• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 30
  • 7
  • 2
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 50
  • 50
  • 13
  • 12
  • 11
  • 7
  • 6
  • 6
  • 6
  • 5
  • 5
  • 5
  • 5
  • 5
  • 5
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
41

Information security and hybrid work : A case study of shifts in perceived information security when working hybridly

Nordmark, John, Källebo Rebermark, Oskar January 2023 (has links)
Hybrid work is already a big part of many organizations' structure. This phenomenon presents many new ways of how work is performed and carries new challenges with it. Parallel to that, the importance of working IT securely and coping with IT threats is significant in all fields of work. In this case study, we interview employees at a Swedish IT consultancy company, about their perceptions of hybrid work and their perceived ability to keep information secure in a hybrid work setting. Six employees from the company were selected for interviews. These interviews were then analyzed from the theoretical framework of Protection Motivation Theory which presents ways to explain how individuals are motivated to mediate threats alongside the ISO standard which is used to explain coping behaviors. This study concludes that the employees’ perception regarding the ability to keep information secure while working hybridly is diverse. Furthermore, the office has an important role in perceived security. The final finding reveals that current information security guidelines in ISO need to be updated or expanded to better guide organizations implementing remote work.
42

An exploration of the chasm in the protection of classified information in South African government departments

Mahlatsi, Lehlohonolo Wonderboy 08 1900 (has links)
The chasm in the protection of classified information in South African government indicates that all the departments have at their disposal information that is to some extent sensitive in nature and obviously requires security measures. This study shows that government officials who in their official duties come to contact with classified information are either vulnerable or are implementing the security controls incorrectly. It is also clear that in the absence of a comprehensive statutory framework, the government departments’ classified information has resulted in an unstable and inconsistent classification and declassification environment. The statutory framework would, in addition to other things, address the rising threat of espionage and antagonistic activities, the selling of information and the protection of critical records in government, without hindering the constitutional rights of citizens to access information. This would create a system of valuable informantion and clarify which information requires security measures with respect to the protection of classified information. / Kgaohanao e tshireletsong ya tlhahisoleseding e sireleditsweng ke mmuso wa Afrika Borwa e supa hore mafapha ohle a ona a na le tlhahisoleseding eo, ka ho hong, e leng ya sephiri mme e hloka maemo a tshireletso. Boithuto bona bo bontsha hore bahlanka ba mmuso bao, tshebetsong ya bona ya semmuso, ba teanang le tlhahisoleseding ya sephiri, ba kotsing hobane ba sebedisa ditaelo tsa polokeho ka mokgwa o fosahetseng. Ho boetse ho hlakile hore, bosikong ba moralo o phethahetseng wa semolao, disistimi tse sa sebetseng hantle tsa mafapa a mmuso tsa tlhahisoleseding ya sephiri di bakile tikoloho e sa tsitsang hape e sa hlophiswang ya tlhophiso le tloso ya tlhophiso ya tlhahisoleseding. Moralo wa semolao, hara tse ding, o ka sebetsana le phephetso e eketsehang ya bohlwela le diketsahalo tse ding tse belaetsang tse jwalo ka thekiso ya tlhahisoleseding, mme o sireletse direkote tsa mmuso tsa bohlokwa ntle le ho hatakela tokelo ya Molaotheo ya baahi ya phihlello ho tlhahisoleseding. Hona ho ka theha sistimi ya tlhahisoleseding ya bohlokwa le ho hlakisa hore na ke tlhahisoleseding efe e hlokang maemo a tshireletso ha ho tluwa ntlheng polokeho ya tlhahisoleseding ya sephiri. / Umsantsa okhoyo ekukhuseleni ulwazi olukhethekileyo kurhulumente woMzantsi Afrika ubonisa ukuba onke amaSebe anolwazi analo olunokuba nkenenkene, kwaye oludinga ukhuseleko. Esi sifundo sibonisa ukuba asesichengeni amagosa karhulumente aye athi apha ekusebenzeni kwawo, adibane nolwazi olukhethekileyo, ngoba azisebenzisa gwenxa iindlela zokulawula ukhuseleko. Kukwacaca ukuba, ekubeni kungekho sikhokelo namigaqo isemthethweni, iinkqubo ezingasebenzi kakuhle zamaSebe karhulumente, ulwazi olukhethekileyo aluhlelwa ngendlela eyiyo kwaye lufumaneka kwiimeko ezingaluphathi ngokukhetheka. Ubukho besikhokelo nemigaqo yokhuseleko lolwazi inganceda ekunqandeni isoyikiso esikhulu sobhukuqo mbuso nezinye iziganeko ezikrokrisayo, ezifana nokuthengiswa kolwazi, Esi sikhokelo singanceda nasekukhuseleni iingxelo zikarhulumente ezinkenenkene ngaphandle kokucinezela amalungelo abemi okufumana ulwazi njengoko uvuma uMgaqo Siseko. Oku kuya kuvelisa inkqubo yolwazi olunexabiso kwaye kuya kucacisa ukuba loluphi ulwazi oludinga imimiselo yokhuseleko malunga nokukhuselwa kolwazi olukhethekileyo. / Criminology and Security Science / M. Tech. (Forensic Investigation)
43

Challenges and Security Aspects of Blockchain Based Online Multiplayer Games​

Munir, Sundas, Baig, Mirza Sanam Iqbal January 2019 (has links)
Video gaming has always been a blooming industry. With the emergence of online multi- player video games , this industry’s worth have sky rocketed. Online multiplayer video games store data of player’s credentials, in-game progress, in-game virtual assets and payment details etc. Which mean security threats to these systems are nothing new and securing these games have always meant to protect player’s data from unauthorized breach. Integration of Blockchain technology in online multiplayer video games apart from other amazing features, provides a way to prove digital ownership of virtual assets with their verifiable scarcity. Trade of these in-game virtual assets have always been a goal for online multiplayer gaming companies, but there was none enough trust-able infrastructure available which can be relied on. Blockchain just solved that problem. It provided a platform for these asset’s secure and transparent transaction between players. Topic for our research not only consider the security challenges in online games but specifi- cally blockchain based online multiplayer games. This adaptation is still new and there is need of consideration of new security challenges. In this dissertation we try to bring out some important challenges related to security of blockchain based online multiplayer video games. There are currently no studies around security concerns and challenges of the integration of the online multiplayer video games in the emerging blockchain systems. In order to fill in the gap, this dissertation discusses and identifies two main security concerning questions related to this domain. Also this dissertation provides basic steps for expanding future research and application in this joint domain.
44

Optimalizace bezpečnostních schopností ozbrojených sil České republiky / Security capabilities optimalization of Czech military forces

Melich, Ladislav January 2013 (has links)
The topic of this diploma thesis is "Security capabilities optimalization of Czech armed forces". The original research aims to propose the strategic optimalization of the security capabilities of Czech armed forces. After the description of the evolution of the transformation of Czech armed forces from 1989 the thesis has offered an analysis of threats, risks and assets to Czech republic made on the basis of Czech strategic security documents. On this basis matrix of security risks has been created. Then preventive and liquidation measures that are necessary to adopt in case of emergency situations have been formulated. In the next section necessary security capabilities for realization of the measures have been suggested. Although the author examined all security capabilities necessary for elimination of security risks, major emphasis has been given to military capabilities. The actual military capabilities of Czech armed forces have also been described. The main aim of this thesis has been to define the strategic gap - the difference between desirable military capabalities and actual military capabilities - and to present strategic goals for approximately next twenty years.
45

A framework for higher academic institutions in the republic of South Africa to mitigate network security threats and attacks.

Mohapi, Matrinta Josephine 06 1900 (has links)
M. Tech. (Department of Information and Communication Technology, Faculty of Applied and Computer Sciences), Vaal University of Technology. / The computer networks of higher academic institutions play a significant role in the academic lives of students and staff in terms of offering them an environment for teaching and learning. These institutions have introduced several educational benefits such as the use of digital libraries, cluster computing, and support for distance learning. As a result, the use of networking technologies has improved the ability of students to acquire knowledge, thereby providing a supportive environment for teaching and learning. However, academic networks are constantly being attacked by viruses, worms, and the intent of malicious users to compromise perceived secured systems. Network security threats and cyber-attacks are significant challenges faced by higher academic institutions that may cause a negative impact on systems and Information and Communications Technology (ICT) resources. For example, the infiltration of viruses and worms into academic networks can destroy or corrupt data and by causing excessive network traffic, massive delays may be experienced. This weakens the ability of the institution to function properly, and results in prolonged downtime and the unavailability of Information Technology (IT) services. This research determines challenges faced by higher academic institutions, identifies the type of security measures used at higher academic institutions, and how network security could be addressed and improved to protect against network security threats and attacks. Two research approaches were adopted, namely a survey and an experiment. Survey questionnaires were distributed to IT technical staff at higher academic institutions in Gauteng province to determine the challenges they face in terms of securing their networks. It is crucial that network security takes on a prominent role when managing higher academic institutions‘ networks. The results of the study reveal several challenges such as budget constraints, inadequate security measures, lack of enforcing network security policies, and lack of penetration testing on systems and the network. The results also reveal that the implementation of security measures can and does address network security threats and attacks. It is therefore extremely important for higher academic institutions to implement proper security measures to help mitigate network security threats and attacks. The framework proposed is based on the results from the research study to help mitigate network security threats and attacks at higher academic institutions.
46

Exército brasileiro: estrutura militar e ordenamento político 1984-2007 / The Brazilian Army: military structure and policy planning 1984 - 2007

Kuhlmann, Paulo Roberto Loyolla 10 December 2007 (has links)
Ocorreram amplas transformações nos sistemas militares de diversos países no período pós- Guerra Fria. No Brasil, o Exército replanejou sua força militar terrestre após a guerra das Malvinas mediante a implantação de um sistema de planejamento estruturado. Atualizações constantes foram feitas, mas as suas linhas principais podem ainda serem encontradas na remodelagem das unidades, missões e estrutura. Mesmo com a criação do Ministério da Defesa, o elemento político de direção nacional pouco interferiu. Essa reestruturação não tem correspondência direta com o modelo do pós-modernismo militar estruturado por Charles Moskos e que sugeria a transformação de grandes exércitos de conscritos em pequenos exércitos tecnologizados, cumprindo missões diferentes das tradicionais guerras inter-estatais. O desafio dos estruturadores da força terrestre foi de administrar poucos recursos com muita criatividade, especializando número crescente de profissionais de guerra terrestre, alargando o escopo das missões sem abrir mão das tradicionais, tornando algumas organizações militares mais operacionais, produzindo um salto de qualidade, ainda que tudo isso se desse sem interesse e sem direcionamento político. A ausência de clara direção política das forças armadas produz imprecisões na formulação de estratégias e de missões criando, por exemplo, sobreposição de missões auto-atribuídas com as de outros órgãos de segurança do Estado. / Broad transformations occurred in the military systems of many countries after the Cold War period. In Brazil , the Army re-dimensioned its military land forces after the Malvinas War when a planning system was structured and implemented. Despite of the continual changes the main lines can be found in the units remodeling, missions and structures. Even with the creation of the Ministry of Defense, the political elements interfered minimally. This restructuring has no direct connection with the post-modernist military model structured by Charles Moskos, which indicates the transformation of the big armies of recruited into the small technological armies with missions different from the traditional inter-state wars. The challenge for those involved in structuring the land forces was to creatively administrate the scarce resources to specialize land warfare professionals, broaden the number of missions without abandoning traditional missions and make military organizational even more operational attaining one leap of quality regardless of any political interest or guidance. The absence of clear political guidance of the armed forces can produce failures in the strategies and missions designs and this can produce, for example, overlaps of their own missions with those of other security organs of the State.
47

Modern piracy the impact on maritime security.

Mansfield, Charles T. January 2008 (has links) (PDF)
Thesis (Master of Military Studies)--USMC Command and Staff College, 2008. / Title from PDF title screen. Text document in PDF format. Includes bibliographical references (p. 21-22).
48

Exército brasileiro: estrutura militar e ordenamento político 1984-2007 / The Brazilian Army: military structure and policy planning 1984 - 2007

Paulo Roberto Loyolla Kuhlmann 10 December 2007 (has links)
Ocorreram amplas transformações nos sistemas militares de diversos países no período pós- Guerra Fria. No Brasil, o Exército replanejou sua força militar terrestre após a guerra das Malvinas mediante a implantação de um sistema de planejamento estruturado. Atualizações constantes foram feitas, mas as suas linhas principais podem ainda serem encontradas na remodelagem das unidades, missões e estrutura. Mesmo com a criação do Ministério da Defesa, o elemento político de direção nacional pouco interferiu. Essa reestruturação não tem correspondência direta com o modelo do pós-modernismo militar estruturado por Charles Moskos e que sugeria a transformação de grandes exércitos de conscritos em pequenos exércitos tecnologizados, cumprindo missões diferentes das tradicionais guerras inter-estatais. O desafio dos estruturadores da força terrestre foi de administrar poucos recursos com muita criatividade, especializando número crescente de profissionais de guerra terrestre, alargando o escopo das missões sem abrir mão das tradicionais, tornando algumas organizações militares mais operacionais, produzindo um salto de qualidade, ainda que tudo isso se desse sem interesse e sem direcionamento político. A ausência de clara direção política das forças armadas produz imprecisões na formulação de estratégias e de missões criando, por exemplo, sobreposição de missões auto-atribuídas com as de outros órgãos de segurança do Estado. / Broad transformations occurred in the military systems of many countries after the Cold War period. In Brazil , the Army re-dimensioned its military land forces after the Malvinas War when a planning system was structured and implemented. Despite of the continual changes the main lines can be found in the units remodeling, missions and structures. Even with the creation of the Ministry of Defense, the political elements interfered minimally. This restructuring has no direct connection with the post-modernist military model structured by Charles Moskos, which indicates the transformation of the big armies of recruited into the small technological armies with missions different from the traditional inter-state wars. The challenge for those involved in structuring the land forces was to creatively administrate the scarce resources to specialize land warfare professionals, broaden the number of missions without abandoning traditional missions and make military organizational even more operational attaining one leap of quality regardless of any political interest or guidance. The absence of clear political guidance of the armed forces can produce failures in the strategies and missions designs and this can produce, for example, overlaps of their own missions with those of other security organs of the State.
49

Security of electronic personal health information in a public hospital in South Africa

Chuma, Kabelo Given 01 1900 (has links)
The adoption of digital health technologies has dramatically changed the healthcare sector landscape and thus generates new opportunities to collect, capture, store, access and retrieve electronic personal health information (ePHI). With the introduction of digital health technologies and the digitisation of health data, an increasing number of hospitals and peripheral health facilities across the globe are transitioning from a paper-based environment to an electronic or paper-light environment. However, the growing use of digital health technologies within healthcare facilities has caused ePHI to be exposed to a variety of threats such as cyber security threats, human-related threats, technological threats and environmental threats. These threats have the potential to cause harm to hospital systems and severely compromise the integrity and confidentiality of ePHI. Because of the growing number of security threats, many hospitals, both private and public, are struggling to secure ePHI due to a lack of robust data security plans, systems and security control measures. The purpose of this study was to explore the security of electronic personal health information in a public hospital in South Africa. The study was underpinned by the interpretivism paradigm with qualitative data collected through semi-structured interviews with purposively selected IT technicians, network controllers’, administrative clerks and records management clerks, and triangulated with document and system analysis. Audio-recorded interviews were transcribed verbatim. Data was coded and analysed using ATLAS.ti, version 8 software, to generate themes and codes within the data, from which findings were derived. The key results revealed that the public hospital is witnessing a deluge of sophisticated cyber threats such as worm viruses, Trojan horses and shortcut viruses. This is compounded by technological threats such as power and system failure, network connection failure, obsolete computers and operating systems, and outdated hospital systems. However, defensive security measures such as data encryption, windows firewall, antivirus software and security audit log system exist in the public hospital for securing and protecting ePHI against threats and breaches. The study recommended the need to implement Intrusion Protection System (IPS), and constantly update the Windows firewall and antivirus program to protect hospital computers and networks against newly released viruses and other malicious codes. In addition to the use of password and username to control access to ePHI in the public hospital, the study recommends that the hospital should put in place authentication mechanisms such as biometric system and Radio Frequency Identification (RFID) system restrict access to ePHI, as well as to upgrade hospital computers and the Patient Administration and Billing (PAAB) System. In the absence of security policy, there is a need for the hospital to put in place a clear written security policy aimed at protecting ePHI. The study concluded that healthcare organisations should upgrade the security of their information systems to protect ePHI stored in databases against unauthorised access, malicious codes and other cyber-attacks. / Information Science / M. Inf. (Information Security)
50

The challenges facing private security companies in retaining clients : a case study in Gauteng shopping malls

Banda, Teboho Elliot 06 1900 (has links)
The private security industry is tasked with protecting lives and property against an evolving array of personal and property threats. Rendering such services comes with many market related challenges for private security providers. These services are rendered to various types of clients like government departments, hospitals, universities and shopping malls amongst others. These clients have unique and different needs and expectations, therefore shopping malls as clients of the private security industry were selected for the purpose of this research. The qualitative research approach was used for this study wherein a questionnaire was used to obtain information from private security and shopping mall personnel working in shopping malls in Gauteng. The findings of this study reveals that there are indeed client retention challenges that are facing private security companies providing services to shopping malls. Based on the findings, recommendations for the private security providers and further research in shopping mall security management are made. / Security Risk Management / M.Tech. (Security Management)

Page generated in 0.0603 seconds