Advanced search

Showing result 1 - 5 of 201 essays matching the above criteria.

  1. 1. “Cross Your Fingers and Hope You Don’t Get Hacked” : A Qualitative Study on The Psychological Factors Behind Non-Compliance with Cybersecurity Recommendations

    University essay from Uppsala universitet/Institutionen för informatik och media

    Author : Rebecca Biese; Gabriél Österwall; [2024]
    Keywords : ;

    Abstract : Cybersecurity is one of the most important issues in today’s digitalized society, with new technology and security policies constantly being developed. However, one of the largest challenges threatening cybersecurity is the human factor — an aspect that is often overlooked in cybersecurity research and development. READ MORE

  2. 2. INTRODUCTION OF CYBERSECURITY INTO VERIFICATION PROCESSES FOR CONSTRUCTION EQUIPMENT : Cybersecurity Verification

    University essay from Mälardalens universitet/Inbyggda system

    Author : Selam Fitsum Andemariam; [2024]
    Keywords : ;

    Abstract : Technology is evolving at a very fast pace in various domains, including the construction equipment industry. Although the increased automation and connectivity in different products, such as vehicles, heavy machinery, and many others, have advantages, they also have disadvantages. READ MORE

  3. 3. Unlocking complementary assets in digital security

    University essay from Handelshögskolan i Stockholm/Institutionen för företagande och ledning

    Author : Kavya Shukla; [2024]
    Keywords : digital security; cybersecurity; complementary assets; dynamic capabilities;

    Abstract : Due to increased risk of cyberattacks, digital security (DS, hereinafter) is one of the leading challenges facing organizations today. New ways of working and technologies such as agile and the cloud have accelerated security risks with profound implications. READ MORE

  4. 4. A Comparative Analysis of SecurityServices Using Identity and AccessManagement (IAM)

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Nithya Sree Muddychetty; [2024]
    Keywords : Access Control Lists; Identity Access Management; Multi-Factor Authentication; One time password; Single sign on; System Usability Scale; Virtual private network;

    Abstract : Background: Identity and Access Management (IAM) is a critical IT securityframework for managing digital identities and resource access. With roots datingback to ancient civilizations, IAM has evolved from basic authentication to sophisticated methods. READ MORE

  5. 5. IT security expert’s perceptions of cybersecurity when working remotely compared to working in the office : A quality study on Swedish insurance companies

    University essay from Uppsala universitet/Informationssystem

    Author : Kristoffer Kullander; Mathilda Cselenyi; [2024]
    Keywords : Cyber security; cyber threats; cybersecurity awareness; remote work; Protection Motivation Theory; Cybersäkerhet; cyberhot; säkerhetsmedvetenhet; distansarbete; Protection Motivation Theory;

    Abstract : Teleworking has become a significant aspect of working life, especially after the outbreak of the COVID-19 pandemic, which accelerated the trend of teleworking. However, this shift has increased the risk of cyber threats and security risks. READ MORE