To see the other types of publications on this topic, follow the link: Cybersecurity behaviour.

Dissertations / Theses on the topic 'Cybersecurity behaviour'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 18 dissertations / theses for your research on the topic 'Cybersecurity behaviour.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Akbari, Koochaksaraee Amir. "End-User Security & Privacy Behaviour on Social Media: Exploring Posture, Proficiency & Practice." Thesis, Université d'Ottawa / University of Ottawa, 2019. http://hdl.handle.net/10393/39310.

Full text
Abstract:
Security and privacy practices of end-users on social media are an important area of research, as well as a top-of-mind concern for individuals as well as organizations. In recent years, we have seen a sharp increase in data breaches and cyber security threats that have targeted social media users. Hence, it is imperative that we try to better understand factors that affect an end-user’s adoption of effective security safeguards and privacy protection practices. In this research, we propose and validate a theoretical model that posits several determinants of end-user security and privacy pra
APA, Harvard, Vancouver, ISO, and other styles
2

Anuebunwa, Ugonna R. "Behavioural Demand Response for Future Smart Homes: Investigation of Demand Response Strategies for Future Smart Homes that Account for Consumer Comfort, Behaviour and Cybersecurity." Thesis, University of Bradford, 2018. http://hdl.handle.net/10454/17359.

Full text
Abstract:
Smart metering and precise measurement of energy consumption levels have brought more detailed information and interest on the actual load profile of a house which continues to improve consumer-retailer relationships. Participation in demand response (DR) programs is one of these relationships but studies have shown that there are considerable impacts resulting to some level of discomfort on consumers as they aim to follow a suggested load profile. This research therefore investigates the impact on consumers while participating in DR programs by evaluating various perspectives that includes:
APA, Harvard, Vancouver, ISO, and other styles
3

Shepherd, Lynsay A. "Enhancing security risk awareness in end-users via affective feedback." Thesis, Abertay University, 2016. https://rke.abertay.ac.uk/en/studentTheses/e5af92fb-4936-43d2-878e-fbc16711e36d.

Full text
Abstract:
Background: Risky security behaviour displayed by end-users has the potential to leave devices vulnerable to compromise, despite the availability of security tools designed to aid users in defending themselves against potential online threats. This indicates a need to modify the behaviour of end-users, allowing them to consider the security implications of their actions online. Previous research has indicated affective feedback may serve as a successful method of educating users about risky security behaviours. Thus, by influencing end-users via affective feedback it may be possible to engage
APA, Harvard, Vancouver, ISO, and other styles
4

Howard, David J. "Development of the Cybersecurity Attitudes Scale and Modeling Cybersecurity Behavior and its Antecedents." Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7306.

Full text
Abstract:
As organizations have become more reliant on computers and technology to operate in a globalized world, they have also become more vulnerable to cyberattacks on their networks. The expense to organizations from cyberattacks now exceeds $400 billion USD annually. These costs highlight the need for behavioral research in the cyber domain. The first phase of this research developed an instrument to measure workers’ cybersecurity attitudes. An iterative process resulted in a scale with good psychometric properties - The Cybersecurity Attitudes Scale. The scale measures two factors: cyber policy ad
APA, Harvard, Vancouver, ISO, and other styles
5

Rajasooriya, Sasith Maduranga. "Cybersecurity: Probabilistic Behavior of Vulnerability and Life Cycle." Scholar Commons, 2017. http://scholarcommons.usf.edu/etd/6933.

Full text
Abstract:
Analysis on Vulnerabilities and Vulnerability Life Cycle is at the core of Cybersecurity related studies. Vulnerability Life Cycle discussed by S. Frei and studies by several other scholars have noted the importance of this approach. Application of Statistical Methodologies in Cybersecurity related studies call for a greater deal of new information. Using currently available data from National Vulnerability Database this study develops and presents a set of useful Statistical tools to be applied in Cybersecurity related decision making processes. In the present study, the concept of Vulnerabil
APA, Harvard, Vancouver, ISO, and other styles
6

Das, Sauvik. "Social Cybersecurity: Reshaping Security Through An Empirical Understanding of Human Social Behavior." Research Showcase @ CMU, 2017. http://repository.cmu.edu/dissertations/982.

Full text
Abstract:
Despite substantial effort made by the usable security community at facilitating the use of recommended security systems and behaviors, much security advice is ignored and many security systems are underutilized. I argue that this disconnect can partially be explained by the fact that security behaviors have myriad unaccounted for social consequences. For example, by using two-factor authentication, one might be perceived as “paranoid”. By encrypting an e-mail correspondence, one might be perceived as having something to hide. Yet, to date, little theoretical work in usable security has applie
APA, Harvard, Vancouver, ISO, and other styles
7

Salameh, Rana. "THE RELATIONSHIP BETWEEN ENGAGMENT LEVELS AND PLAYERS’ INTENDED BEHAVIORS IN GAME-BASED TRAINING FOR CYBERSECURITY." OpenSIUC, 2019. https://opensiuc.lib.siu.edu/dissertations/1761.

Full text
Abstract:
The purpose of this quantitative exploratory experimental design study was to examine the effects of end-user’s multi-dimension engagement (cognitive, affective, and behavioral) on their cybersecurity intended behaviors (coping and threat appraisals). Additionally, this study is an effort to understand how end-users’ engagement levels changed over multiple playing sessions. There were two research questions: (1) “Do engagement levels have a relationship with the players’ intended behaviors in a cybersecurity serious game?” and (2) “Does playing more sessions of cybersecurity serious game affec
APA, Harvard, Vancouver, ISO, and other styles
8

Kaluarachchi, Pubudu Kalpani. "Cybersecurity: Stochastic Analysis and Modelling of Vulnerabilities to Determine the Network Security and Attackers Behavior." Scholar Commons, 2017. http://scholarcommons.usf.edu/etd/6862.

Full text
Abstract:
Development of Cybersecurity processes and strategies should take two main approaches. One is to develop an efficient and effective set of methodologies to identify software vulnerabilities and patch them before being exploited. Second is to develop a set of methodologies to predict the behavior of attackers and execute defending techniques based on attacking behavior. Managing of Vulnerabilities and analyzing them is directly related to the first approach. Developing of methodologies and models to predict the behavior of attackers is related to the second approach. Both these approaches are i
APA, Harvard, Vancouver, ISO, and other styles
9

Pacheco, Ramirez Jesus Horacio, and Ramirez Jesus Horacio Pacheco. "An Anomaly Behavior Analysis Methodology for the Internet of Things: Design, Analysis, and Evaluation." Diss., The University of Arizona, 2017. http://hdl.handle.net/10150/625581.

Full text
Abstract:
Advances in mobile and pervasive computing, social network technologies and the exponential growth in Internet applications and services will lead to the development of the Internet of Things (IoT). The IoT services will be a key enabling technology to the development of smart infrastructures that will revolutionize the way we do business, manage critical services, and how we secure, protect, and entertain ourselves. Large-scale IoT applications, such as critical infrastructures (e.g., smart grid, smart transportation, smart buildings, etc.) are distributed systems, characterized by interdepen
APA, Harvard, Vancouver, ISO, and other styles
10

Summers, Timothy Corneal. "HOW HACKERS THINK: A MIXED METHOD STUDY OF MENTAL MODELSAND COGNITIVE PATTERNS OF HIGH-TECH WIZARDS." Case Western Reserve University School of Graduate Studies / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=case1427809862.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Varga, Adam. "Identifikace a charakterizace škodlivého chování v grafech chování." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2021. http://www.nusl.cz/ntk/nusl-442388.

Full text
Abstract:
Za posledné roky je zaznamenaný nárast prác zahrňujúcich komplexnú detekciu malvéru. Pre potreby zachytenia správania je často vhodné pouziť formát grafov. To je prípad antivírusového programu Avast, ktorého behaviorálny štít deteguje škodlivé správanie a ukladá ich vo forme grafov. Keďže sa jedná o proprietárne riešenie a Avast antivirus pracuje s vlastnou sadou charakterizovaného správania bolo nutné navrhnúť vlastnú metódu detekcie, ktorá bude postavená nad týmito grafmi správania. Táto práca analyzuje grafy správania škodlivého softvéru zachytené behavioralnym štítom antivírusového program
APA, Harvard, Vancouver, ISO, and other styles
12

Chowdhury, Mohammad Noman H. "Understanding the impact of time pressure on human cybersecurity behavior." Thesis, 2021. http://hdl.handle.net/1959.13/1438998.

Full text
Abstract:
Research Doctorate - Doctor of Philosophy (PhD)<br>Introduction: In cybersecurity, human non-secure behavior and human error are consistently cited as significant causes behind cyber incidents. One of the factors that influences our behavior with regards to cybersecurity is time pressure. Lack of understanding in this regard will only weaken the human firewall, impairing our efforts to secure cyber assets from cyber incidents/attacks. However, research on understanding the impact of time pressure is scant. This thesis is therefore intended to address this gap. Objective: This research is targe
APA, Harvard, Vancouver, ISO, and other styles
13

Losi, Alessandro. "Challenges and opportunities of cybersecurity in banking : a stakeholder analysis of the european banking industry." Master's thesis, 2020. http://hdl.handle.net/10400.14/31229.

Full text
Abstract:
In 2018, the average annual cost of cyberattacks in banking amounted to $18.37m, making it one of the most affected industries by cybercrime (Bissel et al., 2019). In response, cybersecurity has become a strategic priority for financial institutions which are now actively reinforcing the digital barriers that protect their networks. This study examined the current stakeholder network around cybersecurity in the European banking industry and the challenges and opportunities arising from it. Thus, under the utilization of stakeholder theory, six primary stakeholders in cybersecurity were i
APA, Harvard, Vancouver, ISO, and other styles
14

Gonçalves, Ricardo Jorge Girante. "Cybersecurity in social networks." Master's thesis, 2022. http://hdl.handle.net/10362/133016.

Full text
Abstract:
Dissertation presented as the partial requirement for obtaining a Master's degree in Information Management, specialization in Knowledge Management and Business Intelligence<br>In recent years, the use of social networks has been increasing substantially. As we know, platforms such as Facebook, Twitter, Google +, Pinterest, LinkedIn or Instagram allow millions of individuals to create online profiles and share personal information with several friends through social networks – and, often, it’s possible to do the same with a large amount of strangers. By itself, social networks should not be c
APA, Harvard, Vancouver, ISO, and other styles
15

(14009941), Wanpiti Fangrith. "Development of e-commerce strategies derived from a responsive security confidence to optimize online trading activity in Thailand." Thesis, 2011. https://figshare.com/articles/thesis/Development_of_e-commerce_strategies_derived_from_a_responsive_security_confidence_to_optimize_online_trading_activity_in_Thailand/21397632.

Full text
Abstract:
<p>Security of online transactions is a key factor that affects a potential buyer's decision to make purchases online. In Thailand, security has been identified as the main reason for consumers' reluctance in purchasing products online. E-commerce rates in Thailand are considerably lower than those of other countries in the same region. However, this could be interpreted as a potential for e-commerce growth in Thailand. This study aims to identify the main factors affecting the low rates of e-commerce activity in Thailand and explores the social and cultural aspects of online shoppers here. Th
APA, Harvard, Vancouver, ISO, and other styles
16

(11023221), Fahad Salamh. "A 3-DIMENSIONAL UAS FORENSIC INTELLIGENCE-LED TAXONOMY (U-FIT)." Thesis, 2021.

Find full text
Abstract:
Although many counter-drone systems such as drone jammers and anti-drone guns have been implemented, drone incidents are still increasing. These incidents are categorized as deviant act, a criminal act, terrorist act, or an unintentional act (aka system failure). Examples of reported drone incidents are not limited to property damage, but include personal injuries, airport disruption, drug transportation, and terrorist activities. Researchers have examined only drone incidents from a technological perspective. The variance in drone architectures poses many challenges to the current investigati
APA, Harvard, Vancouver, ISO, and other styles
17

Teixeira, Ivo Manuel Botelho. "A literacia digital e a cibersegurança: contributos para o estudo dos comportamentos ciberseguros." Master's thesis, 2021. http://hdl.handle.net/10362/136688.

Full text
Abstract:
Os utilizadores do Mundo Digital podem ter diferentes comportamentos no uso da internet como, também, no próprio dispositivo que o liga a esse Mundo. Esses comportamentos podem não ser os mais corretos e seguros, tendo, por consequência, repercussões na experiência do utilizador, como por exemplo, ver o seu sistema de informação pessoal ou o seu dispositivo eletrónico alvo de um cibercrime. Este tema tem vindo a ser explorado em diversas áreas científicas como a Ciência da Informação, a Gestão de Sistemas de Informação e, até mesmo, a Gestão e Curadoria de Informação. Esta dissertação nasce pe
APA, Harvard, Vancouver, ISO, and other styles
18

Oliveira, Bruno Tomé de. "Viver sem segredos: a privacidade dos dados pessoais na era dos smartphones." Master's thesis, 2020. http://hdl.handle.net/10071/22198.

Full text
Abstract:
Atualmente, verifica-se que os Smartphones têm enfrentado um grande crescimento a nível mundial na vida das pessoas. As inúmeras vantagens destes dispositivos para os seus utilizadores têm sido cada vez mais evidentes. Estes aparelhos vivem da partilha de informação: os utilizadores não só recebem a informação pretendida, como também a podem partilhar. No entanto, em muitas instâncias, o utilizador acaba por compartilhar dados privados sem se aperceber, sem ter conhecimento, e muitas vezes sem o seu consentimento - dados estes que são recolhidos pelas empresas de telecomunicações e, pio
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!