Resubmit my Information Security Thesis? - You must be joking!
نویسندگان
چکیده
This paper presents a model for use by students and supervisors embarking upon higher degrees by research with specific application to information security. The model details a set of questions to be asked in preparing for the research in order to ensure a well planned and cohesive research project and written thesis.
منابع مشابه
Information Security in Distributed Healthcare Exploring the Needs for Achieving Patient Safety and Patient Privacy
In healthcare, patient information is a critical factor. The right information at the right time is a necessity in order to provide the best possible care for a patient. Patient information must also be protected from unauthorized access in order to protect patient privacy. It is furthermore common for patients to visit more than one healthcare provider, which implies a need for cross border he...
متن کاملSecuring Web Communications
On my honor as a University student, on this assignment I have neither given nor received unauthorized aid as defined by the Honor Guidelines for Papers in TCC Courses. Preface Succinctly stated, this thesis works towards securing regular web communications such as instant messaging and file sharing. One might ask, is this an exercise in futility? Who is going to spy on instant messaging conver...
متن کاملRespiratory Therapy Students’ Perceptions of Effective Teaching Characteristics of Clinical Instructors at an Urban University
The Master's Thesis Advisory Committee, as representatives of the faculty, certifies that this thesis has met all standards of excellence and scholarship as determined by the faculty. In presenting this thesis as partial fulfillment of the requirements for the advanced degree from Georgia State University, I agree that the library of Georgia State University shall make it available for inspecti...
متن کاملDevelopment and Validation of a Personal Information Security Assistant Architec- ture
This thesis presents and validates the first iteration of the design process of a Personal Information Security Assistant (PISA). The PISA aims to protect the information and devices of an end-user, offering advice and education in order to improve the security and awareness of its users. The PISA is a security solution that takes a user-centric approach, aiming to educate as well as protect, t...
متن کاملProvably Secure Cryptographic Hash Functions
The work on this thesis was part of a Study Abroad year at the University of New South Wales, Sydney. It has been a very valuable academic and personal experience, and thanks go to the many people who have supported and inspired me throughout this year. For the support with the work on this thesis, the greatest thanks go to my supervisors Jim Franklin and Richard Buckland. To Jim, for his never...
متن کامل