• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 433
  • 38
  • 35
  • 29
  • 19
  • 11
  • 8
  • 8
  • 8
  • 8
  • 8
  • 8
  • 7
  • 4
  • 4
  • Tagged with
  • 757
  • 757
  • 464
  • 347
  • 184
  • 182
  • 159
  • 122
  • 112
  • 112
  • 108
  • 103
  • 100
  • 86
  • 84
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
691

Helpdesk Support Alert System

Chinpanich, Vorapong 01 January 2004 (has links)
The goal of this project was to implement the Helpdesk Support Alert System in the Data Center Services (DCS) of California State University, San Bernardino's (CSUSB's) Information Resource and Technology Division (IRT). DCS is responsible for ensuring uninterrupted operation of all CSUSB administrative computing systems. These responsibilities include user support, system maintenance, and system security. The DCS helpdesk cannot be staffed 24 hours a day; this application is designed to alert DCS technicians of emergencies when they are away from the helpdesk. The Helpdesk Support Alert System sends out an automated emergency alert in the form of a short text message to technicians' mobile phones. Technicians respond back to their main office by using the Wireless Application Protocol (WAP) capability of their mobile phones.
692

Les mesures de sûreté : étude comparative des droits pénaux français et allemand / security measures : comparative study ot the German and French criminal law

Frinchaboy, Jenny 20 November 2015 (has links)
Les mesures de sûreté sont au cœur de la politique pénale actuelle, bien qu’elles soulèvent un grand nombre d’interrogations. Leur place est très incertaine en droit français qui, dans un souci de simplification, a opté pour un système de sanctions pénales à voie unique ne comportant que des peines. Pour autant, aux côtés des peines, il est un certain nombre de mesures de sûreté qui ne sont pas toujours reconnues comme telles, au détriment de la cohérence du droit positif. Le droit allemand, au contraire, a adopté le système « de la double voie », faisant coexister les peines et les mesures de sûreté au sein du code pénal. Ce système présente l’avantage de reconnaître la spécificité des mesures de sûreté, lesquelles reposent non sur la culpabilité du délinquant mais sur sa dangerosité. Bien que la distinction entre les deux catégories de sanctions pénales ne soit pas aisée en raison des nombreux points de convergence, une assimilation pure et simple entre les deux concepts s’avère impossible. Cette étude comparative de l’émergence et de l’autonomie des mesures de sûreté permet de conclure à la nécessité d’introduire un dualisme des sanctions pénales au sein du Code pénal français, avec un régime juridique complet et propre aux mesures de sûreté, distinct de celui des peines, mais s’inscrivant dans le respect des principes fondamentaux du droit pénal. / Security measures are at the heart of the current criminal policy, even though they raise a number of questions. Their place is very uncertain in French law, which has opted for a "single-track system", comprising only penalties, in the interest of simplification. Though, alongside the penalties, there are some security measures that are not always recognised as such, to the detriment of the coherence of the positive law. German law, on the contrary, has adopted a “dual-track system”, where penalties and security measures coexist within the criminal code. This system offers the advantage of recognizing the specificities of the security measures, which are not based on the guilt of the offender, but on his degree of danger. Although the distinction between the two categories of criminal sanctions is not an easy one, because of the areas of convergence, the two concepts cannot simply be treated as being the same. This comparative study of the emergence and the autonomy of the security measures concludes that a dualism of criminal sanctions should be introduced to the French criminal code with a complete own legal regime for the security measures, separate from the penalties’ regime, but in accordance with the basic principles of the criminal law.
693

A pro-active approach to curb asset theft at a South African mine

Horn, Riana Elizabeth 06 1900 (has links)
The South African mining industry has not been shielded from the criminal threat the country faces. In this case study, the nature and extent of asset theft at one of the largest mining companies in South Africa is analysed. The crime prevention strategy adopted by the mine to curb asset theft was studied over a period of five years. This involved a survey of the views of the security managers on the effectiveness of the strategy implemented by the mine. Against the background of the South African Government’s broad description of the crime prevention approach adopted by the country, the researcher explored whether it would be practicable to implement an integrated crime prevention strategy – encompassing situational, social and law enforcement crime prevention approaches on primary, secondary and tertiary level – at the participating mine in order to curb asset theft. / Police Practice / M. Tech. (Policing)
694

Management of security information in the security industry

Govender, Doraval 06 1900 (has links)
Incidents, threats and vulnerabilities have the potential to negatively affect an organisation’s assets. Information on these incidents, threats and vulnerabilities are important to security. It is therefore necessary for this security information to be effectively and efficiently managed, so that correct decisions may be made on the implementation of security risk control measures. This study explored the management of security information in the security industry by undertaking the following: • establishing the “status quo” of the collection and analysis of security information and the implementation of security risk control measures in practice; • identifying the nature and extent of problems experienced in the collection and analysis of security information and the implementation of security risk control measures; and the • discovery of a new Security Information Management Model (SIMM). Mixed methods research was used to study the management of security information in the security industry. The explorative research design was used for this purpose. Semi-structured and focus group interviews were conducted with senior security managers and operational security officers, respectively. The grounded theory research design was used to analyse the qualitative data in order to generate a substantive grounded theory. The theory is that security officers operate without a standardised framework to manage security information. The data from the semi-structured and the focus group interviews were used to design a questionnaire to conduct a survey using the quantitative approach. The non-experimental research design was used to conduct this self-administered questionnaire survey. The data from this questionnaire survey helped validate and confirm the substantive grounded theory. The study found that there was the need for a Security Information Management Model to manage security information in the security industry. Based on this finding the researcher recommended a new Security Information Management Model for the management of security information in the security industry. / Criminology and Security Science / D. Litt. et Phil. (Criminology)
695

Kyberbezpečnost v průmyslu / Cybersecurity in the engineering industry

Jemelíková, Kristýna January 2021 (has links)
The master’s thesis deals with the management of cyber security in a manufacturing company. The theoretical part contains concepts and knowledge of cyber security and discusses the current requirements of legislation and standards of the ISO/IEC 27000 series. In practical part are proposed measures to increase cyber security and information security based on the theoretical background and analysis of current state in the selected company.
696

Návrh přístupového systému jako součást řešení fyzické bezpečnosti / Design of Access System as a Part of Physical Security Solution

Dohnal, Matěj January 2017 (has links)
This master’s thesis deals with design of an access system as a part of physical security solution for an energy company in the Czech Republic. The access system is designed to meet all legal requirements and conform to ISO 27001 certification. Implementation of the proposed access system is demonstrated on the selected company object, a representative example of connecting the critical infrastructure element and the company's common facility.
697

Návrh zavedení bezpečnostních opatření podle ISMS ve společnosti vyvíjející finanční aplikaci. / Proposal for the implementation security measures according to ISMS in the company developing financial application.

Bukovský, Luděk January 2019 (has links)
The goal of this Master Thesis is a proposal for the implementation security measures in the company developing financial software application focused primarily on the Swiss market. These measures are based on results from present state of security in the company. There are the proposal for the security measures on the risk analysis results which are recommendation of the series of standards ISO/IEC 27000 and should lead to the risk reduction affecting the company.
698

Cybersecurity framework for cloud computing adoption in rural based tertiary institutions

Patala, Najiyabanu Noormohmed 18 May 2019 (has links)
MCom (Business Information Systems) / Department of Business Information Systems / Although technology is being progressively used in supporting student learning and enhancing business processes within tertiary institutions, certain aspects are hindering the decisions of cloud usage. Among many challenges of utilizing cloud computing, cybersecurity has become a primary concern for the adoption. The main aim of the study was to investigate the effect of cloud cyber-security usage at rural based tertiary institutions in order to compare the usage with an urban-based institution and propose a cybersecurity framework for adoption of cloud computing cybersecurity. The research questions focused on determining the drivers for cloud cybersecurity usage; the current adoption issues; how cybersecurity challenges, benefits, and quality affects cloud usage; the adoption perceptions and awareness of key stakeholders and identifying a cloud cybersecurity adoption framework. A quantitative approach was applied with data collected from a simple random sample of students, lecturers, admin and IT staff within the tertiary institutions through structured questionnaires. The results suggested compliance with legal law as a critical driver for cloud cybersecurity adoption. The study also found a lack of physical control of data and harmful activities executed on the internet as challenges hampering the adoption. Prevention of identity fraud and cheaper security costs were identified as benefits of adoption. Respondents found cloud cybersecurity to be accurate and effective, although most of the students and employees have not used it. However, respondents were aware of the value of cybersecurity adoption and perceive for it to be useful and convenient, hence have shown the intention of adopting it. There were no significant elements identified to differentiate the perceptions of usage at rural and urban-based tertiary institutions. The results of the study are to be used for clarifying the cybersecurity aspects of cloud computing and forecasting the suitability cloud cybersecurity within the tertiary institutions. Recommendations were made on how tertiary institutions and management can promote cloud cybersecurity adoption and how students, lecturers, and staff can effectively use cloud cybersecurity. / NRF
699

Google in China : examining hegemonic identification strategies in organizational rhetoric

Ford, Jonathan W. 07 October 2013 (has links)
Indiana University-Purdue University Indianapolis (IUPUI) / The author employs Hoffman and Ford’s method for analyzing organizational rhetoric to examine the discourse of Google, Inc. Employing a hybrid method, built on rhetorical criticism which incorporates elements of organizational communication theory, the analysis examines identity rhetoric present in Google’s discourse regarding its operations in China. Using this approach, the author leverages the method to critically examine hegemonic aspects of the discourse in order to examine how Google constructs its Western consumer based audience regarding online privacy and free speech.
700

Design and evaluation of a secure, privacy-preserving and cancelable biometric authentication : Bio-Capsule

Sui, Yan 04 September 2014 (has links)
Indiana University-Purdue University Indianapolis (IUPUI) / A large portion of system breaches are caused by authentication failure either during the system login process or even in the post-authentication session, which is further related to the limitations associated with existing authentication approaches. Current authentication methods, whether proxy based or biometrics based, are hardly user-centric; and they either put burdens on users or endanger users' (biometric) security and privacy. In this research, we propose a biometrics based user-centric authentication approach. The main idea is to introduce a reference subject (RS) (for each system), securely fuse the user's biometrics with the RS, generate a BioCapsule (BC) (from the fused biometrics), and employ BCs for authentication. Such an approach is user-friendly, identity-bearing yet privacy-preserving, resilient, and revocable once a BC is compromised. It also supports "one-click sign on" across multiple systems by fusing the user's biometrics with a distinct RS on each system. Moreover, active and non-intrusive authentication can be automatically performed during the user's post-authentication on-line session. In this research, we also formally prove that the proposed secure fusion based BC approach is secure against various attacks and compare the new approach with existing biometrics based approaches. Extensive experiments show that the performance (i.e., authentication accuracy) of the new BC approach is comparable to existing typical biometric authentication approaches, and the new BC approach also possesses other desirable features such as diversity and revocability.

Page generated in 0.0568 seconds