Essays about: "Information security knowledge"
Showing result 1 - 5 of 228 essays containing the words Information security knowledge.
-
1. Examining Bounded Rationality Influences on Decisions Concerning Information Security : A Study That Connects Bounded Rationality and Information Security
University essay from Stockholms universitet/Företagsekonomiska institutionenAbstract : This study investigates the impact of bounded rationality on information security decisions in public Swedish authorities. The research addresses how cognitive limitations and organizational dynamics shape decisions in this area. READ MORE
-
2. OpenCourse: Gamification in Computer Science Education
University essay from Göteborgs universitet/Institutionen för data- och informationsteknikAbstract : Academic degrees in computer science suffer from the highest dropout rates among universities. As a result, there is a lack of technical professionals, which could threaten the digital infrastructure. READ MORE
-
3. Students’ perceptions of genetically modified organisms : what is required to increase acceptance?
University essay from SLU/Dept. of People and SocietyAbstract : Producing enough food for the world's growing population is a challenge that puts great pressure on the agricultural food system to ensure global food security Furthermore, climate change is additionally exacerbating this challenge. Part of the solution could be genetically modified organisms (GMOs), but their use has been a source of controversy among various actors that have hindered their adoption. READ MORE
-
4. Why do people use public Wi-Fi? : An investigation of risk-taking behaviour and factors lead to decisions
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : The usage of public Wi-Fi and hotspots has witnessed a substantial increase in recent times, providing convenient connectivity in various public areas. Public wireless networks are now widely accessible, especially in smart cities. However, utilising public Wi-Fi exposes individuals to potential threats to their privacy and security. READ MORE
-
5. Cyber Threat Detection using Machine Learning on Graphs : Continuous-Time Temporal Graph Learning on Provenance Graphs
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Cyber attacks are ubiquitous and increasingly prevalent in industry, society, and governmental departments. They affect the economy, politics, and individuals. READ MORE