Essays about: "Information Security Behavior"
Showing result 1 - 5 of 63 essays containing the words Information Security Behavior.
-
1. Examining Bounded Rationality Influences on Decisions Concerning Information Security : A Study That Connects Bounded Rationality and Information Security
University essay from Stockholms universitet/Företagsekonomiska institutionenAbstract : This study investigates the impact of bounded rationality on information security decisions in public Swedish authorities. The research addresses how cognitive limitations and organizational dynamics shape decisions in this area. READ MORE
-
2. Investigations and Development in the Area of Automated Security Evaluation of Android Devices with Focus on Bluetooth
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Bluetooth is a technology that has been implemented in over 5 billion devices and therefore has a considerable impact. It is the dominant technology for shortrange wireless communication. READ MORE
-
3. Investigating the Impact of User Behavior in the Security of Smart Home IoT Devices
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : As technology is growing at a fast pace, IoT-based smart home services are increasingly adopted by people. IoT-based smart homes offer numerous unimaginable benefits, including efficiency, safety, effectiveness, scalability of services, devices, and data, among many others. However, there is another side to this technology: security threats. READ MORE
-
4. Unraveling the Paradox: Balancing Personalization and Privacy in AI-Driven Technologies : Exploring Personal Information Disclosure Behavior to AI Voice Assistants and Recommendation Systems
University essay from Jönköping University/Internationella HandelshögskolanAbstract : As society progresses towards a more algorithmic era, the influence of artificial intelligence (AI) is driving a revolution in the digital landscape. At its core, AI applications aim to engage customers by providing carefully tailored and data-driven personalization and customization of products, services, and marketing mix elements. READ MORE
-
5. The effect of time pressure on human behavior regarding phishing susceptibility : Human aspects in information security
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : Human errors are common in the contemporary cyber ecosystem, and in an organization’s cybersecurity chain, humans are considered the weakest link. Cybercriminals exploit human vulnerabilities using sophisticated attacks such as phishing. READ MORE