• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 19
  • 4
  • 3
  • 1
  • 1
  • Tagged with
  • 35
  • 35
  • 28
  • 14
  • 10
  • 9
  • 9
  • 6
  • 5
  • 5
  • 5
  • 5
  • 5
  • 5
  • 5
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

Communication Privacy Management Among Emerging Adult Children of Mothers with Depression

Walker, Kevin 29 August 2022 (has links)
No description available.
32

Smart connected homes : concepts, risks, and challenges

Bugeja, Joseph January 2018 (has links)
The growth and presence of heterogeneous connected devices inside the home have the potential to provide increased efficiency and quality of life to the residents. Simultaneously, these devices tend to be Internet-connected and continuously monitor, collect, and transmit data about the residents and their daily lifestyle activities. Such data can be of a sensitive nature, such as camera feeds, voice commands, physiological data, and more. This data allows for the implementation of services, personalization support, and benefits offered by smart home technologies. Alas, there has been a rift of security and privacy attacks on connected home devices that compromise the security, safety, and privacy of the occupants. In this thesis, we provide a comprehensive description of the smart connected home ecosystem in terms of its assets, architecture, functionality, and capabilities. Especially, we focus on the data being collected by smart home devices. Such description and organization are necessary as a precursor to perform a rigorous security and privacy analysis of the smart home. Additionally, we seek to identify threat agents, risks, challenges, and propose some mitigation approaches suitable for home environments. Identifying these is core to characterize what is at stake, and to gain insights into what is required to build more robust, resilient, secure, and privacy-preserving smart home systems. Overall, we propose new concepts, models, and methods serving as a foundation for conducting deeper research work in particular linked to smart connected homes. In particular, we propose a taxonomy of devices; classification of data collected by smart connected homes; threat agent model for the smart connected home; and identify challenges, risks, and propose some mitigation approaches. / <p>Note: The papers are not included in the fulltext online.</p>
33

Integritet online ur olika generationers perspektiv : En studie om hur generation digital natives &amp; pre-internet värdesätter sin integritet online

König, Lovisa, Romney, Ellen January 2020 (has links)
Den digital utvecklingen har gjort att vi idag rör oss i digitala miljöer för att jobba, kommunicera, söka information, shoppa och underhållas. Företag kan idag kan spara, kartlägga, mäta och analysera privatpersoners aktiviteter online vilket ställt högre krav på näringsidkare att hantera denna personliga information korrekt. Ett exempel på detta är GDPR som infördes under 2018. Lagen har lyft frågan om integritet online och gjort gemene man mer medveten om informationsinsamlingen som pågår runt oss då företagen är skyldiga att informera om den. Syftet med denna studie är att se hur två olika grupper, de generationer som har växt upp med internet sen barnsben gentemot de generationer som har tagit till sig internet vid vuxen ålder, resonerar kring integritet online. Vi vill se vilka skillnader/likheter som finns mellan grupperna, ifall det finns faktorer utöver ålder som är avgörande och ifall det finns någon paradox mellan åsikter och agerande i praktiken. I slutändan ämnar vi kunna ge praktiska råd kring hur företag ska kunna hantera konsumenternas integritet online. För att undersöka detta har vi studerat tidigare forskning på området samt gjort fem djupintervjuer inom vardera grupp. Den teoretiska referensramen innehåller teorier om the privacy paradox, medvetenhet kring informationsinsamling, Communication Privacy Management och Customer Relationship Management. Även GDPR och riktad marknadsföring behandlas, vilket sammantaget har ställs i relation till det insamlade materialet från respondenterna. Därefter har vi besvarat vår problemformulering: “Hur resonerar generation digital natives i jämförelse med generation pre-internet kring företags hantering av deras integritet online?” Resultatet av studien visar att det viktigaste för bägge respondentgrupper var att det finns ett relevant och tydligt syfte för att de ska delge sin information, samt ifall de får någon typ av kompensation. Den största skillnaden gick att se i deras delgivningsnormer, där den yngre respondentgruppen kände större press att dela med sig på social media och därmed indirekt till företag. Den mest framstående skillnaden på individnivå gällde medvetenhet kring insamling, där det varierade från respondent till respondent. Bägge grupperna känner dock en oro inför framtiden, då de ofta känner sig övervakade online. Denna oro härleds ur en känsla av maktlöshet och okunskap kring hur de kan skydda sin data. I spår av maktlösheten har många skapat sig en fabricerad trygghet där de i brist på kunskap istället hoppas på att de ska skyddas av lagar, regleringar och att vara “en i mängden”. Utifrån våra slutsatser rekommenderar vi företag att informera konsumenterna när och varför insamling sker, ge kompensation i någon form samt skydda den data de innehar.
34

Determination of system and processes employed by the property industry to manage information ethics in Gauteng South Africa

Moropane, Itumeleng Vanessa 10 1900 (has links)
The South African property sector is characterised by property practitioner firms that fail to comply with the Estate Agency Affairs Board (EAAB) code of conduct and firms having inefficient systems which are unable to combat hacking and cybercrime in the sector. Although property practitioner firms have systems and processes in place, there are still instances of unethical behaviour. Failure to prevent client personal information from being leaked is still a major problem in the sector, this issue can be addressed by demonstrating due diligence with respect to safeguarding sensitive information. The accuracy of information is also a problem in the sector and requires firms to resort to analysing collected data before capturing it, in order to maintain accuracy. The sector encounter illegal access to systems including breaking the password protected websites and password protection on a computer system. The objectives for this study were to investigate the extent to which firms enforce Information Ethics (IE), explore the systems and processes put in place by firms to enforce IE and to explore the challenges experienced by the firms in the Gauteng province when enforcing IE. The study was qualitative in nature and indepth interviews were conducted to gather information from five managers and five employees within the firm situated in Gauteng province. The study found that these property practitioner firms enforce IE to a certain extent. These firms use (22) systems and processes to enforce IE and experienced (5) challenges during the enforcement of IE. The study concludes that these property practitioner firms enforce IE using different systems and processes and experience challenges during enforcement. The list of IE enforcement systems and processes and challenges identified in this study will assist policy makers in compiling IE policies. The findings will also assist firms in IE enforcement and reduction of IE enforcement challenges. / Business Management / M. Com. (Business Management)
35

Understanding Informational Privacy Through User Interfaces in Web Applications / Informationsintegritet och hur den uppfattas genom gränssnittet i webbapplikationer

Spence, Annalisa, Svensson, Mimmi January 2023 (has links)
This paper critically examines users' perceptions of privacy and security in web applications,emphasizing interface design. Drawing on both quantitative and qualitative data grounded inCPM and PMT theories, our research addresses Internet users' concerns regarding onlineprivacy and security. Employing triangulation analysis on survey responses and web-basedobservations, our findings reveal a strong association between users' trust in web applicationsand their visual elements. By providing visual examples of current design practices in oursurvey, we discover some important aspects of effective interface designs. Utilizing IUIPCtheory, we identify how web application interfaces influence users' privacy management,impacting their trust and usage decisions. Notably, some users are subtly prompted to grantpermissions or share personal information through deliberate exclusion of options in thedesign of certain web applications. The approach of this study encourages a criticalperspective on privacy and integrity issues in online settings.

Page generated in 0.0883 seconds