Essays about: "Security Recommendations"

Showing result 1 - 5 of 166 essays containing the words Security Recommendations.

  1. 1. “Cross Your Fingers and Hope You Don’t Get Hacked” : A Qualitative Study on The Psychological Factors Behind Non-Compliance with Cybersecurity Recommendations

    University essay from Uppsala universitet/Institutionen för informatik och media

    Author : Rebecca Biese; Gabriél Österwall; [2024]
    Keywords : ;

    Abstract : Cybersecurity is one of the most important issues in today’s digitalized society, with new technology and security policies constantly being developed. However, one of the largest challenges threatening cybersecurity is the human factor — an aspect that is often overlooked in cybersecurity research and development. READ MORE

  2. 2. EUROPE’S QUEST FOR STRATEGIC AUTONOMY - A Liberal Intergovernmentalism Approach to the Initiatives of the CSDP introduced amidst the Russian Invasions of Ukraine (2014 and 2022)

    University essay from Göteborgs universitet/Statsvetenskapliga institutionen

    Author : Stavros Apostolopoulos; [2023-11-29]
    Keywords : European Union; Strategic Autonomy; Common Security and Defence Policy CSDP ; Liberal Intergovernmentalism LI ;

    Abstract : In a rapidly evolving geopolitical landscape marked by the Russian invasions of Ukraine between 2014 and 2022, the European Union’s security and defence policy approaches have garnered significant attention. This research critically examines the adaptations within the European Union’s Common Security and Defense Policy (CSDP) initiatives in this context. READ MORE

  3. 3. Identifying Threat Factors of Vulnerabilities in Ethereum Smart Contracts

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Mah Noor; Syeda Hina Murad; [2023]
    Keywords : Smart contract; Blockchain; Ethereum; attacks; security vulnerabilities; security audits;

    Abstract : Ethereum is one of the top blockchain platforms that represents this second generation of blockchain technology. However, the security vulnerabilities associated with smart contracts pose significant risks to confidentiality, integrity, and availability of applications supported by Ethereum. READ MORE

  4. 4. Visual Communication in Driving Social Innovation for Disadvantaged groups in Nami

    University essay from Linköpings universitet/Medie- och Informationsteknik; Linköpings universitet/Tekniska fakulteten

    Author : Mufaro Nhundu; [2023]
    Keywords : Social Innovation; Food Security; Visual Communication; Human Centered Design.;

    Abstract : This master’s thesis aims to explore the potential of visual communication as a powerful tool for promoting change and impact in Namibia with a focus on sustainable agriculture and food security. The study analyzes how graphic design and visual communication may effectively explain best practices for sustainable farming and inspire young adults in rural communities to engage with agriculture through empirical research. READ MORE

  5. 5. Matching ESCF Prescribed Cyber Security Skills with the Swedish Job Market : Evaluating the Effectiveness of a Language Model

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Al Ghaith Ahmad; Ibrahim Abd ULRAHMAN; [2023]
    Keywords : ESCF; ChatGPT; Scraping; Crawler; Prompt Engineering;

    Abstract : Background: As the demand for cybersecurity professionals continues to rise, it is crucial to identify the key skills necessary to thrive in this field. This research project sheds light on the cybersecurity skills landscape by analyzing the recommendations provided by the European Cybersecurity Skills Framework (ECSF), examining the most required skills in the Swedish job market, and investigating the common skills identified through the findings. READ MORE