• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 12
  • 7
  • 6
  • 1
  • 1
  • 1
  • Tagged with
  • 29
  • 29
  • 10
  • 7
  • 7
  • 7
  • 5
  • 5
  • 5
  • 5
  • 5
  • 5
  • 5
  • 5
  • 5
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Segurança hídrica e a gestão de risco da RMSP / Water Security and the risk management of RMSP

Delgado, Juliana Aparecida da Silva 25 September 2018 (has links)
A estiagem ocorrida no verão entre 2013 e 2014 prejudicou a recarga dos reservatórios do Sistema Cantareira e colocou em risco o abastecimento da Região Metropolitana de São Paulo (RMSP). Apesar de ser atribuída aos fatores climáticos, a (in)ação dos tomadores de decisão no âmbito da gestão de recursos hídricos pode ter contribuído para o agravamento do que ficou conhecido como a pior crise hídrica desde 1953. A condução do gerenciamento da crise foi marcada pela incapacidade das autoridades em fornecer uma resposta para a solução dos problemas decorrentes. Dessa forma, esta dissertação teve como objetivo realizar um levantamento histórico da gestão de recursos hídricos da RMSP, identificar e analisar os instrumentos para a segurança hídrica e gestão de risco nas políticas e o conjunto de políticas e estratégias adotadas para a RMSP para combater a crise hídrica como planos, programas e obras em andamento ou planejadas com foco no Plano de Contingência. A pesquisa foi realizada por meio de estudo de caso. Este trabalho considera que não foram adotadas medidas que visassem a gestão de risco, mas sim a gestão de crise, caracterizada pelas ações reativas dos tomadores de decisão. Tais ações foram controversas aos princípios de integração, participação e descentralização das políticas de recursos hídricos. Essa situação refletiu na elaboração tardia do Plano de Contingência, que ofereceu diretrizes vagas e pouco esclarecedoras. / The drought ocurred during the summer of 2013 and 2014 damaged the recharge of the reservoirs of Cantareira System and it put at risk the water supply of the Metropolitan Region of São Paulo (MRSP). Although attributed to climatic factors, the (in)action of the government decision-makers in relation to the management of water resources may have contributed to the aggravation of what was considered as the worst water crisis since 1953. The authorities\' inability to provide a response to the solution of the problems conducted the management of the crisis. Thus, this work aimed to carry out a historical survey of the water resources management of the MRSP, to identify and analyze the instruments for water security and risk management policies and the set of policies and strategies adopted for the MRSP to combat the crisis such as plans, programs and works in progress or planned focus on the Contingency Plan. This research was carried out through a case study. This work considers that the measures which were adopted did not aim the risk management, they just aimed the crisis management, characterized by the reactive actions of the government decision-makers. Those action were contradictory in relation to the principles of integration, participation and decentralization of water resources policies. That situation reflected in a late elaboration of the Contingency Plan which offered vague and unclear guidelines.
2

Security risks of climate change : Climate change induced conflicts in western Kenya

de Groot, Caroline Sofie January 2018 (has links)
The purpose of this paper is to examine links between climate change and conflicts. The report aims to produce relevant insights on the security risks posed by climate change in the rural pastoral area Sarambei in western Kenya. The research was conducted in spring 2018 and founded by an MFS-scholarship from Swedish International Development Cooperation Agency (SIDA). The research examines the hypothesis that climate change is increasing the risk of insecurity. Through qualitative methods twenty respondents living in Sarambei and five experts were interviewed. The main finding of the study is that climate change is happening, affecting the people in Sarambei and are creating conflicts through water scarcity. However, it is difficult to say that climate change is the only source for these conflicts, but instead emerges from the interaction of multiple factors.
3

Zavedenie systému riadenia informačnej bezpečnosti v malom podniku / The Implemetation of Information Security Management system in the Small Company

Altamirano, Peter January 2013 (has links)
The diploma thesis deals with the design of implementation of information security management system in IT company, deals with metrics for measuring the effectiveness of the system, according to the international standards ISO/IEC 2700x. The thesis solves invested resources in the establishment of the system. The thesis provides a summary of theoretical knowledge of information security management system, analyzes the current situation in the company and propose measures to increase security in the company.
4

Analysis of Security Risks in Mobile Payments : A Case Study Using DNAT

Ba, Jing January 2013 (has links)
Technology development always makes the life easier and faster thus it also impacts the way we do business in our lives. As the widespread usage of mobile devices in recent years mobile technology has created an environment in which people around the world are getting closer. Recently the popularity of personal mobile devices like Ipad and Iphone leads to the appearance of opportunities to improve payments more fast and efficient. And for the past years various services and applications for mobile payment have been developed by the companies which are eager for the leader positions in the new market. With the development of mobile payment and the important relationship between payment and our lives, a lot of security risks associated with this field should be extensively studied. This thesis aims to analyze the security risks related to the mobile payment. This thesis uses an explorative method to research the stakeholders, critical assets and vulnerabilities within mobile payment by utilizing case studies of Square and Google Wallet. The information gathered from the case studies and security analysis is further analyzed by the dynamic network analysis tool (ORA) in order to discover the security risks. The results of this thesis indicate that accounts and business data are the most critical assets in mobile payment because accounts are the foundation to perform payment transactions. Further, the mobile payment service provider, merchant and consumer are the stakeholders affected most by the security risks. And this thesis concludes that all the stakeholders should be aware of the security risks within the mobile payment environment, and further if service and device providers want to keep continuous business they should make more effort to cooperate with each other to protect the users against these risks.
5

Information Security Guidelines for Organizations Intending to Adopt Cloudsourcing

Annamalai, Neelambari January 2012 (has links)
Change is constant and computing paradigm is no exception. It has witnessed major shifts right from centralized client server systems to widely distributed systems. This time the locus of change in the computing paradigm is moving towards virtualization, paving way to cloud computing. Cloud computing aims at providing computing services to its users as an utility. It allows its authenticated users to access a wide range of highly scalable computing capabilities and services via the internet on a pay-per-usage basis. Organisations not only view these benefits as cost-saving strategies, but also aim at improving the competitive advantages using cloud computing. Hence, this has given rise to a new horizon in IT/IS outsourcing. With a collaboration of cloud computing and outsourcing emerged a new concept called cloudsourcing. Cloudsourcing can be termed as the next generation outsourcing and the next phase of cloud computing promising benefits from both the areas. Cloudsourcing is outsourcing traditional business via the cloud infrastructure. Though there is pompous popularity surrounding this new technology, there is much hesitation in adopting it due to the inherent security issues. This paper discusses in detail the security issues and possible solution to the same. As this is a new concept, not much work is identified to be done in providing a set of guidelines to adopt cloudsourcing that are very specific to information security. This work intends to fill this aperture by building a set of well-defined information security guidelines, which can be termed as a novel. For this purpose, design science research method proposed by Hevner et al is used so as to accomplish this goal. Initially, a literature study is done after which an exploratory study comprising of interviews is done to gather qualitative data. The results of the exploratory interview is tested for correctness and evaluated based on an evaluation study comprising a survey based questionnaire. The analysis of the evaluation study results provides the final results. In such an attempt, the identified countermeasures to risks are classified into three groups namely, organisational, technical and regulatory and compliance guidelines. Hence the end results constituting the set of information security guidelines are classified into the above mentioned groups. This work is assumed to contribute to our understanding of information security in cloudsourcing and in supporting IT decision makers, IT project managers and security executives of organisations for a smooth and secure transition towards cloudsourcing their business.
6

IOT-ENHETER I B2B-FÖRETAG : Nya teknologiska framsteg eller potentiella säkerhetsrisker? / IOT-DEVICES IN B2B-COMPANIES : New Technological Advances or Potential Security Risks?

Bahman, Andreas, Lyvall, Eleonora January 2023 (has links)
I takt med den ökande digitaliseringen ökar även antalet uppkopplade IoT-enheter. Inom B2B-företag används  IoT-enheter i allt större utsträckning för att effektivisera verksamheten och skapa konkurrensfördelar. Den digitala utvecklingen och det ökade antalet IoT-enheter har emellertid medfört säkerhetsrisker och att företag har svårt att skydda sig mot cyberangrepp via IoT-enheterna. Denna studie undersöker hur B2B-företag påverkas av säkerhetsriskerna med IoT-enheter och hur de kan arbeta för att hindra dem. Insamlingen av empiriskt material skedde genom sju semistrukturerade intervjuer och teorin består av vetenskapliga artiklar. Resultatet är att om IoT-enheter skulle bli angripna hade det lett till samhälleliga och ekonomiska konsekvenser och det finns en del åtgärder B2B-företag behöver vidta för att skydda sina enheter. De vanligaste säkerhetsriskerna hos IoT-enheterna var olika fysiska risker samt okrypterad datatrafik. Slutsatsen är att det är avgörande för B2B-företag att skapa en helhetsstrategi för cybersäkerhet hos sina IoT-enheter för att skydda sig mot de befintliga säkerhetsriskerna hos IoT-enheterna. Denna uppsats bidrar till informatik ämnets utveckling genom att ge insikter i hur B2B-företag påverkas av digitaliseringen och de säkerhetsrisker för IoT-enheter medför. / As digitalization increases, the number of connected IoT devices also grows. Within B2B companies, IoT devices are increasingly used to streamline operations and gain competitive advantages. However, the digital development and the increased number of IoT devices have also brought about security risks, making it challenging for companies to protect themselves against cyber attacks through these devices. This study examines how B2B companies are affected by the security risks associated with IoT devices and explores ways in which they can work to prevent them. Empirical data for this study was collected through seven semi-structured interviews, and the theoretical framework draws from scientific articles. The findings indicate that if IoT devices were to be compromised, it would have societal and economic consequences, necessitating certain measures that B2B companies need to take to safeguard their devices. The most common security risks with the IoT devices were various physical risks and unencrypted data traffic. The conclusion is that it is crucial for B2B companies to develop a comprehensive cybersecurity strategy for their IoT devices in order to protect themselves against the existing security risks posed by IoT devices. This paper contributes to the advancement of the field of informatics by providing insights into how B2B companies are affected by digitalization and the security risks associated with IoT devices.
7

A study of information security awareness on teleworking security risks and recommendations since Covid19 pandemic

Galajda, Lukas January 2023 (has links)
This study is looking at “the changed” world for employees that were lucky and could continue their work from places other than the office since the Covid-19 pandemic outbreak using teleworking tools. Their numbers grew exponentially and while they still had to perform their duties as usual, they could not rely on the security infrastructure built at the office. The attackers saw this immediately and took the opportunity to unleash various techniques with malicious intent. Now the time is right to find out whether the coronavirus pandemic did at least some good and to what extent the remote workers are aware of information security guidelines. This quantitative study begins with the formation of the research question and first thoughts about the research model. Then the search thru the literature thoroughly finds mostly used attacks as well as the best way how to protect against them and the review of theory builds a research model that fits the aim of the study. Thru a quantitative online survey via snowballing method answers from users from all over the world are collected and analyzed and the hypotheses drawn from the model are verified. Lastly, results are discussed, and a conclusion is provided. The study findings are that the teleworkers are quite highly aware of information security awareness or ISA, thanks to sufficient knowledge and attitude towards information security, and in turn, this awareness leads to correct behavior in information security. More specifically, knowledge is more strongly associated with ISA of telework risks than recommendations, attitude, on the other hand, is more strongly related to telework recommendations than the risks, also ISA of telework risks has a greater influence on behavior than ISA of telework recommendations. The contribution of this study is the revelation that the impact of telework and the coronavirus pandemic did not change the course of information security awareness perception in comparison to pre-pandemic studies. Also, thanks to the subcategorization of ISA to risks and recommendations it was revealed that awareness of teleworking risk is quite higher than awareness of recommendations after the Covid-19 period.
8

Exploring the benefits, limitations and drawbacks of using LoRa with UAVs and AMRs for Warehouse Management : A study on behalf of Proton Finishing AB

Claesson, Daniel, Palmqvist, Noah January 2023 (has links)
This study explores the potential benefits, limitations and drawbacks of usingLoRa with unmanned aerial vehicles (UAVs) and autonomous mobile robots (AMRs)together for warehouse management. Three research concerns are looked at in order toprovide a full analysis of the topic. First, the benefits, limitations and drawbacks of utilizingLoRa with UAVs and AMRs are discussed along with suggestions for how to get over thechallenges within warehouse management. Second, potential security risks with the usage ofLoRa in conjunction with UAVs and AMRs for warehouse management are recognized, andmitigation strategies are recommended. The study's last portion considers how warehousemanagement company Proton Finishing AB may utilize LoRa in combination with UAVs andAMRs to promote environmental sustainability.
9

A phoenix of the modern world: the re-emergence of National Science Advisory Board for Biosecurity and its implications for scientific partners

Walther, Gerald, Dando, Malcolm R. January 2015 (has links)
No / While there are many mythical stories of various kinds about the Phoenix it retains several features throughout all of them. In ancient Egypt, the Phoenix was the prodigy of the sun god Ra and appeared in the shape of a giant bird of fire, which was one of the most beautiful creatures on earth. It was remarkable in that it could not foster any offspring and at the end of its life would explode in a ball of fire. Out of the ashes, an egg is formed which then hatches the Phoenix again in its young form. The cry of a Phoenix was supposed to be of miraculous beauty. This chapter will explore if the Phoenix is a suitable metaphor for the recent re-emergence of the US National Science Advisory Board for Biosecurity (NSABB), which was tasked with providing scientific expertise to the government on questions of the security risks of emerging science and technology in the life sciences. The analogy to the Phoenix suggests itself because the NSABB, chartered in 2004, had been inactive for over two years and only recently took up its work. The comparison between the Phoenix and the NSABB gives rise to several questions: first, has the re-emergence of the NSABB been met with an equally beautiful cry of joy among the scientists and security experts? Second, what happens when the Phoenix lies dormant? And third, what took place before the Phoenix was created?
10

Ungdomars medvetenhet om säkerhetsrisker med bankverktyg / Youths’ awareness of security risks in bank tools

Särkiniemi, Taru, Eldnor, Emma January 2013 (has links)
According to Nosti (2012) banks target youths to find new customers by giving them special offers such as debit cards from a relatively early age. However, Moschis and Churchill (1979) point out that age can affect the level of knowledge in the consumer. Therefore, this essay focuses on youths as consumers. Specifically, youths’ awareness of security risks in using bank tools such as debit cards or internet banks was studied. The study was conducted by using four methods: a survey, a focus group, interviews with representatives from four banks on Gotland and a study of banks’ webpages. The participants of the survey and focus group where 16-19 years of age. According to Proença, Silva and Fernandes (2010), relationship marketing, or customer relationship management, is a strategy practiced by banks in which they sometimes use technology as a tool. However, a lack of awareness and knowledge among the customers can lead to misuse of the tools. Among other things, according to Harr (2012) it can lead to financial loss. The results that emerged from the study in this essay show that youths seem to have awareness within some areas, but further knowledge may be required in others, for example, in internet security. In addition, the results indicate that youths in some cases behave as if they do not believe anything harmful might happen to them, even though they are aware of the risks. Possible contributing factors to their actions may be group pressure, family influence and/or lack of knowledge.

Page generated in 0.08 seconds