• Bibliography
  • More Referencing guides Blog Automated transliteration Relevant bibliographies by topics
  • Automated transliteration
  • Relevant bibliographies by topics
  • Referencing guides

Dissertations / Theses on the topic 'Cybersecurity strategy'

Create a spot-on reference in apa, mla, chicago, harvard, and other styles.

Select a source type:

  • Journal article
  • Video (online)
  • All types...
  • Archival document
  • Book chapter
  • Complete reference
  • Conference paper
  • Copyright certificate
  • Dictionary entry
  • Dissertation / Thesis
  • Encyclopedia
  • Encyclopedia article
  • Extended abstract of dissertation
  • Newspaper article
  • Press release
  • Religious text
  • Social media post

Consult the top 21 dissertations / theses for your research on the topic 'Cybersecurity strategy.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

Boutwell, Mark. "Exploring Industry Cybersecurity Strategy in Protecting Critical Infrastructure." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7965.

Gcaza, Noluxolo. "A national strategy towards cultivating a cybersecurity culture in South Africa." Thesis, Nelson Mandela University, 2017. http://hdl.handle.net/10948/13735.

Galán, Carlos Manuel, and Cordero Carlos Galán. "Public cybersecurity as guarantee of the exercise of rights." Derecho & Sociedad, 2017. http://repositorio.pucp.edu.pe/index/handle/123456789/117704.

Raina, Ravi. "A systems perspective on cybersecurity in the cloud : frameworks, metrics and migration strategy." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/107602.

Cornel, Cariana June. "Cybersecurity Education in Utah High Schools: An Analysis and Strategy for Teacher Adoption." BYU ScholarsArchive, 2019. https://scholarsarchive.byu.edu/etd/8592.

Kang, Johan, and Sebastian Westskytte. "Diffusion of Cybersecurity Technology - Next Generation, Powered by Artificial Intelligence." Thesis, KTH, Industriell ekonomi och organisation (Inst.), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-246027.

Chomyšyn, Maxim. "Dopad bezpečnosti IIoT na proaktivní údržbu firemních aktiv." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2020. http://www.nusl.cz/ntk/nusl-417807.

Cho, Yiseul. "Strategic philanthropy for cyber security : an extended cost-benefit analysis framework to study cybersecurity." Thesis, Massachusetts Institute of Technology, 2012. http://hdl.handle.net/1721.1/72880.

Sulanová, Monika. "Strategie pro rozvoj vzdělávání v oblasti bezpečnosti ICT na vysokých školách." Master's thesis, Vysoká škola ekonomická v Praze, 2017. http://www.nusl.cz/ntk/nusl-358805.

Dahlquist, Kyla N. "Strategic Protection of Vital U.S. Assets Abroad: Intellectual Property Protection in the Trans-Pacific Partnership." University of Cincinnati / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1408709770.

Senate, University of Arizona Faculty. "Faculty Senate Minutes February 6, 2017." University of Arizona Faculty Senate (Tucson, AZ), 2017. http://hdl.handle.net/10150/622775.

Arowolo, Olatunji Mujib. "Strategic Cyber-Risk Implications of Cloud Technology Adoption in the U.S. Financial Services Sector." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4347.

Rajan, R., Nripendra P. Rana, N. Parameswar, S. Dhir, Sushil, and Y. K. Dwivedi. "Developing a modified total interpretive structural model (M-TISM) for organizational strategic cybersecurity management." 2021. http://hdl.handle.net/10454/18482.

Huang, Chih-Hsuan, and 黃志軒. "The Development of U.S. Cybersecurity Strategy Under The Concept of Homeland Security." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/45617348022547593270.

Jandura, Lukáš. "Možnosti zlepšení strategií pro kybernetickou bezpečnost." Master's thesis, 2016. http://www.nusl.cz/ntk/nusl-344663.

Lopes, Carvalho Viana André. "NATO and Offensive Cybersecurity: A Strategic Analysis." Master's thesis, 2018. http://www.nusl.cz/ntk/nusl-387165.

(5929946), James E. Lerums. "Measuring the State of Indiana's Cybersecurity." Thesis, 2019.

This dissertation introduces a scorecard to enable the State of Indiana to measure the cybersecurity of its public and private critical infrastructure and key resource sector organizations. The scorecard was designed to be non-threatening and understandable so that even small organizations without cybersecurity expertise can voluntarily self-asses their cybersecurity strength and weaknesses. The scorecard was also intended to enable organizations to learn, so that they may identify and self-correct their cybersecurity vulnerabilities. The scorecard provided quantifiable feedback to enable organizations to benchmark their initial status and measure their future progress.

Using the scorecard, the Indiana Executive Council for Cybersecurity launched a Pilot to measure cybersecurity of large, medium, and small organizations across eleven critical infrastructure and key resources sectors. This dissertation presents the analysis and results from scorecard data provided by the Pilot group of 56 organizations. The cybersecurity scorecard developed as part of this dissertation has been included in the Indiana Cybersecurity Strategy Plan published September 21, 2018.

Magina, Matilde Rodrigues Ribeiro. "O Instituto da Defesa Nacional como Centro de Pensamento Estratégico na sensibilização pública para a Cibersegurança." Master's thesis, 2019. http://hdl.handle.net/10362/91706.

Onumo, Aristotle, Andrea J. Cullen, and Irfan U. Awan. "Empirical study of cultural dimensions and cybersecurity development." 2017. http://hdl.handle.net/10454/12442.

Hasan, Mahmudul. "Cybersecurity Planning Insight: CSCD (Cyber Security and Cyber Defense) Control: Framework For Strategic Direction and Governance." Master's thesis, 2021. http://hdl.handle.net/10362/126392.

Persoglia, Davide. "Between Defence and Offence: An Analysis Of The US "Cyber Strategic Culture"." Master's thesis, 2018. http://www.nusl.cz/ntk/nusl-388122.

IMAGES

  1. Cybersecurity strategy…. To Plan or not to plan…That is the question

    cyber security strategy thesis

  2. Trending Top 15+ Cybersecurity Thesis Topics [Research Domain]

    cyber security strategy thesis

  3. Top 9 Cyber Security Thesis Ideas [PhD & MS Scholars] Novel Proposal

    cyber security strategy thesis

  4. Risk UK GCHQ relaunches '10 Steps to Cyber Security' Guide for end user organisations

    cyber security strategy thesis

  5. Strategic Activities

    cyber security strategy thesis

  6. (PDF) cyber-security-thesis

    cyber security strategy thesis

COMMENTS

  1. How to Negotiate Your Cyber Security Salary: Tips and Strategies

    As the world becomes more reliant on technology, the demand for cyber security professionals continues to rise. If you’re considering a career in this field, it’s important to understand how to negotiate your cyber security salary.

  2. Unlock Your Potential: Essential Strategies for Beginner Thesis Writers

    Writing a thesis can be an overwhelming task, especially for beginners. The thought of conducting extensive research, organizing ideas, and crafting a coherent argument can send anyone into a panic. But fear not.

  3. Unlocking Success: Strategies for Overcoming Writer’s Block in Thesis Writing

    Writing a thesis can be a daunting task, especially when faced with writer’s block. It is not uncommon for students to feel overwhelmed and struggle to find the right words to express their ideas. But fear not.

  4. Exploring Industry Cybersecurity Strategy in Protecting Critical

    RQ: What IT cybersecurity strategies are used by IT managers and compliance officers to mitigate cyber threats to critical infrastructure? Page 16. 5.

  5. Successful Operational Cyber Security Strategies for Small ...

    Business owners cannot afford cyberattacks. Cybersecurity professionals need to have a well-crafted security strategy in place to prevent future attacks. The

  6. Dissertations / Theses: 'Cybersecurity strategy'

    The thesis integrates cybersecurity methods and frameworks as well as security metrics with the cloud migration strategy. Additionally, it also

  7. (PDF) Thesis on Cyber Security Management and PolIcy

    PDF | An Exploration of Developing Issues and the relationship between Information Technology Governance and Multi-stakeholder Security

  8. master thesis strategic assessment of cyber security contenders to

    TRINKS, VIRGÍNIA DE MELO DANTAS. STRATEGIC ASSESSMENT OF CYBER SECURITY CONTENDERS TO THE BRAZILIAN AGRI-. BUSINESS IN THE BEEF SECTOR [Distrito Federal]

  9. Bachelor thesis

    ... security work to create an all-inclusive cyber security strategy that helps protect an organisation's assets and customers from cyber-attacks.

  10. Strategic Management of the Organizations Cybersecurity

    thesis is summarized study of the strategic cybersecurity management limited to these outside enforced constraints. What comes to

  11. national and international cybersecurity strategies of the

    This thesis aims to explore how cybersecurity has become a national security issue for the United States. It will analyze the issue by trying to answer the

  12. A Systematic Approach for Cybersecurity Risk Management

    Second, to help organizations avoid the common pitfalls after establishing their basic cybersecurity risk management strategy, this thesis aims to apply the

  13. The Effectiveness of Britain's Cybersecurity

    strategy on cybersecurity, titled “National Cyber Security Strategy 2016-2021.

  14. Cybersecurity Strategy in Developing Nations: A Jamaica Case Study

    Abstract. Developing nations have been slow to develop and implement cybersecurity strategies despite a growing threat to governance and public security.