Advanced search

Showing result 1 - 5 of 105 essays matching the above criteria.

  1. 1. “Cross Your Fingers and Hope You Don’t Get Hacked” : A Qualitative Study on The Psychological Factors Behind Non-Compliance with Cybersecurity Recommendations

    University essay from Uppsala universitet/Institutionen för informatik och media

    Author : Rebecca Biese; Gabriél Österwall; [2024]
    Keywords : ;

    Abstract : Cybersecurity is one of the most important issues in today’s digitalized society, with new technology and security policies constantly being developed. However, one of the largest challenges threatening cybersecurity is the human factor — an aspect that is often overlooked in cybersecurity research and development. READ MORE

  2. 2. GDPR Compliance in EU-US Data Transfers - Examining the impact of the EU Commission’s 2023 adequacy decision on surveillance risks

    University essay from Lunds universitet/Institutionen för handelsrätt

    Author : Linda Kidwell; [2024]
    Keywords : General Data Protection Regulation; Adequacy Decision; EU Commission; Surveillance law; Third country data transfers; US intelligence agencies; Law and Political Science;

    Abstract : International data transfers serve to support the global economy, facilitating international collaboration and economic expansion. However this increased productivity comes at a cost, namely amplified personal data privacy and security risks. READ MORE

  3. 3. Streamlining the Process of Surveying Cybersecurity Vulnerabilities in OT

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : Willem Brahmstaedt; Eira Höglund; Caspian Kullgren; Simon Larsson; Hanna Schaff; Johanna Thall; [2023-03-03]
    Keywords : operational technology; cybersecurity standards; containerization; computer aided process optimization; software development; application; web server;

    Abstract : Operational Technology, OT, is the backbone of the 21st-century society since it eases access for managing critical infrastructure like water, transportation, and energy supply. Therefore, the security of such systems is of utmost importance. READ MORE

  4. 4. Compliance with corporate ICT security practices in work from home environment : Attitude changes in the move from office to home

    University essay from Linnéuniversitetet/Institutionen för informatik (IK)

    Author : Rosen Todorov; [2023]
    Keywords : Security; Compliance; Work form home;

    Abstract : The Covid-19 pandemic and the ensuing lockdowns that multiple countries put in place have forced companies to nearly instantly switch to an entirely remote work environment, irrelevant if they were prepared to or not. Such abrupt change in the work environment and the digital nature of modern work is bound to raise issues with employees, specifically in terms of security and compliance. READ MORE

  5. 5. Investigations and Development in the Area of Automated Security Evaluation of Android Devices with Focus on Bluetooth

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Robin Holmquist; [2023]
    Keywords : Bluetooth; Android; Common Criteria; Automated dynamic security evaluation; Mobile device security; Bluetooth; Android; Common Criteria; Automatiserad dynamisk s¨akerhetstestning; S¨akerhet f¨or mobila enheter;

    Abstract : Bluetooth is a technology that has been implemented in over 5 billion devices and therefore has a considerable impact. It is the dominant technology for shortrange wireless communication. READ MORE