Search for dissertations about: "SECURITY AWARENESS"

Showing result 1 - 5 of 57 swedish dissertations containing the words SECURITY AWARENESS.

  1. 1. Visualising Security through Computer Games : Investigating Game-Based Instruction in ICT Security:an Experimental Approach

    Author : Kjell Näckros; Louise Yngström; Helen Armstrong; Stockholms universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; ICT Security; Education; Game-Based Instruction; GBI; Computer Games; Game-Based Learning; GBL; Nonlinear; Linear; Learning Styles; Holist; Serialist; Knowledge; Vital Security Functions; VSF; Informatics; computer and systems science; Informatik; data- och systemvetenskap;

    Abstract : This thesis investigates whether learning materials in the form of computer games can increase knowledge and comprehension in the area of ICT security.Through a series of experiments carried out in Sweden between the years 2000 and 2003, investigating theoretical knowledge as well as practical knowledge gained through a single-user computer game, data were collected and subjected to quantitative and qualitative analyses. READ MORE

  2. 2. Context-Based Micro-Training : Enhancing cybersecurity training for end-users

    Author : Joakim Kävrestad; Marcus Nohlberg; Steven Furnell; Rose-Mharie Åhlfeldt; Lothar Fritsch; Högskolan i Skövde; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; NATURVETENSKAP; NATURAL SCIENCES; cybersecurity; training; usable; security; user; education; awareness; Information Systems; Informationssystem IS ;

    Abstract : This research addresses the human aspect of cybersecurity by developing a method for cybersecurity training of end-users. The reason for addressing that area is that human behaviour is widely regarded as one of the most used attack vectors. READ MORE

  3. 3. Shaping information security behaviors related to social engineering attacks

    Author : Waldo Rocha Flores; Mathias Ekstedt; Stewart Kowalski; KTH; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Information security; Behavioral information security; Social engineering; Phishing; Measuring information security behaviors; Information security governance; Experiments; National culture; Mixed method research design; Quantitative methods; Industrial Information and Control Systems; Industriella informations- och styrsystem;

    Abstract : Today, few companies would manage to continuously stay competitive without the proper utilization of information technology (IT). This has increased companies’ dependency of IT and created new threats that need to be addressed to mitigate risks to daily business operations. READ MORE

  4. 4. Continuity and Change in post-Cold War Maritime Security : A Study of the Strategies Pursued by the US, Sweden and Finland 1991-2016

    Author : Stefan Lundqvist; Göran Djupsund; Steve Lindberg; Jerker Widén; Joachim Krause; Försvarshögskolan; []
    Keywords : SAMHÄLLSVETENSKAP; SOCIAL SCIENCES; Maritime; security; power; influence; cooperation; Baltic Sea; East China Sea; South China Sea; Finland; Sweden; US; Krigsvetenskap; Krigsvetenskap;

    Abstract : What explains continuity and change in post-Cold War maritime security strategies? What lessons can we learn from the employment of such comprehensive grand strategies in maritime regions where traditional and non-traditional threats converge? While many scholars have addressed particular maritime security issues, this author joins the few who engage themselves in the study of the conceptual development of maritime security.Through the lens of structural realism, this thesis examines the logic of the maritime security strategies employed in two distinguished regions by the US and EU member states Finland and Sweden. READ MORE

  5. 5. A Framework for Securing e-Government Services : The Case of Tanzania

    Author : Geoffrey Rwezaura Karokola; Louise Yngström; Mariki Eloff; Stockholms universitet; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; e-Government; information security; maturity models; services; technical security; non-technical security; data- och systemvetenskap; Computer and Systems Sciences;

    Abstract : e-Government services are becoming one of the most important and efficient means by which governments (G) interact with businesses (B) and citizens (C). This has brought not only tremendous opportunities but also serious security challenges. Critical information assets are exposed to current and emerging security risks and threats. READ MORE