• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 33
  • 10
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 55
  • 55
  • 55
  • 55
  • 27
  • 26
  • 19
  • 14
  • 11
  • 10
  • 10
  • 10
  • 10
  • 9
  • 9
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Privacy policies and practices: an investigation of secondary use of information within South African retail banking institutions

Daya, Jithendra Chotoo January 1996 (has links)
A research report submitted to the Faculty of Commerce, University of the Witwatersrand, Johannesburg, in the partial fulfilment of the requirements for the degree of Master of Commerce. Johannesburg 1996. / This paper addresses concerns surrounding information privacy and the secondary use of information in South African corporations. This study also attempts to assess the level of concern that management and information technology practitioners if! South African retail banks have about privacy issues. The research suggests that privacy is a huge concern internationally and may affect South African corporations if they do not follow certain policies and practices. Eleven in-person structured interviews were conducted at four banks. The research proposes a set of guidelines by which South African management and IT practitioners, who are involved with the identification and solution of some of the problems that may be presented by possible privacy legislation, will be able to assess their policies and practices against international practices and policies. The results inform IS managers and executives about appropriate business policies they can implement voluntarily to address public concerns about specific information practices that may be considered a threat to privacy. The findings suggest that the executives are deliberately avoiding confronting the issue of information privacy for as long as possible. The executives are adopting a wait-and-see attitude and will react 011 whatever legislation requires them to do. At the time of the report senior executives at banks were not accepting responsibility for information privacy policies and practices and were leaving this responsibility; to the middle level managers who implement their own practices based on their own needs. / GR2017
22

Data security and data independence in a mobile military system

Akins, William Paul January 2010 (has links)
Photocopy of typescript. / Digitized by Kansas Correctional Industries
23

Department of Defense computer network security : an assessment of the state of the art

Scharf, James David January 2010 (has links)
Photocopy of typescript. / Digitized by Kansas Correctional Industries
24

Legal requirements of secure systems

Beckman, Joseph M January 2010 (has links)
Typescript (photocopy). / Digitized by Kansas Correctional Industries
25

Privacy and security of an intelligent office form

Lee, Kum-Yu Enid January 2010 (has links)
Typescript (photocopy). / Digitized by Kansas Correctional Industries / Department: Computer Science.
26

Security of distributed data systems

Finch, Steven D. January 2010 (has links)
Typescript (photocopy). / Digitized by Kansas Correctional Industries
27

Designing and implementing a network authentication service for providing a secure communication channel

Chance, Christopher P January 2010 (has links)
Typescript (photocopy). / Digitized by Kansas Correctional Industries / Department: Computer Science.
28

Non-discretionary access control for decentralized computing systems.

Karger, Paul Ashley January 1977 (has links)
Thesis. 1977. M.S.--Massachusetts Institute of Technology. Dept. of Electrical Engineering and Computer Science. / MICROFICHE COPY AVAILABLE IN ARCHIVES AND ENGINEERING. / Bibliography : leaves 131-139. / M.S.
29

A study of the computer systems development process of a large private company /

Li, Kwok-hung. January 1983 (has links)
Thesis (M.B.A.)--University of Hong Kong, 1983.
30

Navy Marine Corps Intranet : an analysis of its approach to the challenges associated with seat management contracting /

Bullock, Kenneth F. January 2003 (has links) (PDF)
Thesis (M.S. in Contract Management)--Naval Postgraduate School, June 2003. / Thesis advisor(s): Ron B. Tucker, Peter J. Proko. Includes bibliographical references (p. 89-90). Also available online.

Page generated in 0.1342 seconds