Dissertations / Theses on the topic 'Cybersecurity and privacy'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 19 dissertations / theses for your research on the topic 'Cybersecurity and privacy.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Akbari, Koochaksaraee Amir. "End-User Security & Privacy Behaviour on Social Media: Exploring Posture, Proficiency & Practice." Thesis, Université d'Ottawa / University of Ottawa, 2019. http://hdl.handle.net/10393/39310.
Full textDell'Elce, Martina. "Industria 4.0 ed Internet of Things, nuove sfide per la cybersecurity." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2020.
Find full textDas, Sauvik. "Social Cybersecurity: Reshaping Security Through An Empirical Understanding of Human Social Behavior." Research Showcase @ CMU, 2017. http://repository.cmu.edu/dissertations/982.
Full textBheemanathini, Sai Nikhil. "A Systematic Review of Blockchain Technology: Privacy Concerns, Security Challenges, and Solutions." University of Cincinnati / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1563273858006378.
Full textDoyle, Marc. "Comprehending the Safety Paradox and Privacy Concerns with Medical Device Remote Patient Monitoring." Diss., NSUWorks, 2019. https://nsuworks.nova.edu/gscis_etd/1090.
Full textSantos, Susana Isabel da Silva. "“Estudo das perceções de cibersegurança e cibercrime e das implicações na formulação de Políticas Públicas - estudo exploratório do caso português." Master's thesis, Instituto Superior de Ciências Sociais e Políticas, 2018. http://hdl.handle.net/10400.5/16235.
Full textOs serviços online tornaram-se uma parte importante das nossas vidas, nomeadamente porque permitem o acesso à informação em qualquer sítio, a qualquer momento. Por assim ser, este tipo de serviços é útil não apenas para os utilizadores, mas para qualquer empresa ou instituição pública, nomeadamente por ajudar a reduzir os seus custos operacionais – por via da redução da infraestrutura física, da menor necessidade de recursos humanos, apresentando-se ainda menos dispendiosa, mais célere e cômoda para qualquer utente, se pensarmos por exemplo nos serviços públicos. Posto isso, este projeto de dissertação procurou descrever as perceções de cibercrime e cibersegurança dos cidadãos portugueses. Os dados necessários à elaboração da investigação foram recolhidos entre os dias 6 de julho e 6 de setembro de 2015, totalizando um total de 431 respostas, de inquiridos nacionais. Os resultados obtidos demonstram a preocupação com a privacidade, nomeadamente com os dados pessoais. Das três dimensões encontradas, com impacto na dimensão depende – Perceção da Ação do Estado – salienta-se “Segurança de Dados e Familiarização” o que leva a crer que maiores níveis de conhecimento e consciencialização levam a melhores níveis de satisfação. A formação de dois clusters permitiu verificar que a característica mais evidente é o género do indivíduo, razão pela qual, posteriormente, foram analisas as variáveis com diferenças estatisticamente significantes. Desta análise, salientam-se as variáveis relativas ao entendimento sobre a matéria, e à satisfação com a Ação do Estado.
Online services have become an important part of our lives, in particular, because they allow access to information anywhere, anytime. Because of that, this type of service is useful not only for mere users but for any company or public institution, in particular by helping to reduce its operating costs – by reducing physical infrastructure, the need for human resources, for being even cheaper, faster and comfortable for any user, if we think, for example, of public services. Thus, this dissertation project aims to describe the perceptions of cybercrime and cybersecurity of Portuguese citizens. The data was collected between July 6 and September 6, 2015, with a total of 431 responses, from national respondents. The results obtained prove the concern for privacy, particularly with personal data. Of the three dimensions found, with impact on the dimension depends - State Action Perception - highlights "Data Security and Familiarization" which leads to believe that higher levels of knowledge and awareness lead to better levels of satisfaction. The formation of two clusters allowed us to verify that the most obvious characteristic is the gender of the individual, reason why, afterward, differences in the means of variables were analyzed. From this analysis, we highlight the variables related to the understanding of the subject and the satisfaction with the State Action.
N/A
Conzo, Naomi. "Privacy e "Social dilemma": aspetti etico-informatici legati al trattamento online dei dati personali sui social media." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2021.
Find full textRaad, Eliana. "Towards better privacy preservation by detecting personal events in photos shared within online social networks." Thesis, Dijon, 2015. http://www.theses.fr/2015DIJOS079/document.
Full textToday, social networking has considerably changed why people are taking pictures all the time everywhere they go. More than 500 million photos are uploaded and shared every day, along with more than 200 hours of videos every minute. More particularly, with the ubiquity of smartphones, social network users are now taking photos of events in their lives, travels, experiences, etc. and instantly uploading them online. Such public data sharing puts at risk the users’ privacy and expose them to a surveillance that is growing at a very rapid rate. Furthermore, new techniques are used today to extract publicly shared data and combine it with other data in ways never before thought possible. However, social networks users do not realize the wealth of information gathered from image data and which could be used to track all their activities at every moment (e.g., the case of cyberstalking). Therefore, in many situations (such as politics, fraud fighting and cultural critics, etc.), it becomes extremely hard to maintain individuals’ anonymity when the authors of the published data need to remain anonymous.Thus, the aim of this work is to provide a privacy-preserving constraint (de-linkability) to bound the amount of information that can be used to re-identify individuals using online profile information. Firstly, we provide a framework able to quantify the re-identification threat and sanitize multimedia documents to be published and shared. Secondly, we propose a new approach to enrich the profile information of the individuals to protect. Therefore, we exploit personal events in the individuals’ own posts as well as those shared by their friends/contacts. Specifically, our approach is able to detect and link users’ elementary events using photos (and related metadata) shared within their online social networks. A prototype has been implemented and several experiments have been conducted in this work to validate our different contributions
Kaijankoski, Eric A. "Cybersecurity information sharing between public–private sector agencies." Thesis, Monterey, California: Naval Postgraduate School, 2015. http://hdl.handle.net/10945/45204.
Full textGovernment agencies, businesses, and individuals alike have become more dependent on technology, and the desire and need for interconnectedness has led to increasing network vulnerability affecting both government and private sectors. Recognizing both government and private sector agencies individually lack the capabilities to defend against cyber threats, President Obama has called for a more robust and resilient cybersecurity alliance that encourages information-sharing partnerships with private sector owners and operators in charge of protecting U.S. critical infrastructure. Despite the recent drive for cyber legislation and policies, government agencies and private companies have seemed reluctant to share information related to cyber-attacks and threats with one another. To discover the deeper underlying issues that inhibit public-private cooperation, and to evaluate the effectiveness of public-private partnerships (PPPs) to advance cyber information sharing, this thesis examines the banking and finance sector of U.S. critical infrastructure sector. In doing so, it identifies reasons why information-sharing problems exist between government agencies and private companies; investigates how PPPs satisfy national cybersecurity needs; and, in turn, reveals issues for policymakers to consider when shaping policies that encourage an open dialog between the public and private sector.
Gadirova, Nurlana. "The Impacts of Cyberattacks on Private Firms' Cash Holdings." Thesis, Université d'Ottawa / University of Ottawa, 2021. http://hdl.handle.net/10393/41924.
Full textJuuso, A. M. (Anna-Maija). "Cybersecurity investment and information sharing:an analysis of the economic incentives of private critical infrastructure providers." Master's thesis, University of Oulu, 2015. http://urn.fi/URN:NBN:fi:oulu-201506111850.
Full textСанак, Олексій Євгенійович. "Захист мобільних застосунків на основі систем з нульовим знанням." Master's thesis, Київ, 2018. https://ela.kpi.ua/handle/123456789/27199.
Full textThe work includes 121 pages, 15 illustrations, 25 tables and 7 literary references. The purpose of this qualification work is to analyze the environment of mobile applications, their architecture, the study of possible vulnerabilities in applications and methods to combat them. The object of research is the field of development of mobile applications. The subject of the study is the tools, rules and instructions for ensuring the security of mobile applications. The results of the work are presented in the form of a scheme of the architecture of the security system of the mobile application, a set of criteria for the applicable security tools, rules that must be observed in the security system, and the mandatory components of the security policy to be applied. The results of the work can be used in the development of mobile applications, as well as for the modernization of existing applications by implementation of the proposed protection systems. It is also possible to use the individual components of the proposed security system and their implementation options.
Даценко, Дар`я Сергіївна. "Формування і розвиток системи державно-приватного партнерства і підтримки малого бізнесу." Магістерська робота, Київський національний університет технологій та дизайну, 2021. https://er.knutd.edu.ua/handle/123456789/19392.
Full textThe master's thesis is devoted to the study of theoretical problems and substantiation of practical areas of improving the management system of public-private partnership and support of small business in Ukraine, as well as research on the experience of PPP in Europe. Based on the analysis of the company LLC "LUKMI UKRAINE" was proposed ways to implement a mechanism to support small business and public-private partnership. The socio-economic significance of public-private partnership, as well as its legal support was studied. The conditions of PPP development in Ukraine, in the cybersecurity sector and in the system of inter-municipal cooperation in the conditions of decentralization of power are revealed. Ways to improve the legal mechanism in accordance with the key elements of its development in the current context of international experience are proposed.
AfzaliSeresht, Neda. "Explainable Intelligence for Comprehensive Interpretation of Cybersecurity Data in Incident Management." Thesis, 2022. https://vuir.vu.edu.au/44414/.
Full textPatala, Najiyabanu Noormohmed. "Cybersecurity framework for cloud computing adoption in rural based tertiary institutions." Diss., 2018. http://hdl.handle.net/11602/1362.
Full textDepartment of Business Information Systems
Although technology is being progressively used in supporting student learning and enhancing business processes within tertiary institutions, certain aspects are hindering the decisions of cloud usage. Among many challenges of utilizing cloud computing, cybersecurity has become a primary concern for the adoption. The main aim of the study was to investigate the effect of cloud cyber-security usage at rural based tertiary institutions in order to compare the usage with an urban-based institution and propose a cybersecurity framework for adoption of cloud computing cybersecurity. The research questions focused on determining the drivers for cloud cybersecurity usage; the current adoption issues; how cybersecurity challenges, benefits, and quality affects cloud usage; the adoption perceptions and awareness of key stakeholders and identifying a cloud cybersecurity adoption framework. A quantitative approach was applied with data collected from a simple random sample of students, lecturers, admin and IT staff within the tertiary institutions through structured questionnaires. The results suggested compliance with legal law as a critical driver for cloud cybersecurity adoption. The study also found a lack of physical control of data and harmful activities executed on the internet as challenges hampering the adoption. Prevention of identity fraud and cheaper security costs were identified as benefits of adoption. Respondents found cloud cybersecurity to be accurate and effective, although most of the students and employees have not used it. However, respondents were aware of the value of cybersecurity adoption and perceive for it to be useful and convenient, hence have shown the intention of adopting it. There were no significant elements identified to differentiate the perceptions of usage at rural and urban-based tertiary institutions. The results of the study are to be used for clarifying the cybersecurity aspects of cloud computing and forecasting the suitability cloud cybersecurity within the tertiary institutions. Recommendations were made on how tertiary institutions and management can promote cloud cybersecurity adoption and how students, lecturers, and staff can effectively use cloud cybersecurity.
NRF
Chenthara, Shekha. "Privacy Preservation of Electronic Health Records Using Blockchain Technology: Healthchain." Thesis, 2021. https://vuir.vu.edu.au/42459/.
Full textLeão, Pedro Herdeiro Alves Jubilot. "Alibaba - the chinese retail giant." Master's thesis, 2020. http://hdl.handle.net/10362/111457.
Full textOliveira, Bruno Tomé de. "Viver sem segredos: a privacidade dos dados pessoais na era dos smartphones." Master's thesis, 2020. http://hdl.handle.net/10071/22198.
Full textSmartphones have shown tremendous worldwide growth in the lives of people around the world. The numerous advantages of these devices for their users have been increasingly evident. These devices live by sharing information, where users not only receive the desired information, but can also share information. However, in many instances, the user shares private data without realizing it, without being aware of it and even without their consent, data that is collected by the telecommunications companies and even worse sold to unknown third parties. This uncontrolled data sharing through the Smartphone can mean risks and even threaten the privacy right to its users, including also the users with whom data is exchanged via the Smartphone. This study aims to understand the extent to which university students know that their privacy is being called into question through the use of smartphones. A central objective of the study is to understand whether this group of users is concerned with their digital privacy while using Smartphones or whether, on the other hand, they are indifferent to the fact that third parties gain access to their private data without their consent. Two techniques were used for data collection: a) the interview with the students' observation, b) the survey. A guide was developed for the interviews in order to record and observe behaviors with the Smartphone. The prepared questionnaire was used to collect data on the activity, interaction and opinion in their respective use of the Smartphone. The construction of both tools for data collection were elaborated using the TUM model, so that it was possible, with an adaptation of this model, to measure the acceptance of Smartphones technology together with the privacy risks of private data. With the results obtained, it was concluded that the students in this study are in no way willing to give up the utility that the Smartphone gives them, even if it means that third parties have access to their private data registered by the Smartphones. In other words, it can be said that they are willing to have a transparent life before the organizations that make services available to them through their Smartphone and third parties that access these same private data.
EL, Haddad Ghada. "Mise en oeuvre d’une approche sociotechnique de la vie privée pour les systèmes de paiement et de recommandation en ligne." Thesis, 2019. http://hdl.handle.net/1866/24637.
Full textTechnologies in Human-Machine Interaction (HMI) are playing a vital role across the entire production process to design and deliver advanced digital systems. Given the exponential development of research in this field, two concepts are largely addressed to increase performance and efficiency of online environments: trust and user behavior. These two extents continue to proliferate in most designed solutions and are increasingly enriched by continuous investments in online payments and recommender systems. Along with the trend of digitalization, the objective of this research is to gain a better understanding of the various challenges in these two areas, make improvements and propose solutions more convenient to the users in terms of online perception and user behavior. In addition to the state of the art and challenges, this work is divided into five main parts, each one contributes to better enrich the online user experience in both online payments and system recommendations: • Online customer fears: We analyze different components of the website that may affect customer behavior in decision-making and online fears. We focus on customer perceptions regarding privacy violations and financial loss. We examine the influence on trust and payment security perception as well as their joint effect on three fundamentally important customers’ aspects: confidentiality, privacy concerns and financial fear perception. • Personalization, control and conditional payment: we propose a new online payment platform that supports both personalization and conditional multi-payments, while preserving the privacy of the cardholder. • Exploring user behavior and cybersecurity knowledge: we design a new website to conduct an experimental study in online shopping. The results highlight the impact of user’s perception in cybersecurity and privacy concerns on his online behavior when dealing with shopping activities. • Balance between data utility and user privacy: we propose a privacy-preserving method based on the “k-means” algorithm and the “k-coRating” model to support the utility of data in online recommendations while preserving user’s privacy. • User interest constancy metric: we propose a neural network to predict the user’s interests in recommender systems. Our aim is to provide an efficient method that respects the constancy and variations in user preferences. In this thesis, we focus on four major contributions related to: 1) online payment platforms, 2) user behavior in online payments regarding decision making, multi-fears and cyber security 3) user interest constancy in online recommendations, 4) balance between privacy and utility of online data in recommender systems.