Essays about: "Behavioral Information Security"
Showing result 1 - 5 of 8 essays containing the words Behavioral Information Security.
-
1. Examining Bounded Rationality Influences on Decisions Concerning Information Security : A Study That Connects Bounded Rationality and Information Security
University essay from Stockholms universitet/Företagsekonomiska institutionenAbstract : This study investigates the impact of bounded rationality on information security decisions in public Swedish authorities. The research addresses how cognitive limitations and organizational dynamics shape decisions in this area. READ MORE
-
2. Strong Intents Against Weak Links : Towards a Holistic Integration of Behavioral Information Security in Organizations with Strategic Intent
University essay from Linköpings universitet/Företagsekonomi; Linköpings universitet/Filosofiska fakultetenAbstract : The human factor has been detected as the weakest link in the information security of organizations. Methods like training and awareness programs and the implementation of security policies have been developed, but they still seem to be less effective than desired. READ MORE
-
3. Estimating human resilience to social engineering attacks through computer configuration data : A literature study on the state of social engineering vulnerabilities
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Social engineering as a method of attack is increasingly becoming a problem for both corporations and individuals. From identity theft to enormous financial losses, this form of attack is notorious for affecting complex structures, yet often being very simple in its form. READ MORE
-
4. The transmission and replication of security practices in development research: A case study of the Busara Center for Behavioral Economics
University essay from Malmö universitet/Fakulteten för kultur och samhälle (KS)Abstract : This project investigates how the everyday practices and supporting narratives surrounding personal security for development researchers in Nairobi, Kenya, are communicated, transmitted and replicated among the community of practice. Everyday practices affect development, but are understudied. READ MORE
-
5. A non-visible user input-based CAPTCHA
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : During the last decade, there has been an increase in the number of automated programs (bots) that perform tasks such as harvesting information or making posts on social media. CAPTCHA was developed as a defense against bots, but several common CAPTCHAs have usability issues and are difficult for users to solve. READ MORE