Essays about: "information and technology security"

Showing result 31 - 35 of 723 essays containing the words information and technology security.

  1. 31. Unraveling the Paradox: Balancing Personalization and Privacy in AI-Driven Technologies : Exploring Personal Information Disclosure Behavior to AI Voice Assistants and Recommendation Systems

    University essay from Jönköping University/Internationella Handelshögskolan

    Author : Leona Saliju; Vladyslav Deboi; [2023]
    Keywords : Information disclosure; Risks and Benefits; Voice assistants; Recommendation systems; Privacy calculus; Personalization-privacy paradox PPP ;

    Abstract : As society progresses towards a more algorithmic era, the influence of artificial intelligence (AI) is driving a revolution in the digital landscape. At its core, AI applications aim to engage customers by providing carefully tailored and data-driven personalization and customization of products, services, and marketing mix elements. READ MORE

  2. 32. Detection of suicidal ideation in written communication

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Melina Bernsland; [2023]
    Keywords : Suicidal ideation; machine learning; RoBERTa;

    Abstract : Suicide remains a global cause of mortality, presenting challenges in detection and prevention despite known warning signs. This work aimed to improve personal security management by leveraging machine learning advancements to identify suicidal ideation in written communications. READ MORE

  3. 33. HackerGraph : Creating a knowledge graph for security assessment of AWS systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Alexios Stournaras; [2023]
    Keywords : Cloud security; Knowledge graph; Attack graph; Vulnerability ssessment; Attack paths; Vulnerable-by-design systems; Cloudgoat; Molnsäkerhet; Kunskapsgraf; Attackgraf; Sårbarhetsanalysis; Sårbara miljöer; Cloudgoat;

    Abstract : With the rapid adoption of cloud technologies, organizations have benefited from improved scalability, cost efficiency, and flexibility. However, this shift towards cloud computing has raised concerns about the safety and security of sensitive data and applications. READ MORE

  4. 34. Anomaly detection in surveillance camera data

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Viktoriia Semerenska; [2023]
    Keywords : Anomaly detection; Machine Learning; Supervised learning; Video Analytics; Artificial Intelligence;

    Abstract : The importance of detecting anomalies in surveillance camera data cannot be overemphasized. With the increasing availability of surveillance cameras in public and private locations, the need for reliable and effective methods to detect anomalous behavior has become critical to public safety. READ MORE

  5. 35. Information Classification in Information Security Management and its Challenges

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Robert Katura; [2023]
    Keywords : Information classification; information classification research gaps; risk analysis; risk assessment; risk management; information security;

    Abstract : Information classification is a prerequisite for carrying out risk management in information security, as the assets worth protecting are identified and the need for protection is determined by the classification categories. The information classification thus has a major impact on the security architecture of systems and organizations. READ MORE