Murigi, 2017 - Google Patents
Information technology security practices and performance of small and medium enterprises in Nairobi county, KenyaMurigi, 2017
View PDF- Document ID
- 18315140186432249455
- Author
- Murigi G
- Publication year
- Publication venue
- Unpublished MBA Thesis, Kenyatta University
External Links
Snippet
INFORMATION TECHNOLOGY SECURITY PRACTICES AND PERFORMANCE OF SMALL
AND MEDIUM ENTERPRISES IN NAIROBI COUNTY, KENYA GLADWELL NJO Page 1
INFORMATION TECHNOLOGY SECURITY PRACTICES AND PERFORMANCE OF SMALL …
- 238000005516 engineering process 0 title abstract description 217
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Talabis et al. | Information security risk assessment toolkit: Practical assessments through data collection and data analysis | |
Lu et al. | Deployment of supply chain security practices: Antecedents and consequences | |
Tambwe et al. | Benefits of construction data risks management in the construction industry | |
Murigi | Information technology security practices and performance of small and medium enterprises in Nairobi county, Kenya | |
Shaaban | Enhancing the governance of information security in developing countries: the case of Zanzibar | |
Price | Reducing the risk of a data breach using effective compliance programs | |
Sipior et al. | Information technology operational risk: A teaching case | |
Davis | Relationship between corporate governance and information security governance effectiveness in United States corporations | |
Schütte et al. | Corruption risks in the criminal justice chain and tools for assessment | |
Kiriakou | Acceptance factors influencing adoption of National Institute of Standards and Technology information security standards: A quantitative study | |
Bottomley | Data and algorithms in the workplace: an overview of current public policy strategies | |
Tesha | Assessing Factors Affecting Data Privacy in Local Government Authorities in Tanzania | |
Galang et al. | Philippine Social Security System: An Evaluation Of Strategic Approach To Digital Services | |
Eugene | A Delphi Study: A Model to Help IT Management within Financial Firms Reduce Regulatory Compliance Costs for Data Privacy and Cybersecurity | |
Molapo | Security vetting in the Department of Home Affairs | |
Nikitin | Achieving privacy and iso 27001 standard | |
Larkey | Exploring the strategies cybersecurity specialist need to minimize security risks in non-profit organizations | |
Orellana | Cybersecurity incident response capabilities in the Ecuadorian small business sector: A qualitative study | |
Babalola | Effective Strategies for Cybersecurity and Information Technology Governance for Small Business Leaders: A Quantitative Study | |
D'Arcy | Security countermeasures and their impact on information systems misuse: A deterrence perspective | |
MOSHI | Assessment Of the Role of Information Security Best Practices on Public Service Delivery | |
Al-Awadi | A study of employees' attitudes towards organisational information security policies in the UK and Oman | |
Goh | Information security: the importance of the human element | |
Song | Evaluation of the Intents of Noncompliance with the Organizational Information Systems Security Policy | |
Baker | Self-Accreditations Versus Third-Party Audits: Understanding if Variances Exist when Assessing General Cybersecurity Frameworks |