Suggested Topics within your search.
Suggested Topics within your search.
-
1Subjects: “...Cybersecurity...”
Thesis -
2
-
3
-
4
-
5by Sadiqah Aishah, Othman“... Model which has proven effective in mitigating cybersecurity risks through the first and second lines...”
Published 2023
Get full text
Get full text
Thesis -
6by Jazri, Husin“... while countries like Estonia developed the Government National Cybersecurity Index while the UK...”
Published 2019
Get full text
Get full text
Thesis -
7
-
8by Alam, RG Guntur“... massively in cyberspace and thus poses a security threat to smart city services. In Indonesia, cybersecurity...”
Published 2023
Get full text
Get full text
Get full text
Thesis -
9
-
10by Ali, Siti Hajar Aminah“... by cybersecurity field. Another different case of cybersecurity is the Distributed Denial of Services (DDoS...”
Published 2015
Get full text
Thesis -
11by Alshamsi, Sultan Khalifa Humaid Khalifa“... Theory and adding new variables focusing on the role of an organization's cybersecurity leadership...”
Published 2023
Get full text
Get full text
Thesis -
12
-
13by Mohammed, Idi“...The effectiveness of Nigeria Cybersecurity strategy can have serious effect on the Cybersecurity...”
Published 2019
Get full text
Thesis -
14
-
15
-
16by Alneyadi, Mohammed Rashed Mohammed Al Humaid Alneyadi“... to the realisation that the technology can improve cybersecurity and mitigate cybercrimes in both private...”
Published 2023
Get full text
Thesis -
17Subjects: “...Cybersecurity...”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
18Subjects: “...Cybersecurity...”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
19by Noor Suhani, Sulaiman“.... Responsibility norms are integrated into the model as a means to assess employees‘ behaviors toward cybersecurity...”
Published 2023
Get full text
Thesis -
20by Mohammed Abali, Aliyu“... security learning and a general support for cybersecurity protection. The project is a case study based...”
Published 2013
Get full text
Thesis