Skip to Main Content
Toggle search form
Toggle navigation
Search Research Guides
my.ryerson
Renew Loans
Home
Toggle navigation
Catalogue
Articles
Research Help
Services
About Us
Toronto Metropolitan University Libraries
Research Guides
Enterprise Security & Data Protection
Selected Theses
Search this Guide
Search
Enterprise Security & Data Protection
Home
Research Databases
Toggle Dropdown
All Databases A-Z
IT & Computing
Business
Law
Multidisciplinary
Search Everything
Data & GIS
Books & E-Books
Toggle Dropdown
Selected Books
Journals & E-Journals
Toggle Dropdown
Selected Journals
Theses & Dissertations
Selected Theses
Case Studies
Toggle Dropdown
Case Study Journals
Selected Case Studies
Analyzing Case Studies
ICT Industry Reports
Media
Web Sites
Toggle Dropdown
Research guides
Tutorials
Research Tips
Toggle Dropdown
Keyword & Boolean
Primary & Secondary
Literature Reviews
Evaluating Sources
Peer Reviewed/Scholarly
Impact Factors
Gray Literature
MBA-MTI Library Research
Citing & Referencing
Toggle Dropdown
APA Style
Citation Management
Enterprise Security & Data Protection: Selected Theses
Applications of context-aware systems in enterprise environments (2018) O.D. Oluwatimi. (Purdue University)
An analysis of the relationship between security information technology enhancements and computer security breaches and incidents (2016) L.Betz (Nova Southeastern University)
Cybersecurity within the healthcare industry and electronic health (20180 A.M.F. Hughbanks (Utica College)
Data protection and management solutions to desktop clients: Integration with enterprise tools (1999) V.S. Jayavarapu (Florida Atlantic University)
A data protection architecture for derived data control in partially disconnected networks (2012) E. Scalavino (Imperial College London)
A domain model for evaluating enterprise security (2001) M.A. Carmichael (Colorado Technical University)
Enterprise security analysis including denial of service countermeasures (2007) C. Dingankar (Clemson University)
An evaluation of information security management effectiveness (2006) P. Rohmeyer (Stevens Institute of Technology)
Exploring SME vulnerabilities to cyber-criminal activities through employee behavior and internet access. (2018) J.A. Twisdale (Walden University)
Exploring the implementation of cloud security to minimize electronic health records cyberattacks (2018) L.B. Tyler (Walden University)
Exploring the information security policies and practices required by small and medium-sized IT enterprises (2018) T. Al-jumaili (Colorado Technical University)
Exploring the strategies cybersecurity managers recommend for implementing or transitioning to the cloud (2018) M.L. Lucas (Colorado Technical University)
General deterrence theory: Assessing information systems security effectiveness in large versus small businesses (2009) J.H. Schuessler (university of North Texas)
Identifying factors contributing towards information security maturity in an organization (2018) M.M. Edwards (Nova Southeastern University)
The impact of artificial intelligence in cybersecurity (2018) N. Lidestri (Utica College)
Information security in the age of cloud computing (2012) J.E. Sims (University of Mississippi)
Information security practices and experiences in small businesses (2000) J.J.C.H. Ryan (George Washington University)
Information security risk analysis and advanced persistent threat: A multiple case study (2018) B. Zuhdi (Northcentral University)
Information technology governance: An exploratory study of the impact of organizational information technology security planning (2008) W.E. McGhee (Capella University)
Insider threat management: Bridging the gap between management and technology (2014) S.L. Hall (Utica College)
Migration of enterprise security to a database: A case study (2011) N. Yakovets (York University, Toronto)
Prevention of internal cyber-security threats (2014) D.N. Sykes Jr.(Walden University)
Privacy and security of personal health information: A novel user-Centric approach (2018) S. Abidi Tafreshi (University of Toronto)
Proactive cybersecurity through active cyber defense (2017) R.M.L. Collins (Utica College)
The role of information systems professionals in the provision for privacy and data protection within organisations, systems and the systems development process (2009) R. G. Howley (De Montfort University)
Secure Data Deduplication in Cloud Environments (2015) Fatema Rashid (Ryerson University)
Security measures and effective corporate information systems management: An examination of issues surrounding computer network security (2006) F. Kuegah (Capella University)
The security of the IT resource and management support: Security risk management program effectiveness (2001) A.G. Kotulic (University of Texas at Arlington)
Shaping strategic information systems security initiatives in organizations (2008) G.P.S. Tejay (Virginia Commonwealth University)
Small-medium business information security intention related to cyberthreat awareness: A quantitative experiment (2018) J. Cleveland (Northcentral University)
Strategies used by cloud security managers to implement secure access methods (2018) E. Harmon (Walden University)
Threat to retail business information security: Cybersecurity in the retail industry (2017) K.P. Luansing (Utica College)
Three essays on information technology security management in organizations (2011) M. Gupta (SUNY Buffalo)
Towards more manageable and secure enterprise and data-center networks (2018) C. Jin (University of Minnesota)
Trade-offs among data security, usability and complexity in mobile cloud computing. (2018) K. Zhou (Michigan State University)
<<
Previous:
Theses & Dissertations
Next:
Case Studies >>