Searched for: contributor%3A%22van%255C+Eeten%252C%255C+M.J.G.%255C+%255C%2528promotor%255C%2529%22
(1 - 12 of 12)
document
Turcios Rodriguez, E.R. (author)
In recent years the number of Internet-connected devices (aka as Internet of Things (IoT)) has increased dramatically. IoT Manufacturers have launched into the market a variety of IoT products to make a profit, while users buy them for the convenience of the technology. Despite IoT technology’s benefits to society, infected IoT devices with...
doctoral thesis 2023
document
Lone, Q.B. (author)
IP spoofing is the act of forging source IP addresses assigned to a host machine. Spoofing provides users the ability to hide their identity and impersonate another machine. Malicious users use spoofing to invoke a variety of attacks. Examples are Distributed Denial of Service (DDoS) attacks, policy evasion and a range of application-level...
doctoral thesis 2022
document
van Wegberg, R.S. (author)
Many scientific studies and industry reports have observed the emergence of so-called cybercrime-as-a-service. The idea is that specialized suppliers in the underground economy cater to criminal entrepreneurs in need of certain capabilities – substituting specialized technical knowledge with “knowing what to buy”. The impact of this trend could...
doctoral thesis 2020
document
Bisogni, F. (author)
In response to evolving cybersecurity challenges, global spending on information security has grown steadily, and could eventually reach a level that is inefficient and unaffordable. A better understanding of new socio-technical-economic complexities around information security is urgently needed, which requires both reconsideration of...
doctoral thesis 2020
document
Noroozian, A. (author)
Hosting providers are theoretically in a key position to combat cybercrime as they are often the entities renting out the resources that end up being abused by miscreants. Yet, notwithstanding hosting providers' current security measures to combat abuse, their responses vary widely. In many cases the response is ineffective, as empirical...
doctoral thesis 2020
document
Çetin, F.O. (author)
Resources on the Internet allow constant communication and data sharing between Internet users. While these resources keep vital information flowing, cybercriminals can easily compromise and abuse them, using them as a platform for fraud and misuse. Every day, we observe millions of internet-connected resources are being abused in criminal...
doctoral thesis 2020
document
Tajalizadehkhoob, S. (author)
In theory, hosting providers can play an important role in fighting cybercrime and misuse. This is because many online threats, be they high-profile or mundane, use online storage infrastructure maintained by hosting providers at the core of their criminal operations. <br/>However, in practice, we see large differences in the security measures...
doctoral thesis 2018
document
Kreiken, F.H. (author)
The Internet has facilitated large-scale copyright infringement. Fighting this one case at a time via the standard civil law procedures is costly in terms of time and money. In response, copyright holders have adopted new strategies that they hoped would be more effective at large-scale enforcement. The question is how these large-scale...
doctoral thesis 2017
document
Asghari, H. (author)
Research in the field of information security economics has clarified how attacker and defender incentives affect cybersecurity. It has also highlighted the role of intermediaries in strengthening cybersecurity. Intermediaries are organizations and firms that provide the Internet’s infrastructure and platforms. This dissertation looks at how...
doctoral thesis 2016
document
Van der Voort, H.G. (author)
Publieke toezichthouders zijn vaak onderwerp van kritiek. Ze zouden enerzijds een administratieve last vormen voor het bedrijfsleven, anderzijds wordt hen na incidenten veelal verweten niet of te slap te hebben opgetreden. In deze vijandige omgeving en budgettaire krapte staan zij voor de uitdaging kwalitatief goed toezicht te houden met...
doctoral thesis 2013
document
Dafermos, G. (author)
My dissertation looks at the Governance Structures of Free/Open Source (FOSS) Development, based on a case study of FreeBSD, a large FOSS project. More specifically, it examines 3 well-known theories. The 1st theory [decreasing returns to scale] holds that increasing the number of persons working together results in a productivity drop due to (a...
doctoral thesis 2012
document
Steenhuisen, B. (author)
doctoral thesis 2009
Searched for: contributor%3A%22van%255C+Eeten%252C%255C+M.J.G.%255C+%255C%2528promotor%255C%2529%22
(1 - 12 of 12)