• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 43
  • 21
  • 6
  • 4
  • 3
  • 3
  • 1
  • 1
  • Tagged with
  • 95
  • 95
  • 42
  • 35
  • 33
  • 31
  • 19
  • 18
  • 14
  • 12
  • 10
  • 10
  • 9
  • 8
  • 8
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
91

Hur arbetar IT-leverantörer med att skydda deras kommunikationsvägar? / How do IT-suppliers protect their communication paths?

Jonsson, Rasmus January 2024 (has links)
Kommunikationsvägar i business-to-business-kommunikation (B2B-kommunikation), så som e-post och telefoni, är idag utsatta för ett ökande hot från cyberattacker. Tidigare forskning har visat att många vanliga kommunikationsvägar är sårbara för hot, inklusive social manipulation och ransomware.  Studien undersökte hur IT-leverantörer arbetar för att säkerställa att deras B2Bkommunikationsvägar är säkrade, vilka sårbarheter de ser i sin befintliga miljö och vilka metoder de använder för att förhindra attacker. För att besvara frågorna genomfördes en kvalitativ fallstudie med en IT-leverantör. Semi-strukturerade intervjuer genomfördes för att ta reda på respondenternas åsikter och erfarenheter i relation till kommunikationsvägarna. Totalt 19 frågor inom olika kategorier ställdes till respondenterna.  Resultaten och analysen av intervjuerna indikerar att e-post och telefoni är de primära kommunikationssätten hos den IT-leverantör som deltog i fallstudien. Det skiljer sig också åt hur olika avdelningar föredrar att kommunicera. Resultaten visar även en oro över den växande hotbilden inom IT-sektorn. Som en följd är respondenterna medvetna om relevanta cyberattacker, så som ransomware eller andra attacker som involverar social manipulation. Respondenterna delar också hur de arbetar för att skydda sina kommunikationsvägar, samt identifierar områden för förbättring i en nära framtid. Slutligen kräver lagar och regler att IT-leverantören förbättrar och stärker sin IT-säkerhet, med framträdande exempel som GDPR och NIS-2-direktiven. / Communication paths in business-to-business communication (B2B-communication), such as email and telephony, are today exposed by an increasing threat of cyber attacks. Previous research has demonstrated that many common communication paths are vulnerable to threats, including social engineering and ransomware.  The study examined how IT-suppliers work to ensure that their B2B-communication paths are secured, what vulnerabilities in their existing environment do they see and what mitigation techniques they are using to prevent attacks. To answer the questions a qualitative case study was conducted with an IT-supplier. Semi-structured interviews were conducted to find out the respondents’ opinions and experiences in relation to the communication paths. A total of 19 questions across various categories were posed to the respondents.  The results and analysis of the interviews indicate that email and telephony are the primary modes of communication at the IT-supplier involved in the case study. It also differs in how different departments prefer to communicate. The results also indicate a concern about the growing threat landscape in the IT sector. As a result, the respondents are aware of relevant cyber attacks, such as ransomware or other attacks involving social engineering. The respondents also share how they work to protect their communication paths, as well as identify areas for improvement in the near future. Finally, laws and regulations requiere the IT-supplier to enhance and improve their IT-security, with prominent examples being GDPR and the NIS-2 directives.
92

Teorie petrifikovaných světů na příkladu antiutopické a dystopické literatury / The Theory of Petrified Worlds on the Example of Anti-utopian and Dystopian Literature

Pavlova, Olga January 2019 (has links)
In my dissertation Theory of Petrified Worlds on the Example of Anti-Utopian and Dystopian Literature, I deal with anti-utopian and dystopian literature, which has been largely neglected by Czech scholarship. After the introduction to the issue I deal with the detailed analysis of the novel We by Yevgeny Zamyatin, after which I devote my attention to the theoretical definition of terms, including the historical mapping of previous research. I focus on the historical context of the emergence of the genres, including a deeper analysis of its beginnings, i.e. the development of utopian literature from Plato to William Morris and Herbert George Wells, and in detail describe the emergence of anti-utopian literature primarily as an opposition to utopian tendencies and its evolution into dystopia. A major part of the work deals with a specific semiotic analysis of the characteristic and constitutive features of the genres of anti-utopian and dystopian literature of the 20th and 21st centuries. This includes, among other things, the closed and petrified world of the novels, which gave the name to the presented theory, the strict division of society, the existence of newspeak, the characteristics of the main and secondary characters, as well as the social and political context of the analysed works. In...
93

L'ingénierie sociale d'Otto Neurath (1882-1945) / The social engineering of Otto Neurath (1882-1945)

Zwer, Nepthys 18 September 2015 (has links)
Cette thèse présente l’ingénierie sociale de l’économiste, sociologue et philosophe autrichien Otto Neurath (1882-1945). Une première partie s’intéresse aux aspects biographiques qui éclairent sa volonté d’une intervention ciblée et planifiée dans l’ordre social. La technique de l’histoire conceptuelle permet ensuite de mettre à jours les représentations mentales à l’œuvre dans l’ingénierie sociale : le topos de la « modernité » – avec une nouvelle conception de la société, du temps et du rôle potentiel de la société civile – suggère la possible gestion du groupe social selon les principes d’une rationalisation de la vie. La Gesellschaftstechnik de Neurath est enfin reconstruite par la méthode de l’histoire intellectuelle, qui révèle l’importance du contexte viennois, des dynamiques à l’œuvre dans la Révolution de Novembre et des questionnements économiques du moment dans l’élaboration de sa pensée et de son eudémonisme social. / This thesis presents the social engineering as devised by Otto Neurath (1882-1945), an Austrian economist, sociologist, and philosopher. The introductory first part highlights certain issues of his biography which turned out significant in his subsequent idea of the necessity of a targeted and planned intervention in the social order. In part two, the technique of conceptual history reveals the mental representations at work in social engineering : the topos of "modernity" – built on a new concept of society, of time, and of the potential role of civil society – suggests the feasibility of managing a social group according to principles of rationalization of life.Neurath’s Gesellschaftstechnik is then reconstructed by the method of intellectual history, which shows the Viennese context, the dynamics involved in the 1918-19 German Revolution, and the economic concerns of the time as being essential for the development of his thought and his programme of social eudaimonism.
94

Návrh bezpečnostní infrastruktury elektronického archivu / Design of security infrastructure for electronic archive

Doležel, Radek January 2009 (has links)
This master's thesis deals with design of security infrastructure for electronic archive. In theoretical part is disscus about technical resources which are based on security services and protocols and methods which are used for protection. On basics of theoretical part is designed model of security infrastructure and it is built in laboratory. Model of security infrastructure is based on Open Source Software and as safety storages for private user authentication data are used cryptographic USB tokens. This master's thesis includes design and construction of real infrastructure of secured electronic archive. In each part of master's thesis is put main emphases on security and clear explanation from the beginning of desing of model of security infrastructure for electronic archive to finish of construction.
95

Malicious Intent Detection Framework for Social Networks

Fausak, Andrew Raymond 05 1900 (has links)
Many, if not all people have online social accounts (OSAs) on an online community (OC) such as Facebook (Meta), Twitter (X), Instagram (Meta), Mastodon, Nostr. OCs enable quick and easy interaction with friends, family, and even online communities to share information about. There is also a dark side to Ocs, where users with malicious intent join OC platforms with the purpose of criminal activities such as spreading fake news/information, cyberbullying, propaganda, phishing, stealing, and unjust enrichment. These criminal activities are especially concerning when harming minors. Detection and mitigation are needed to protect and help OCs and stop these criminals from harming others. Many solutions exist; however, they are typically focused on a single category of malicious intent detection rather than an all-encompassing solution. To answer this challenge, we propose the first steps of a framework for analyzing and identifying malicious intent in OCs that we refer to as malicious mntent detection framework (MIDF). MIDF is an extensible proof-of-concept that uses machine learning techniques to enable detection and mitigation. The framework will first be used to detect malicious users using solely relationships and then can be leveraged to create a suite of malicious intent vector detection models, including phishing, propaganda, scams, cyberbullying, racism, spam, and bots for open-source online social networks, such as Mastodon, and Nostr.

Page generated in 0.0936 seconds