Sökning: "user security behaviour"
Visar resultat 1 - 5 av 10 avhandlingar innehållade orden user security behaviour.
1. Context-Based Micro-Training : Enhancing cybersecurity training for end-users
Sammanfattning : This research addresses the human aspect of cybersecurity by developing a method for cybersecurity training of end-users. The reason for addressing that area is that human behaviour is widely regarded as one of the most used attack vectors. LÄS MER
2. A method for analyzing value-based compliance in systems security
Sammanfattning : Aim: The aim of this thesis is to design a method that supports analysis of different values that come into play in compliance and non compliance situations within information systems security (ISS). The thesis addresses the problem of lack of ISS compliance methods that support systematic analysis of compliant and non-compliant behaviours as well as the reasons for these behaviours. LÄS MER
3. Advancing Models of Privacy Decision Making : Exploring the What & How of Privacy Behaviours
Sammanfattning : People's decisions do not happen in a vacuum; there are multiple factors that may affect them. There are external determinants, such as cost/benefit calculation of decision outcomes. There are also internal factors, such as attitudes, personality, emotions, age, and nationality. LÄS MER
4. A Quantitative Approach to Computer Security from a Dependability Perspective
Sammanfattning : Security and dependability represent two very important attributes of modern computer systems, especially in the light of the increasing complexity and criticality of these systems. These two disciplines have traditionally been treated separately, although lately some attempts have been made to integrate them. LÄS MER
5. Information Erasure: An Information-Flow Approach to Semantics and Enforcement
Sammanfattning : Many modern online services require sensitive data to complete their tasks. For this reason, guaranteeing security policies in such services is a major concern. The traditional (and well studied) aspects of security, namely confidentiality, integrity, and availability of data, capture many but not all desirable policies involving sensitive-data. LÄS MER