• No results found

Information security management: A case study of an information security culture

N/A
N/A
Protected

Academic year: 2021

Share "Information security management: A case study of an information security culture"

Copied!
301
0
0

Loading.... (view fulltext now)

Full text

Loading

Figure

Figure 1.1: Research Design
Figure 1.2: Structure of the Thesis
Table 2.1: The ISMS Waves description and issues (adapted from von Solms, 2000; 2006)
Figure 2.1: The waves of the development of the ISMS (von Solms, 2000;
+7

References

Related documents

The purpose of this paper is to contribute to the understanding of the gender gap in investor behavior by taking a behavioral perspective and, specifically, resting on the concept of

field at temperatures between 2 and 20 K (left) and the temperature-dependent magnetic entropy change for Fe 8 -A. field at temperatures between 2 and 20 K (left) and

Deep Dip Velocity-Nadir Velocity Target Velocity Track Damps rates to follow profile of planet-relative velocity vector around periapse; APP: +i tracks planet-relative velocity

35 Female labor participation may generate many intra-household effects: time allocation effects (e.g., both parents working have less time to allocate to child care or domestic

The interactive experience provided by this IPE event was an opportunity for students to practice professional collaboration around the topic of food intake, which is best

CITY OF PAWTUCKET’S PURCHASING OFFICE GENERAL CONDITIONS OF PURCHASE All City of Pawtucket purchase orders, contracts, solicitations, delivery orders and service requests shall

Assignment 1: Complete the tasks and answers all the questions listed in “What to do” in App: ID Dynamics Introduction. Characterizing Infectious Disease States. At home ,

Finally, the presented interaction proteome uncovered a large set of interactions with proteins genetically linked to a range of human diseases, including cancer, suggesting