[go: up one dir, main page]

Murigi, 2017 - Google Patents

Information technology security practices and performance of small and medium enterprises in Nairobi county, Kenya

Murigi, 2017

View PDF
Document ID
18315140186432249455
Author
Murigi G
Publication year
Publication venue
Unpublished MBA Thesis, Kenyatta University

External Links

Snippet

INFORMATION TECHNOLOGY SECURITY PRACTICES AND PERFORMANCE OF SMALL AND MEDIUM ENTERPRISES IN NAIROBI COUNTY, KENYA GLADWELL NJO Page 1 INFORMATION TECHNOLOGY SECURITY PRACTICES AND PERFORMANCE OF SMALL …
Continue reading at ir-library.ku.ac.ke (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Talabis et al. Information security risk assessment toolkit: Practical assessments through data collection and data analysis
Lu et al. Deployment of supply chain security practices: Antecedents and consequences
Tambwe et al. Benefits of construction data risks management in the construction industry
Murigi Information technology security practices and performance of small and medium enterprises in Nairobi county, Kenya
Shaaban Enhancing the governance of information security in developing countries: the case of Zanzibar
Price Reducing the risk of a data breach using effective compliance programs
Sipior et al. Information technology operational risk: A teaching case
Davis Relationship between corporate governance and information security governance effectiveness in United States corporations
Schütte et al. Corruption risks in the criminal justice chain and tools for assessment
Kiriakou Acceptance factors influencing adoption of National Institute of Standards and Technology information security standards: A quantitative study
Bottomley Data and algorithms in the workplace: an overview of current public policy strategies
Tesha Assessing Factors Affecting Data Privacy in Local Government Authorities in Tanzania
Galang et al. Philippine Social Security System: An Evaluation Of Strategic Approach To Digital Services
Eugene A Delphi Study: A Model to Help IT Management within Financial Firms Reduce Regulatory Compliance Costs for Data Privacy and Cybersecurity
Molapo Security vetting in the Department of Home Affairs
Nikitin Achieving privacy and iso 27001 standard
Larkey Exploring the strategies cybersecurity specialist need to minimize security risks in non-profit organizations
Orellana Cybersecurity incident response capabilities in the Ecuadorian small business sector: A qualitative study
Babalola Effective Strategies for Cybersecurity and Information Technology Governance for Small Business Leaders: A Quantitative Study
D'Arcy Security countermeasures and their impact on information systems misuse: A deterrence perspective
MOSHI Assessment Of the Role of Information Security Best Practices on Public Service Delivery
Al-Awadi A study of employees' attitudes towards organisational information security policies in the UK and Oman
Goh Information security: the importance of the human element
Song Evaluation of the Intents of Noncompliance with the Organizational Information Systems Security Policy
Baker Self-Accreditations Versus Third-Party Audits: Understanding if Variances Exist when Assessing General Cybersecurity Frameworks