• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 5
  • 1
  • 1
  • 1
  • Tagged with
  • 9
  • 9
  • 4
  • 4
  • 3
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Personal Online Security

Cameron, Nancy G. 01 February 2010 (has links)
No description available.
2

The Effects of E-payment Methods on Online Purchasing Cancellation : An empirical study on Swedish consumers’ perception of trust and security in e-payments

Scherling, Daniel, Antinoja, Roosa January 2019 (has links)
Abstract Background: Around 45% of Swedish consumers canceled their online purchase in 2018, due to too high delivery fees and issues concerning payments. This research is focusing on e-payments by utilizing the Technology Acceptance Model 3 and its determinants perceived usefulness and perceived ease of use, and how they contribute to the e-payment method decision. Additionally, the relevance of online trust and online security are examined in relation to purchasing cancellations due to trust and security issues in e-payment methods.   Purpose: The purpose of this research paper is to understand how Swedish millennial consumers’ perceptions of online security and online trust of e-payment methods effect on online purchasing cancellation. Furthermore, this paper examines how perceptions of usefulness and ease of use contribute as determinants in choosing between e-payment methods according to Swedish millennial consumers.   Method: The research is carried out in a qualitative manner by conducting a series of semi-structured face-to-face interviews. Fifteen Swedish millennials contributed to the empirical study. The gathered primary data is analyzed and then presented in chapter 4 and connected to the existing literature in chapter 5.   Conclusion: For the Swedish millennials, both online trust and online security are perceived as important determinants when evaluating whether or not the e-payment method could be used. When choosing between different e-payment methods, perceived ease of use seemed to be more important. Additionally, the decisions are made based on which e-payment method is secure, trustworthy, and easy to use. The presence of those determinants also increases perceived usefulness. When making purchases online domestically it appears that perceived ease of use and perceived usefulness weight heavier. While trust and security are given more importance if the purchase is made from a foreign website.
3

Challenges of Online Security for Senior Citizens

Sivagumaran, Sinthujan January 2023 (has links)
Senior citizens are among the most vulnerable groups of cyber victimization in today’s contexts. Ensuring online security for the elderly has become extremely critical as the global elderly population is on the rise and the incident of cyber victimization is rapidly growing causing financial and societal problems for them. This study is conducted to identify the challenges faced in ensuring online security to senior citizens and to propose remedies to these identified challenges. A systematic literature review was performed on Google Scholar, IEEEXplore, Pubmed, ScienceDirect and Proquest databases to identify the challenges using appropriate keywords and screening criteria. 29 Review articles (n=29) were found relevant for the challenges of online security for senior citizens and broadly categorized into physical and psychological factors, technological factors, and awareness factors. 14 review articles (n=14) were found to be relevant as remedial measures on IEEEXplore database. Challenges found for physical and psychological factors were health problems such as mobility decline which led to higher use of online services (higher visibility), issues in recalling memory which leads to inability to recall information regarding crime and non-reporting of crime, and cognitive impairment where they are unable to assess the potential choices. Remedial measures which can be applied for these issues include home monitoring systems using beacon technology, path tracking fall detection systems, use of apps like senior book, use of elder friendly web forms. Seniors were also found to be in social isolation where they are exposed to unfamiliar online activities due to the death of the capable partner, less able to seek advice due to lack of network and the possibility of building relationships with strangers allows the fraudsters to target the elders easily. Further, the relative wealth of seniors is high, and they are less likely to check their balances, making them vulnerable. Smart home systems, apps such as SAFER were found to be possible remedial measures for these situations. Also, elders are reluctant to report victimization due to fear of victim blaming and fear of loss of independence which results in repeated victimization. Challenges identified for awareness factors include less awareness of content of scam, trusting communications which are legitimate authorities and limited awareness on cyber security. Information Security Awareness Programs, online courses on security awareness can be used as a remedial measure to enhance the awareness of cyber security among elders. Technological challenges identified include lack of cyber security skills where they do not have the motivation to seek cyber security related information, unable to understand the jargon used and use of unsecured networks and easily imitable passwords. The remedies found were biometrics instead of passwords, participatory approach for the design and development of programs and use of elder friendly internet browsers. This study contributes to the cyber security of senior citizens by understanding the challenges and suggesting remedies for the challenges identified.
4

El uso de aplicaciones móviles en el sector de comida rápida como herramienta de fidelización online en millenials del NSE A y B ubicados en distritos de Lima moderna / The use of mobile applications in the fast food sector as an online fidelization tool in millennials of NSE A and B located in districts of modern Lima

Agreda bernal, Wilder Bruno 05 July 2019 (has links)
La presente investigación se ha desarrollado con el objetivo de identificar la dimensión de mayor relevancia dentro de los aplicativos móviles, orientados al consumo de comida rápida, que son utilizados por los consumidores en donde se presente una fidelización hacia un aplicativo en específico. Para la realización de la presente investigación se llevó a cabo un análisis mixto. La primera parte de este estudio es de carácter cualitativo en donde se realizaron tres técnicas para la recopilación de la información. En primer lugar, se llevó a cabo entrevistas a profundidad con expertos en el área de marketing digital y desarrollo de aplicativos móviles. En segundo lugar, se realizó un focus group enfocados a usuarios frecuentes de aplicativos móviles para el consumo de comida rápida. En tercer lugar se llevó a cabo una observación online móvil, en la red de Facebook y en la tienda de aplicativos móviles, en donde las reacciones y comentarios en relación a los aplicativos nóviles fueron lo estudiado. La segunda parte de este estudio es de carácter cuantitativo en donde se llevó a cabo encuestas en base a los objetivos planteados durante la investigación. Se buscó identificar la dimensión de mayor impacto en el consumidor con la finalidad de determinar la razón principal de la fidelización hacia un aplicativo móvil perteneciente al rubro de comida rápida. En el análisis cuantitativo se realizó una tabulación de resultados para determinar el grado de importancia y la influencia que tienen las variables ya mencionadas sobre el consumidor. / The present investigation has been developed with the objective of identifying the dimension of greater relevance within the mobile applications, oriented to the consumption of fast food, which are used by the consumers where there is a loyalty to a specific application. To carry out the present investigation, a mixed analysis was carried out. The first part of this study is qualitative in which three techniques for the collection of information were performed. First, in-depth interviews were conducted with experts in the area of digital marketing and mobile application development. In the second place, a focus group focused on frequent users of mobile applications for fast food consumption. In the third place, a mobile online observation was carried out, in the Facebook network and in the mobile application store, where the reactions and comments in relation to the mobile applications were studied. The second part of this study is of a quantitative nature where surveys were carried out based on the objectives set during the investigation. We sought to identify the dimension with the greatest impact on the consumer in order to determine the main reason for the loyalty to a mobile application belonging to the fast food category. In the quantitative analysis, a tabulation of results was carried out to determine the degree of importance and the influence of the aforementioned variables on the consumer. / Trabajo de investigación
5

Constant and instant notifications - youth experiences of online security, relations and information in La Paz/El Alto

Nordeman, Anna-Therese January 2014 (has links)
Several studies explore new technology and social media usage, especially in the global North. This study set out to investigate what kind of experiences and opinions youth in La Paz and El Alto, Bolivia, had of their internet and communication technology usage, through semi-structural interviews, at the same time comparing the possible differences in this between LGBT and non-LGBT youth. That way I am trying to add a perspective and voice in the new media discourse, as well as adding to the knowledge of my partner organization, Svalorna Latinamerika. I decided to focus on three main online activities; security issues, relationship building and information management, and the nine informants were encouraged to share their thoughts and experiences as well as information about their general ICT usage. The results showed that the youth’s internet usage was depending more on their interest in the different media and platforms, rather than on their sexual orientation or gender. The LGBT informants however had more experiences of discrimination and threat online. Also, all of the informant’s seemed to create new relations not only to other users online, but also to the platforms and media itself, this depending on how much they were using the platforms. Finally I could see that the informants could satisfy many different needs with their ICT and social media use, depending on their interests, resources and time spent online.
6

An empirical study on the relationship between identity-checking steps and perceived trustworthiness in online banking system use : submitted in partial fulfilment of the requirements for the Degree of Master of Information Sciences in Information Technology

Zhang, Yang January 2009 (has links)
Online banking systems have become more common and widely used in daily life, bringing huge changes in modern banking transaction activities and giving us a greater opportunity to access the banking system anytime and anywhere. At the same time, however, one of the key challenges that still remain is to fully resolve the security concerns associated with the online banking system. Many clients feel that online banking is not secure enough, and to increase its security levels, many banks simply add more identity-checking steps or put on more security measures to some extent to give users the impression of a secure online banking system. However, this is easier to be said than done, because we believe that more identity-checking steps could compromise the usability of the online banking system, which is an inevitable feature in design of usable and useful online banking systems. Banks can simply enhance their security level with more sophisticated technologies, but this does not seem to guarantee the online banking system is in line with its key usability concern. Therefore, the research question raised in this thesis is to establish the relationships between usability, security and trustworthiness in the online banking system. To demonstrate these relationships, three experiments were carried out using the simulation of an online banking logon procedure to provide a similar online banking experience. Post questionnaires were used to measure the three concepts, i.e. usability, security and trustworthiness. The resulting analyses revealed that simply adding more identity-checking steps in the online banking system did not improve the customers? perceived security and trustworthiness, nor the biometric security technique (i.e., fingerprints) did enhance the subjective ratings on the perceived security and trustworthiness. This showed that the systems designer needs to be aware that the customer?s perception of the online banking system is not the same as that conceived from a technical standpoint.
7

Contemporary Online Banking Fraud in Norway : A case study

Aspvik, Daniel Weenås, Aspvik, Preben Weenås January 2020 (has links)
Banks are currently battling rising of fraudulent activities as it damages their relationship with their customers. Online banking fraud is decreasing trust and confidence among the customers and decreasing operating performance and increasing cost for the banks. This paper looks at online banking fraud in Norway and answers the research questions (1). How are bank customers attacked through the internet? and (2). How are banks trying to prevent fraudulent attacks against their customers? Interviews and document collection were used for data gathering, and in total, four interviews were conducted with academics and business professionals. The data were analysed using thematic analysis. The findings suggest that BankID fraud, Card fraud, CEO fraud, Investment fraud, Love scams and Phishing are among the most frequent attacks in Norway at present. Attacks contain elements of social manipulation, constantly change and are customized to target victims. The attacks have in common that they all are showing patterns of professionalizing. The study found that Norwegian banks are technologically advanced regarding fraud detection and authentication, and have put efforts into awareness against online banking fraud. However, the main issue of online banking fraud in Norway is seemingly grounded in the interactions made by the customers with the technology and not the prevention system the banks deploy.
8

[pt] TEORIA E APLICAÇÃO DE EQUIVALENTES DINÂMICOS NA REDE ELÉTRICA BRASILEIRA / [en] THEORY AND APPLICATION OF DYNAMIC EQUIVALENTS TO THE BRAZILIAN POWER GRID

RODRIGO VILLELA DE FARIA 13 January 2020 (has links)
[pt] Modelos equivalentes de rede podem ser usados na avaliação de segurança online, no planejamento da operação de grandes sistemas e na simulação em tempo real. A representação de partes não observadas do sistema por equivalentes melhora significativamente o desempenho computacional, que é um requisito importante na avaliação de segurança on-line, e necessário quando não estão disponíveis informações sobre áreas não observadas. Em simuladores em tempo real, devido a limitações de hardware, é obrigatório o uso de equivalentes. Para estudos de planejamento, as reduções de rede fazem sentido se o sistema for muito grande e o foco da análise restrito a uma parte relativamente pequena do sistema, para os quais o uso de equivalentes de rede pode poupar uma enorme quantidade de tempo. O tema dos equivalentes de rede recebeu atenção significativa nos anos 70 e 80, principalmente na avaliação da segurança estática. Entretanto, para aquelas perturbações que envolvem respostas de potência pelo sistema externo, simples modelos estáticos podem não ser suficientes. Para isso, utiliza-se a representação dinâmica nesses equivalentes. O sistema externo deve manter uma resposta semelhante às oscilações eletromecânicas do sistema original. Tendo em vista a expansão do Sistema Interligado Nacional (SIN), a crescente inserção de elos de corrente contínua e a elevada da participação de fontes de geração distribuída, especialmente a eólica, é esperado um aumento significativo do número e complexidade dos modelos para simulações dinâmicas. Assim, é de extrema relevância o aperfeiçoamento dos equivalentes dinâmicos, tanto para utilização on-line como para o planejamento da operação. Portanto, esta dissertação visa explorar os limites das técnicas de equivalentes dinâmicos de rede mais recentes, bem como possíveis caminhos para o aperfeiçoamento de sua aplicação, inclusive com a consideração do seu uso para acelerar o cálculo de regiões de segurança. Além de uma revisão da teoria recente de equivalentes estáticos e dinâmicos, serão apresentadas aplicações de equivalentes dinâmicos em diferentes regiões do SIN. A primeira região, mais restrita, representa a rede de atendimento aos estados do Acre e Rondônia, com o restante do SIN reduzido. A segunda região, mais geral, reduz partes do SIN considerando o bloqueio total do Bipolo Xingu-Estreito e seu impacto na rede. Os resultados obtidos são amplamente discutidos. / [en] Equivalent network models can be used for online security assessment, operation planning of large systems, and real-time simulation. Representing unobserved parts of large networks by equivalents significantly improves computational performance, which is an important requirement in online security assessment and required when no information on unobserved areas is available. In real-time simulators, due to hardware limitations, the use of equivalents is mandatory. For planning studies, network reductions make sense if the system is too large and the focus of analysis is restricted to a relatively small part of the system, for which the use of network equivalents can save a huge amount of time. The topic of network equivalents received significant attention in the 1970s and 1980s, especially in static security assessments. However, for those perturbations involving power responses by the external system, simple static models may not be sufficient. For this, the dynamic representation in these equivalents is used. The external system must preserve a response similar to the electromechanical oscillations of the original system. Considering the expansion of the Brazilian Interconnected System (BIS), the increasing insertion of DC links and the high contribution of distributed generation sources, especially wind, a significant increase in the number and complexity of the models for dynamic simulations is expected. Thus, it is extremely important to improve the dynamic equivalents, for both online use and for operation planning. Therefore, this dissertation aims to explore the limits of the latest dynamic network equivalent techniques as well as possible ways to improve its application, including its use to speed up the assessment of security regions. In addition to a review of the recent theory of static and dynamic equivalents, applications of dynamic equivalents will be presented in different regions of the BIS. The first region, more restricted, represents the network transmission services to the states of Acre and Rondônia, with the rest of the BIS reduced. The second region, more general, reduces parts of the BIS considering the total block of the Xingu-Estreito bipole and its impact on the network. The results obtained are widely discussed.
9

Skyddsåtgärder på sociala medier : En kvalitativ studie om hur individer kan skydda sig mot cyberattacker och varför de inte tillämpar skyddsåtgärder på sociala medier

Shi, Amy, Sellman, Hanna January 2024 (has links)
Digitala plattformars integration i samhället har omformat hur vi människor kommunicerar, arbetar och lever på. Sociala medier har bidragit till en central del i denna omvandling, samtidigt som det även har ökat risken för individers sårbarheter för cyberattacker. Individer lämnar digitala fotavtryck genom aktiviteter online som kan hota deras integritet och säkerhet. Trots detta saknar många medvetenhet om riskerna och kunskap om hur de kan skydda sig. Syftet med studien är att utforska vilka skyddsåtgärder som kan minska individers sårbarheter för cyberattacker på sociala medier. Dessutom syftar studien till att utforska varför de avstår från att använda dessa skyddsåtgärder. Genom att granska tidigare forskning och analysera de mänskliga faktorer som påverkar säkerhetsmedvetenhet, strävar studien efter att undersöka dessa beteenden. En kvalitativ forskningsansats antogs och datainsamlingen gemfördes med hjälp av semistrukturerade intervjuer. Analysen utfördes med en tematisk analysmetod där tre teman identifierades som är: skyddsåtgärder, sociala medier och attityder och användarbeteende. Slutsatsen är att individer kan tillämpa skyddsåtgärder som starka lösenord, undvika delning av lösenord, tvåfaktorsautentisering och att vara misstänksam mot okända meddelanden för att skydda sig mot cyberattacker. Individer använder inte dessa åtgärder på grund av en naiv attityd kring cyberattacker och upplevd omständighet med att implementera skyddsåtgärder. Trots att vissa blivit offer för cyberattacker fortsätter de att inte tillämpa skyddsåtgärder på grund av bristande förståelse för risker och konsekvenser. / The integration of digital platforms into society has transformed how we communicate, work, and live. Social media has played a central role in this transformation, while also increasing individuals' vulnerabilities to cyberattacks. People leave digital footprints through online activities that can threaten their privacy and security. Despite this, many lack awareness of the risks and knowledge of how to protect themselves. The aim of this study is to explore protective measures that can reduce individuals' vulnerabilities to cyberattacks on social media. Additionally, the study seeks to understand why individuals refrain from using these protective measures. By reviewing previous research and analyzing the human factors affecting security awareness, the study aims to investigate these behaviors. A qualitative research approach was adopted, and data was collected through semi-structured interviews. The analysis was conducted using a thematic analysis method, identifying three themes: protective measures, social media, and attitudes and user behavior. The conclusion is that individuals can apply protective measures such as strong passwords, avoiding password sharing, two-factor authentication, and being suspicious of unknown messages to protect themselves against cyberattacks. Individuals do not use these measures due to a naive attitude towards cyberattacks and the perceived inconvenience of implementing protective measures. Despite some having been victims of cyberattacks, they continue not to apply protective measures due to a lack of understanding of risks and consequences.

Page generated in 0.0435 seconds