Essays about: "Behavioral Information Security"

Showing result 1 - 5 of 8 essays containing the words Behavioral Information Security.

  1. 1. Examining Bounded Rationality Influences on Decisions Concerning Information Security : A Study That Connects Bounded Rationality and Information Security

    University essay from Stockholms universitet/Företagsekonomiska institutionen

    Author : Oskar Malm Wiklund; Caroline Larsson; [2024]
    Keywords : Decision-making; Rationality; Bounded Rationality; Information Security; Public Authority; Organizational Culture; Information Systems;

    Abstract : This study investigates the impact of bounded rationality on information security decisions in public Swedish authorities. The research addresses how cognitive limitations and organizational dynamics shape decisions in this area. READ MORE

  2. 2. Strong Intents Against Weak Links : Towards a Holistic Integration of Behavioral Information Security in Organizations with Strategic Intent

    University essay from Linköpings universitet/Företagsekonomi; Linköpings universitet/Filosofiska fakulteten

    Author : Teresa Marie Koller; Migle Ljung; [2021]
    Keywords : Information Security Behavior; Information Security Culture; Strategic Intent; Behavioral Information Security; Qualitative Study;

    Abstract : The human factor has been detected as the weakest link in the information security of organizations. Methods like training and awareness programs and the implementation of security policies have been developed, but they still seem to be less effective than desired. READ MORE

  3. 3. Estimating human resilience to social engineering attacks through computer configuration data : A literature study on the state of social engineering vulnerabilities

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Matias Carlander-Reuterfelt Gallo; [2020]
    Keywords : Internet security; Social engineering; Phishing; Privacy; Computer configuration; Psychology.; Internet säkerhet; Social manipulering; Phishing; Integritet; Datorkonfiguration; Psykologi.;

    Abstract : Social engineering as a method of attack is increasingly becoming a problem for both corporations and individuals. From identity theft to enormous financial losses, this form of attack is notorious for affecting complex structures, yet often being very simple in its form. READ MORE

  4. 4. The transmission and replication of security practices in development research: A case study of the Busara Center for Behavioral Economics

    University essay from Malmö universitet/Fakulteten för kultur och samhälle (KS)

    Author : Thomas Wein; [2018]
    Keywords : development; communication; security; practices; narratives; research;

    Abstract : This project investigates how the everyday practices and supporting narratives surrounding personal security for development researchers in Nairobi, Kenya, are communicated, transmitted and replicated among the community of practice. Everyday practices affect development, but are understudied. READ MORE

  5. 5. A non-visible user input-based CAPTCHA

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Jakob Sisk; [2017]
    Keywords : CAPTCHA; Bot; Robustness; Data security; Behavioral analysis; Pattern recognition;

    Abstract : During the last decade, there has been an increase in the number of automated programs (bots) that perform tasks such as harvesting information or making posts on social media. CAPTCHA was developed as a defense against bots, but several common CAPTCHAs have usability issues and are difficult for users to solve. READ MORE