Essays about: "Information Security Behavior"

Showing result 1 - 5 of 63 essays containing the words Information Security Behavior.

  1. 1. Examining Bounded Rationality Influences on Decisions Concerning Information Security : A Study That Connects Bounded Rationality and Information Security

    University essay from Stockholms universitet/Företagsekonomiska institutionen

    Author : Oskar Malm Wiklund; Caroline Larsson; [2024]
    Keywords : Decision-making; Rationality; Bounded Rationality; Information Security; Public Authority; Organizational Culture; Information Systems;

    Abstract : This study investigates the impact of bounded rationality on information security decisions in public Swedish authorities. The research addresses how cognitive limitations and organizational dynamics shape decisions in this area. READ MORE

  2. 2. Investigations and Development in the Area of Automated Security Evaluation of Android Devices with Focus on Bluetooth

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Robin Holmquist; [2023]
    Keywords : Bluetooth; Android; Common Criteria; Automated dynamic security evaluation; Mobile device security; Bluetooth; Android; Common Criteria; Automatiserad dynamisk s¨akerhetstestning; S¨akerhet f¨or mobila enheter;

    Abstract : Bluetooth is a technology that has been implemented in over 5 billion devices and therefore has a considerable impact. It is the dominant technology for shortrange wireless communication. READ MORE

  3. 3. Investigating the Impact of User Behavior in the Security of Smart Home IoT Devices

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Maha Ghunaim; [2023]
    Keywords : Smart Homes; Smart Home Devices; Home Automation; User Behavior; Internet of Things IoT ; Smarta hem; smarta hemenheter; hemautomation; användarbeteende; internet av Saker IoT ; المنازل الذكية ، أجهزة المنزل الذكي ، أتمتة المنزل ، سلوك المستخدم ، إنترنت أشياء إنترنت الأشياء ;

    Abstract : As technology is growing at a fast pace, IoT-based smart home services are increasingly adopted by people. IoT-based smart homes offer numerous unimaginable benefits, including efficiency, safety, effectiveness, scalability of services, devices, and data, among many others. However, there is another side to this technology: security threats. READ MORE

  4. 4. Unraveling the Paradox: Balancing Personalization and Privacy in AI-Driven Technologies : Exploring Personal Information Disclosure Behavior to AI Voice Assistants and Recommendation Systems

    University essay from Jönköping University/Internationella Handelshögskolan

    Author : Leona Saliju; Vladyslav Deboi; [2023]
    Keywords : Information disclosure; Risks and Benefits; Voice assistants; Recommendation systems; Privacy calculus; Personalization-privacy paradox PPP ;

    Abstract : As society progresses towards a more algorithmic era, the influence of artificial intelligence (AI) is driving a revolution in the digital landscape. At its core, AI applications aim to engage customers by providing carefully tailored and data-driven personalization and customization of products, services, and marketing mix elements. READ MORE

  5. 5. The effect of time pressure on human behavior regarding phishing susceptibility : Human aspects in information security

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Muhammad Abbas Khan Abbasi; [2023]
    Keywords : Cybersecurity behavior; phishing susceptibility; cybersecurity awareness; time pressure; the human factor;

    Abstract : Human errors are common in the contemporary cyber ecosystem, and in an organization’s cybersecurity chain, humans are considered the weakest link. Cybercriminals exploit human vulnerabilities using sophisticated attacks such as phishing. READ MORE