• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 3
  • 1
  • 1
  • Tagged with
  • 7
  • 7
  • 3
  • 3
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

The attitude of the dominions to organization for international security and welfare, 1939-45

Forbes, Alexander James de Burgh January 1954 (has links)
No description available.
2

Norsk sikkerhetspolitikk etter den kalde krigen

Schjølberg, Kai. 16 December 1999 (has links)
Hovedoppgave i statsvitenskap Universitetet i Oslo Institutt for statsvitenskap 1997.
3

An Approach to Effectively Identify Insider Attacks within an Organization

Doss, Gary 01 January 2012 (has links)
The purpose of this research is to identify the factors that influence organizational insiders to violate information security policies. There are numerous accounts of successful malicious activities conducted by employees and internal users of organizations. Researchers and organizations have begun looking at methods to reduce or mitigate the insider threat problem. Few proposed methods and models to identify, deter, and prevent the insider threat are based on empirical data. Additionally, few studies have focused on the targets or goals of the insider with organizational control as a foundation. From a target perspective, an organization might be able to control the outcome of a malicious insider threat attack. This research applied a criminology lens as an organization policy violation is, or resembles, a criminal activity. This research uses the Routine Activities Theory (RAT) as a guide to develop a theoretical model. The adoption of RAT was for its focus on the target and the protective controls, while still taking into account the motivated offender. The study identified the components of the model concerning insider threats, espionage, and illicit behavior related to information systems through literature. This led to the development of 10 hypotheses regarding the relationships of key factors that influence malicious insider activity. Data was collected using a scenario-based survey, which allowed for impartial responses from a third-person perspective. This technique has become popular in the field of criminology, as the effects of social desirability, acceptance, or repudiation will not be a concern. A pilot test verified the survey's ability to collect the appropriate data. The research employed Structural Equation Modeling (SEM) and Confirmatory Factor Analysis (CFA) techniques to analyze and evaluate the data. SEM and CFA techniques identified the fit of the model and the factors that influence information security policy violations. The result of the analysis provided criteria to accept the hypotheses and to identify key factors that influence insider Information System policy violations. This research identified the relationships and the level of influence between each factor.
4

Mitigating proliferation : an assessment of nonproliferation institutions, international law, and preemptive counterproliferation intervention /

Wood, John Randolph. January 2004 (has links)
Thesis (Ph.D.)--Tufts University, 2004. / Submitted to the Fletcher School of Law and Diplomacy. Includes bibliographical references (leaves 271-290). Access restricted to members of the Tufts University community. Also available via the World Wide Web;
5

Návrh a nasazení systému řízení bezpečnosti informací ve výukovém středisku / Design and Deployment of Information Security Management System in Educational Center

Křížová, Romana January 2014 (has links)
This Master´s thesis is focused on the security of Educational center running a research aimed at chemical industry. In the first part the theoretical basis followed in the field are defined. The practical part is based on the security of a property considering the technical aspects as well as the suggestions of the trainings of managers and employees and sets respective permissions. A guide price calculation is also essential this project. The practical part evolves the existing analysis of the property.
6

Návrh zavedení nutných oblastí ISMS ve veřejné správě / The proposal for implementation of essential ISMS sections at the public administration

Klepárník, Roman January 2018 (has links)
This diploma thesis focuses on the application of information security management system in the public administration. Thesis focuses on the most frequent threats on information security and describes the best practices which are compliant with the ISO/IEC 27000. It contains the proposal of security recommendation that will help the organisation with ensuring better information security and with the preparation for GDPR
7

Uplatnění managementu bezpečnosti informací ve veřejné správě / Application of Information Security Management in Public Administration

Trtílek, Ivo January 2013 (has links)
The diploma thesis deals with an application of information security management system in the organization of public administration and local government. It defines important terms and describes the best practices which are compliant with the ISO/IEC 27000. It contains draft of security manual that can be used as an organization tool for human resources security, IT and physical and environmental security of the organization.

Page generated in 0.1331 seconds