Essays about: "Information security knowledge"

Showing result 1 - 5 of 228 essays containing the words Information security knowledge.

  1. 1. Examining Bounded Rationality Influences on Decisions Concerning Information Security : A Study That Connects Bounded Rationality and Information Security

    University essay from Stockholms universitet/Företagsekonomiska institutionen

    Author : Oskar Malm Wiklund; Caroline Larsson; [2024]
    Keywords : Decision-making; Rationality; Bounded Rationality; Information Security; Public Authority; Organizational Culture; Information Systems;

    Abstract : This study investigates the impact of bounded rationality on information security decisions in public Swedish authorities. The research addresses how cognitive limitations and organizational dynamics shape decisions in this area. READ MORE

  2. 2. OpenCourse: Gamification in Computer Science Education

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : Gustaf Bodin; Elias Ekroth; Tobias Engblom; Filip Linde; Anwarr Shiervani; [2023-03-03]
    Keywords : Gamification; Education; Heuristic Evaluation; Desktop Application Development; Spelifiering; Utbildning; Heuristisk Utvärdering; Datorapplikationsutveckling;

    Abstract : Academic degrees in computer science suffer from the highest dropout rates among universities. As a result, there is a lack of technical professionals, which could threaten the digital infrastructure. READ MORE

  3. 3. Students’ perceptions of genetically modified organisms : what is required to increase acceptance?

    University essay from SLU/Dept. of People and Society

    Author : Emma Lif; [2023]
    Keywords : Genetically modified organisms; perceptions; acceptance; students; qualitative semi-structured interviews;

    Abstract : Producing enough food for the world's growing population is a challenge that puts great pressure on the agricultural food system to ensure global food security Furthermore, climate change is additionally exacerbating this challenge. Part of the solution could be genetically modified organisms (GMOs), but their use has been a source of controversy among various actors that have hindered their adoption. READ MORE

  4. 4. Why do people use public Wi-Fi? : An investigation of risk-taking behaviour and factors lead to decisions

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Mohamad Abdulkader; [2023]
    Keywords : Public Wi-Fi; hotspots; wireless networks; privacy; security; awareness; attitude; knowledge; risks; factor;

    Abstract : The usage of public Wi-Fi and hotspots has witnessed a substantial increase in recent times, providing convenient connectivity in various public areas. Public wireless networks are now widely accessible, especially in smart cities. However, utilising public Wi-Fi exposes individuals to potential threats to their privacy and security. READ MORE

  5. 5. Cyber Threat Detection using Machine Learning on Graphs : Continuous-Time Temporal Graph Learning on Provenance Graphs

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jakub Reha; [2023]
    Keywords : Graph neural networks; Temporal graphs; Benchmark datasets; Anomaly detection; Heterogeneous graphs; Provenance graphs; Grafiska neurala nätverk; temporala grafer; benchmark-datauppsättningar; anomalidetektering; heterogena grafer; härkomstgrafer;

    Abstract : Cyber attacks are ubiquitous and increasingly prevalent in industry, society, and governmental departments. They affect the economy, politics, and individuals. READ MORE