Search for dissertations about: "Steven Furnell"

Showing result 1 - 5 of 6 swedish dissertations containing the words Steven Furnell.

  1. 1. Tinkering the Wicked Problem of Privacy : Design Challenges and Opportunities for Crypto-based Services

    Author : Ala Sarah Alaqra; Simone Fischer-Hübner; Erik Wästlund; Steven Furnell; Karlstads universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; Data privacy; wicked problems; user-centered design; privacy enhancing technologies; human factors; malleable signatures; secret sharing; homomorphic encryption; Computer Science; Datavetenskap;

    Abstract : Data privacy has been growing in importance in recent years, especially with the constant increase of online activity. Consequently, researchers study, design, and develop solutions aimed at enhancing users' data privacy. The wicked problem of data privacy is a dynamic challenge that defies straightforward solutions. READ MORE

  2. 2. Supporting Information Security Management : Developing a Method for Information Classification

    Author : Erik Bergström; Rose-Mharie Åhlfeldt; Fredrik Karlsson; Eva Söderström; Steven Furnell; Högskolan i Skövde; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; information classification; Information security management; Information security management systems; Information classification method; INF303 Informationssäkerhet; INF303 Information Security; Information Systems; Informationssystem IS ;

    Abstract : In the highly digitalised world in which we live today, information and information systems have become critical assets to organisations, and hence need to be safeguarded accordingly. In order to implement and work with information security in a structured way, an Information Security Management System (ISMS) can be implemented. READ MORE

  3. 3. Usable Security Policies for Runtime Environments

    Author : Almut Herzog; Nahid Shahmehri; Steven Furnell; Linköpings universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Information security; Usability; Java; Resource control; Virtual machine; Computer science; Datavetenskap;

    Abstract : The runtime environments provided by application-level virtual machines such as the Java Virtual Machine or the .NET Common Language Runtime are attractive for Internet application providers because the applications can be deployed on any platform that supports the target virtual machine. READ MORE

  4. 4. Context-Based Micro-Training : Enhancing cybersecurity training for end-users

    Author : Joakim Kävrestad; Marcus Nohlberg; Steven Furnell; Rose-Mharie Åhlfeldt; Lothar Fritsch; Högskolan i Skövde; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; NATURVETENSKAP; NATURAL SCIENCES; cybersecurity; training; usable; security; user; education; awareness; Information Systems; Informationssystem IS ;

    Abstract : This research addresses the human aspect of cybersecurity by developing a method for cybersecurity training of end-users. The reason for addressing that area is that human behaviour is widely regarded as one of the most used attack vectors. READ MORE

  5. 5. Tailoring information security policies : a computerized tool and a design theory

    Author : Elham Rostami; Fredrik Karlsson; Ella Kolkowska; Shang Gao; Steven Furnell; Örebro universitet; []
    Keywords : SAMHÄLLSVETENSKAP; SOCIAL SCIENCES; Information security management software; tailorable information security policy; policy component; design science; POLCO;

    Abstract : Protecting information assets in organizations is a must and one way for doing it is developing information security policy (ISP) to direct employees’ behavior and define acceptable procedures that employees have to comply with on a daily basis. However, compliance with the ISP is a perennial problem. READ MORE