Searched for: contributor%3A%22Pieters%2C+W.+%28mentor%29%22
(1 - 20 of 26)

Pages

document
Binkhorst, Veroniek (author)
More effective and efficient risk communication in the cybersecurity field needs to be designed to improve risk awareness among people and to increase resiliency. The field of cyber risk communication is relatively new, which limits the current knowledge on how to design risk communication. In this study the risk perception of eleven laypeople...
master thesis 2020
document
Ho-Sam-Sooi, Nick (author)
Given the significant privacy and security risks of IoT devices, it seems desirable to nudge consumers towards buying more secure devices and taking privacy into account when purchasing these devices. In order to support this goal, this study has examined the effect of security and privacy on IoT device purchase behaviour and assessed whether...
master thesis 2020
document
Hagenaars, Kay (author)
The information security (IS) risk assessment process is an essential part to organisation's their protection of digital assets. However, the fast changing IS environment causes for limited knowledge of eventualities, dependencies and values of systems and phenomena. Consequently, the IS risk assessment process is depending on the judgment of...
master thesis 2019
document
Veldhuis, Masjenka (author)
master thesis 2018
document
Mok, Ellen (author)
Humanitarian assistance is driven by data and information. Through the whole<br/>chain of actions – from early warning systems to evaluation – information<br/>determines priorities, resource allocation, and donors’ willingness to donate.<br/>However, the potential harm that comes with data is often overlooked. Inadequate<br/>data management...
master thesis 2018
document
Rieff, Iris (author)
master thesis 2018
document
de Vries, Jennie (author)
One of the leading perspectives from literature is that decisions about investments should be made based on a comprehensive cost-benefit analysis and on a cyber-risk assessment. However, many organizations do not undertake this sophisticated analyses due to the lack of available data about costs, benefits and the impact and likelihood of attacks...
master thesis 2017
document
Guerra Veloz, Ana (author)
In the Internet of Things paradigm, everyday objects communicate with each other to form a worldwide dynamic network which provides opportunities for innovative services and applications in almost every field. Nevertheless, such a dynamic network also brings serious security issues to users, society, and even to the internet. Things that lack of...
master thesis 2017
document
Koenders, J.P. (author)
master thesis 2016
document
Meeuwisse, K.V.M. (author)
Companies implement technical security measures to let their employees behave in a secure manner. Employees however, can circumvent these measures. To solve this circumventing problem companies should know better what the preferences of their employees are. Employees’ preferences with regards to technical security measures are based on the...
master thesis 2016
document
Dinh, C.H. (author)
Crisis situations require critical decision making under high uncertainty and time pressure. These decisions can impact an organization internally and externally when remained unhandled. However, due to the rarity of crisis events, there is a lack of training on the job. A designed simulation game should offer a training methodology which takes...
master thesis 2016
document
Syauta, K.J. (author)
master thesis 2016
document
Breukers, Y.P. (author)
Software vulnerabilities are a major enabler for cyberattacks, and are therefore responsible for a sizeable portion of the risk for large organisations in cyberspace. Little research has been done on the dynamics underlying this risk. The goal of this paper is to find how organisations and software vendors can influence the overall risk level as...
master thesis 2016
document
Van Moorsel, D.P. (author)
master thesis 2016
document
Slangen, R. (author)
Cyber-attacks have become inevitable in modern day society. Therefore, the occurrence of cyber-attacks is increasingly seen as a risk in an organisation. This has increased the interest in risk analysis methods since these try to better understand this so-called cyber-risk. However, these methods fall short since they do not sufficiently take...
master thesis 2016
document
Van Meijeren, P.M. (author)
master thesis 2016
document
Antoniou, D. (author)
This thesis is a coding scheme with which people can perform simulated phishing tests in systematic way. This enables the making of evidence-based phishing and allows for future analysis of the phishing results.
master thesis 2015
document
Van Driel, J.W. (author)
Like most consumers, you probably take the payment process when checking out at your favorite webshop, for granted. Regardless of which payment method you select, chances are big that the schemes of one of the few players within the payment industry - i.e. MasterCard or Visa - are used. We refer to this part of the industry as the card network....
master thesis 2015
document
Zhu, Y. (author)
Cyber attack nowadays is increasingly being reported. Defenders need a good understanding of attacker’s perspective in order to accurately anticipate threats and effectively mitigate attacks. This understanding can be obtained through sharing attack pattern. However, in the existing researches the consideration about information sharing is not...
master thesis 2015
document
Pushpakumar, H. (author)
Cyber threats are becoming more sophisticated and varied. The range of possible attacks that organizations face is higher than in the past. Analysis shows that the number of cyber incidents involving government agencies has increased by 35 percent between 2010 and 2013. E-government is a potential target to attacks of various kinds from a range...
master thesis 2015
Searched for: contributor%3A%22Pieters%2C+W.+%28mentor%29%22
(1 - 20 of 26)

Pages