department in a community college : a case study

Nwankwo, Charles, 1961- 24 August 2011 (has links)
Not available / text
46

A case study of IT outsourcing in Hong Kong government

Lam, Cheuk-yung., 林卓蓉. January 1995 (has links)
published_or_final_version / Business Administration / Master / Master of Business Administration
47

The development of a technique to establish the security requirements of an organization

Gerber, Mariana January 2001 (has links)
To perform their business activities effectively, organizations rely heavily on the use of information (ISO/IEC TR 13335-2, 1996, p 1). Owens (1998) reiterates this by claiming that all organizations depend on information for their everyday operation and without it business will fail to operate (Owens, 1998, p 1-2). For an organization it means that if the right information is not available at the right time, it can make the difference between profit and loss or success and failure (Royds, 2000, p 2). Information is an asset and just like other important business assets within the organization, it has extreme value to an organization (BS 7799-1, 1999, p 1; Humphreys, Moses & Plate, 1998, p 8). For this reason it has become very important that business information is sufficiently protected. There are many different ways in which information can exist. Information can be printed or written on paper, stored electronically, transmitted electronically or by post, even spoken in conversation or any other way in which knowledge and ideas can be conveyed (URN 99/703, 1999, p. 2; Humphreys, Moses & Plate, 1998, p 8; URN 96/702, 1996, p 3).It is, therefore, critical to protect information, and to ensure that the security of IT (Information Technology) systems within organizations is properly managed. This requirement to protect information is even more important today, since many organizations are internally and externally connected by networks of IT systems (ISO/IEC TR 13335-2, 1996, p 1). Information security is therefore required to assist in the process of controlling and securing of information from accidental or malicious changes, deletions or unauthorized disclosure (Royds, 2000, p 2; URN 96/702, 1996, p 3). By preventing and minimizing the impact of security incidents, information security can ensure business continuity and reduce business damage (Owens, 1998, p 7). Information security in an organization can be regarded as a management opportunity and should become an integral part of the whole management activity of the organization. Obtaining commitment from management is therefore extremely important for effective information security. One way in which management can show their commitment to ensuring information security, is to adopt and enforce a security policy. A security policy ensures that people understand exactly what important role they play in securing information assets.
48

A methodology for measuring and monitoring IT risk

Tansley, Natalie Vanessa January 2007 (has links)
The primary objective of the research is to develop a methodology for monitoring and measuring IT risks, strictly focusing on internal controls. The research delivers a methodology whereby an organization can measure its system of internal controls, providing assurance that the risks are at an acceptable level. To achieve the primary objective a number of secondary objectives were addressed: What are the drivers forcing organizations to better corporate governance in managing risk? What is IT risk management, specifically focusing on operational risk. What is internal control and specifically focusing on COSO’s internal control process. Investigation of measurement methods, such as, Balance Scorecards, Critical Success Factors, Maturity Models, Key Performance Indicators and Key Goal Indicators. Investigation of various frameworks such as CobiT, COSO and ISO 17799, ITIL and BS 7799 as to how they manage IT risk relating to internal control.
49

Information systems project approval : transaction processing systems vs management support systems

Ong, Hong Kien. January 1980 (has links)
Thesis: M.S., Massachusetts Institute of Technology, Sloan School of Management, 1980 / Bibliography: leaf 85. / by Hong Kien Ong. / M.S. / M.S. Massachusetts Institute of Technology, Sloan School of Management
50

Fernwartung : die rechtlichen Grenzen des IT-Outsourcing durch Banken /

Bohnstedt, Jan. January 2005 (has links)
Zugl.: Frankfurt (Main), Universiẗat, Diss., 2004. / Includes bibliographical references (p. 169-177).

Page generated in 0.1734 seconds