Essays about: "Cybersecurity behavior"

Showing result 1 - 5 of 13 essays containing the words Cybersecurity behavior.

  1. 1. Examining Bounded Rationality Influences on Decisions Concerning Information Security : A Study That Connects Bounded Rationality and Information Security

    University essay from Stockholms universitet/Företagsekonomiska institutionen

    Author : Oskar Malm Wiklund; Caroline Larsson; [2024]
    Keywords : Decision-making; Rationality; Bounded Rationality; Information Security; Public Authority; Organizational Culture; Information Systems;

    Abstract : This study investigates the impact of bounded rationality on information security decisions in public Swedish authorities. The research addresses how cognitive limitations and organizational dynamics shape decisions in this area. READ MORE

  2. 2. Unveiling the Digital Shift: Exploring the Changing Landscape of Work in Banking

    University essay from Jönköping University/Internationella Handelshögskolan

    Author : Elmas Memedovski; Ninos Keryakos; [2023]
    Keywords : Digitalization; Banking; Work; Structural Configuration; Employees; Digital Skills;

    Abstract : Background: The advent of digitalization has significantly impacted various aspects of society. Digitalization has aided in the growth of more ecologically friendly practices, and remote work hasreduced the usage of cars and lowered carbon emissions. READ MORE

  3. 3. The effect of human memory on password behavior : An investigation

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Márton Tarczal; [2023]
    Keywords : Cybersecurity awareness; cognitive ability; password behavior; memory; cued recall; demographics; questionnaire;

    Abstract : Passwords are widely used as a primary method of authentication and access control, making them a critical component in safeguarding digital assets. However, individuals’ password-related behaviors, such as password selection, memorization, and management, significantly impact the security of their accounts. READ MORE

  4. 4. THE COUPLING OF A DOUBLE QUANTUM DOT TO MICROWAVE PHOTONS

    University essay from Lunds universitet/Matematisk fysik; Lunds universitet/Fysiska institutionen

    Author : Mohamed Abrash; [2023]
    Keywords : Quantum computing; Qubit; Double quantum dot DQD ; Microwave resonator; Quantum integrated circuits; Sweet spots; Hybrid quantum circuits.; Physics and Astronomy;

    Abstract : In this study, we derive a mathematical description of a double quantum dot (DQD) embedded in a microwave resonator starting from classical electrostatics. DQDs are a promising platform for building quantum computers and have important applications in quantum sensing and the study of light-matter interactions. READ MORE

  5. 5. The effect of time pressure on human behavior regarding phishing susceptibility : Human aspects in information security

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Muhammad Abbas Khan Abbasi; [2023]
    Keywords : Cybersecurity behavior; phishing susceptibility; cybersecurity awareness; time pressure; the human factor;

    Abstract : Human errors are common in the contemporary cyber ecosystem, and in an organization’s cybersecurity chain, humans are considered the weakest link. Cybercriminals exploit human vulnerabilities using sophisticated attacks such as phishing. READ MORE