• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 183
  • 141
  • 51
  • 25
  • 9
  • 5
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 1
  • 1
  • 1
  • Tagged with
  • 469
  • 177
  • 99
  • 86
  • 77
  • 67
  • 65
  • 60
  • 59
  • 56
  • 49
  • 42
  • 39
  • 38
  • 37
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
141

A study on the internal security of companies : Internal practices regarding risks in digitised working environments and employees relation to information security / En studie om företags interna säkerhet

Södereng, Rebecca, Gallon, Clara January 2021 (has links)
Internal practices are fundamental to companies information security, as organisations become digitised. This study investigates how four companies work with internal security, as well as the external impact factors that can affect the security. For example, the general information security awareness among employees is studied, as is the impact of the COVID-19 pandemic. By conducting interviews with one representative at each company, and by studying literature, the study aims to enlighten differences and similarities as well as strengths and weaknesses in the companies security work. In conclusion, the study showed that the four companies had a similar view on the prioritisation of security and the importance of it, although they differed a lot in the applied practices and use of policies. The two larger companies had a more profound security work, regulated by documents and policies. In contrary, the two smaller companies for the most part used common sense as their approach to employees security mindset. The COVID-19 pandemic did not seem to affect the companies security work to a large extent. Although, they did see an increase in the amount of IT attacks and therefore the security could be argued to be in need of further assessment.
142

Internet of Things : Tapping into security and privacy issues associated with the internet of things

Ahmad, Nabeel January 2021 (has links)
The Internet of things and its collaborative technologies such as 5G, cloud, artificial intelligence, analytics, and automation will allow people and objects/devices to communicate not only with each other but with anything at any time and anywhere using the internet. Nowadays, people interact with different smart devices daily. Keeping in mind technology’s evolution, it is estimated that each of us will own roughly 15 linked devices by 2030. Therefore, we cannot neglect the impact of this technology on virtually everything and the various risks associated with such emerging technologies. The goal of this thesis was to better understand the phenomenon of the Internet of Things and more importantly, what security, privacy, and trust threats are associated with it. And how these threats can be overcomed. Moreover, how IoT devices are perceived in terms of privacy and security by people and what factors they must keep in mind while buying, using, and disposing of such devices. Literature review and interviews were made to better understand the issues of privacy and security in IoT devices and people’s understanding of them. A general inductive method proposed by the grounded theory was used to analyze the obtained data, and answers were grouped into categories to identify different themes within the data. The results of the interviews and data showed that people’s top priorities with smart home IoT devices were interest in technology, comfort, a better lifestyle, energy savings, and cost savings. People were unaware of the gravity of security and privacy issues by and large, and they had no idea how to counteract them. Common uses of smart devices include virtual assistants, smart heating, listening to music, getting weather and traffic updates, smart lighting, smart lock systems, and fitness gadgets. The results can be seen in the empirical findings and discussion chapters. These results will also be published on relevant Facebook groups and in the local newspaper, Valbyavisen. Data showed IoT understanding and use of technology were directly proportional to the age factor. Young people were more aware and excited as compared to older ones. Finally, some suggestions were presented on how to buy, use, and discard IoT devices. Future research directions were also presented to conclude the thesis report.
143

Socialarbetarens emotioner och förhållningssätt : En studie om klienters hot och/eller våld mot yrkesverksamma socialarbetare inom offentlig sektor / Social workers' emotions and approaches : A study about client threats and violence within the public sector

Saleh, Alice January 2021 (has links)
Using a systematic literature review, this study aims to compile and review previous international research on the emotional impacts and approaches resulted from social workers' exposure to client violence- and threats within the public sector. The awareness of, and academic interest in, social workers’ exposure to violence and threats of many kinds are growing, particularly because employees are experiencing increased psychological distress. A series of research studies conducted by one or other of the authors, emphasizes that social workers in the public sector frequently experience psychological and emotional impact from exposure to workplace violence caused by clients. In their line of work, it’s known to the clients that social workers hold authority in decisions regarding resources and service. Therefore, clients may view social workers not as people who only work for the agencies providing service and resources, but as representatives for these agencies. While Michael Lipsky's theory of street-level bureaucracy is justifying clients' view of social workers as representatives with authority, Åsa Wettergrens is proving a diversity of emotional strategies to manage the situation at hand. With the gathering of eight articles, results showed that emotions such as fear, anger, frustration, guilt and powerlessness were the most frequent ones expressed by social workers. Eventually, social workers developed strategies to manage their own emotions so that they wouldn't interfere with their work. Some social workers convinced themselves to view the clients as people in need of help and not as aggressive individuals, others sought help from their colleagues. Many social workers accepted client's violence and/or threats as a part of their daily job, as there is an ongoing requirement to tolerate its presence, while others decided to distance themselves from the clients.
144

Informační a kybernetické hrozby v roce 2019 / Information and Cyber Threats in 2019

Bača, Jonatán January 2020 (has links)
Diploma thesis focuses on information and cyber threats in 2019. It comprises theoretical basis for better understanding of the issue. Afterward the thesis describes the analysis of the current situation which combined several analyses primarily aimed on Czech companies. In the last part draft measures is created which contain predictions and preventive actions and recommendations for companies.
145

Návrh informačního systému pro rezervace stolů a donáškovou službu pro moderní restaurace / Concept of Information System for Table Reservation and Delivery Service for Modern Restaurant

Bumbál, Lukáš January 2013 (has links)
The aim of this thesis is the proposal of booking a table at a restaurant and ordering food delivery system. The work is divided into 5 chapters. It contains 44 images, 8 tables and 1 appendix. The first chapter describes the objective of the work, methods and processing procedures. In the second chapter is devoted to familiarization with the booking and delivery systems that are available in the market. In the third chapter is done SWOT Analysis for the restaurant La Fiamma in Bratislava. In the fourth chapter is designed and developed the system table reservations at this restaurant and designed the ordering system food delivery as well. The next section describes the economic benefits of implementing the described system. The result of this thesis is the function module table reservations as a part of web portal the restaurant La Fiamma.
146

Bezpečnost elektronického bankovnictví / Security of Electronic Banking

Pařil, Jan January 2014 (has links)
The main focus of the thesis is an electronic banking and security. The work includes evaluation the current state of security of electronic banking, the possible threats of attack on electronic banking and risks of security breaches. The next part focus on user satisfaction with e-banking security using a questionnaire. Are recommended new forms of security.
147

Bezpečnost elektronického bankovnictví / Security of Electronic Banking

Pařil, Jan January 2015 (has links)
The main focus of the thesis is an electronic banking and security. The work includes evaluation the current state of security of electronic banking, the possible threats of attack on electronic banking and risks of security breaches. The next part focus on user satisfaction with e-banking security using a questionnaire. Are recommended new forms of security.
148

Identifikace počítače pomocí vzorů v síťovém provozu / Computer Identification Based on Its Network Behaviour

Myška, Michal January 2014 (has links)
This diploma thesis deals with computer identification using network behavioral patterns. Security functions providing privacy are described together with user privacy threats. Then, several approaches to the computer identification based on network behaviour are described. The proposed tool is based on data mining method Multinomial Naive Bayes. Then, the implementation of proposed tool is described and the experiments recognizing success in the identification are performed.
149

Systém pro analýzu dat z infikovaných počítačů / System for Analysis of Data From Infected Computers

Pečeňa, Jan January 2011 (has links)
Presented thesis aims to develop web-based application for AVG Technologies. The application is supposed to bring in every suspicious information from a file, which has been gained from customer's registers, and make customer support more effective and efficient. Designing the application was tightly binded with obtaining an overview of computer threats and attacks. The thesis describes and explains malware and its basic types such as virus, worm, trojan horse, etc. History and features of ASP.NET, PHP, Virus Total web service and Internet Information Service are described as well. The result of the thesis, the application itself, is deployed in real enviroment and ready to be updated with new information sources.
150

Ochrana datové sítě s využitím NetFlow dat / Network Protection Using NetFlow Data

Hlavatý, Ivo January 2011 (has links)
This document focuses on Cisco Netflow technology and its possible usage in monitoring networks and detecting network anomalies. Based on the analysis of attacks at the network and transport layer is designed an application for selected security threats which detects its presence. The implementation section provides a system for predicting network traffic and related detecting deviations from the baseline on the basis of statistical data. Use of NetFlow technolgy is demonstrated on examples where the results of other current security and monitoring techniques have failed or did not provide sufficiently good results.

Page generated in 0.0293 seconds