• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 504
  • 120
  • 66
  • 35
  • 30
  • 28
  • 18
  • 15
  • 10
  • 5
  • 4
  • 4
  • 3
  • 3
  • 2
  • Tagged with
  • 1021
  • 217
  • 212
  • 166
  • 142
  • 123
  • 120
  • 104
  • 99
  • 92
  • 80
  • 77
  • 77
  • 72
  • 67
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
911

Management of security information in the security industry

Govender, Doraval 06 1900 (has links)
Incidents, threats and vulnerabilities have the potential to negatively affect an organisation’s assets. Information on these incidents, threats and vulnerabilities are important to security. It is therefore necessary for this security information to be effectively and efficiently managed, so that correct decisions may be made on the implementation of security risk control measures. This study explored the management of security information in the security industry by undertaking the following: • establishing the “status quo” of the collection and analysis of security information and the implementation of security risk control measures in practice; • identifying the nature and extent of problems experienced in the collection and analysis of security information and the implementation of security risk control measures; and the • discovery of a new Security Information Management Model (SIMM). Mixed methods research was used to study the management of security information in the security industry. The explorative research design was used for this purpose. Semi-structured and focus group interviews were conducted with senior security managers and operational security officers, respectively. The grounded theory research design was used to analyse the qualitative data in order to generate a substantive grounded theory. The theory is that security officers operate without a standardised framework to manage security information. The data from the semi-structured and the focus group interviews were used to design a questionnaire to conduct a survey using the quantitative approach. The non-experimental research design was used to conduct this self-administered questionnaire survey. The data from this questionnaire survey helped validate and confirm the substantive grounded theory. The study found that there was the need for a Security Information Management Model to manage security information in the security industry. Based on this finding the researcher recommended a new Security Information Management Model for the management of security information in the security industry. / Criminology and Security Science / D. Litt. et Phil. (Criminology)
912

THE THREAT OF ABLEIST ATTITUDES ON THE PERFORMANCE AND WELL-BEING OF INDIVIDUALS WITH DISABILITIES

Michael James Lotz (11812457) 19 December 2021 (has links)
<p>The dissertation includes two independent chapters which investigated the experiences of individuals with disabilities in connection with societal attitudes regarding disability. The first article is a systematized review which analyzes and synthesizes the existing literature on implicit and explicit disability attitudes across multiple domains (e.g., educational; occupational; healthcare). Chapter 1 identifies common themes across the existing literature and identifies potential predictors and buffers of negative disability attitudes. The article concludes with a call to counseling psychologists to address negative disability attitudes utilizing the roles and themes of the field. Finally, suggestions are made regarding the development and implementation of interventions to help address negative disability attitudes and the subsequent harmful effects. </p><p>The second article is an empirical study that examines factors related to the persistence intentions of individuals with disabilities to address the high attrition rates of this population within postsecondary environments. A moderated mediation model is proposed to address four hypotheses. First, I hypothesized academic self-efficacy would mediate the relationship between stereotype threat and persistence intentions. Second, coping self-efficacy would mediate the relationship between stereotype threat and persistence intentions. Third, social self-efficacy would mediate the relationship between stereotype threat and persistence intentions. Fourth, I hypothesized that endorsing a growth mindset would buffer against the negative indirect relationship between stereotype threat and persistence intentions which operate through academic self-efficacy. Data were collected from postsecondary students who identified as having one or multiple diagnosed disabilities at a large public university in the Midwest. The study results supported my first hypothesis that academic self-efficacy would significantly mediate the relationship between stereotype threat and persistence intentions. Additionally, the results revealed that high levels of perceived stereotype threat were associated with lower levels of coping self-efficacy and social self-efficacy, as the researcher anticipated. However, our second and third hypotheses were rejected due to these mediating factors not significantly influencing a participants’ intentions to persist within the academic environment. Finally, the results suggested that one’s mindset of intelligence was a positive main effect predictor of academic self-efficacy. However, contrary to our fourth hypothesis, mindset of intelligence did not significantly moderate the negative indirect relation between stereotype threat and persistence intentions that operate through academic self-efficacy.</p>
913

Examining the Relationship between Test Anxiety and Growth Mindset Among Elementary School Students in a Test-Driven Culture

Norman, Tiffany M. 26 July 2021 (has links)
No description available.
914

Správa uživatelů jako zdroje rizik / Managing Users as a Source of Risk

Pospíšil, Petr January 2017 (has links)
This diploma thesis focuses on human resources mainly in Critical information infrastructure and Important information systems. Thesis focuses on the most frequent threats for users and design possible model of threat reduction. Integral part of results is designing of effective security awareness education program according to the Law on Cyber Security.
915

Návrh zavedení bezpečnostních opatření podle ISMS ve společnosti vyvíjející finanční aplikaci. / Proposal for the implementation security measures according to ISMS in the company developing financial application.

Bukovský, Luděk January 2019 (has links)
The goal of this Master Thesis is a proposal for the implementation security measures in the company developing financial software application focused primarily on the Swiss market. These measures are based on results from present state of security in the company. There are the proposal for the security measures on the risk analysis results which are recommendation of the series of standards ISO/IEC 27000 and should lead to the risk reduction affecting the company.
916

Návrh zavedení ISMS ve veřejné správě / The proposal of ISMS implementation in the public administration

Štukhejl, Kamil January 2019 (has links)
This diploma thesis focuses on the implementation of information security management system in the public administration based on ISO/IEC 27000 series of standards. The thesis contains theoretical background, introduction of the organization, risk analysis and a proposal of appropriate measures for minimization of these identified risks. In the end, an implementation plan is proposed including an economic evaluation.
917

Návrh podnikatelského plánu pro vznik a rozvoj společnosti / Business Plan Proposal for a Company

Kingová, Jana January 2021 (has links)
The content of this diploma thesis is a proposal for a business plan for the establishment and development of a company. Specifically, it is a business plan for a café called Ollie, which is also a community center, a workshop and a place to work situated in Brno Komárov, near the Komec sports complex. The first part consists of the theoretical basis of the work containing an explanation of the concepts needed to write the practical part of the thesis. The practical part contains an analysis of the current state and the actual design of the solution. Methods used are for example PESTLE or Porter’s Analysis.
918

Gymnasielagen - en möjlighet kantad av hinder : En kritisk diskursanalys av propositionen till den nya Gymnasielagen

Söderin, Ida January 2021 (has links)
The purpose of this thesis is to perform a critical discourse analysis on the upper secondary school act aiming to map which discourses that are being reproduced concerning unaccompanied youths, as well as the motivation behind the creation of the law. Furthermore, the purpose is to investigate the consequences of the discourses produced for unaccompanied youths’ rights claims. Faircloughs discursive model of three levels was used to review the proposition. This was complemented by an analysis of the result in relation to the Copenhagen school of securitization as well as Elena Namlis perspective on human rights. The review revealed that the dominating discourse in the upper secondary school act depicts the unaccompanied youths as foreign and potential threats. The law is motivated by the need to compensate for the Migration boards’ long processing time for their application of asylum upon arrival. It is said that this specific group ended up in an misfortuned situation. It is also explained that the law will trigger the youths to integrate through the demand of them needing to finish high school and find a job within 6 months in order to get asylum. However, this thesis also shows that the government is not fully ready to compensate for this misfortune as the demands, qualification to be available for this law, and security control of youths are implemented. Those obsticles are motivated by the view of the youths as existential threats and could be viewed as a sign of securitization of unaccompanied youths. What follows is them having a more difficult path of reaching their rights of asylum.
919

Zavedení managementu bezpečnosti informací v podniku dle ISO 27001 / Implementation of Information Security Management in Company According to ISO 27001

Šumbera, Adam January 2013 (has links)
This diploma thesis deals with implementation of the information security management system in company. The theoretical part of thesis summarizes the theoretical knowledge in the field of information security and describes a set of standards ISO/IEC 27000. In the following section the specific company is analysed, and to this company there are then applied theoretical knowledge during the implementation of information security management system.
920

Zavedení ISMS v obchodní společnosti / Implementation of ISMS in the Commercial Company

Dejmek, Martin January 2013 (has links)
This master thesis deals with the implementation of information security management system in the company. It summarizes the theoretical background in this field and uses it to analyze the current state of information security, as well as analysis and risk management and not least the actual implementation of ISMS in the particular company. This work also contains three groups of measures that reduce the impact of identified risks and which also implements an essential parts of ISMS.

Page generated in 0.0457 seconds