Searched for: contributor:"Pieters, W. (mentor)"
(1 - 18 of 18)
document
Koenders, J.P. (author)
master thesis 2016
document
Meeuwisse, K.V.M. (author)
Companies implement technical security measures to let their employees behave in a secure manner. Employees however, can circumvent these measures. To solve this circumventing problem companies should know better what the preferences of their employees are. Employees’ preferences with regards to technical security measures are based on the...
master thesis 2016
document
Dinh, C.H. (author)
Crisis situations require critical decision making under high uncertainty and time pressure. These decisions can impact an organization internally and externally when remained unhandled. However, due to the rarity of crisis events, there is a lack of training on the job. A designed simulation game should offer a training methodology which takes...
master thesis 2016
document
Syauta, K.J. (author)
master thesis 2016
document
Breukers, Y.P. (author)
Software vulnerabilities are a major enabler for cyberattacks, and are therefore responsible for a sizeable portion of the risk for large organisations in cyberspace. Little research has been done on the dynamics underlying this risk. The goal of this paper is to find how organisations and software vendors can influence the overall risk level as...
master thesis 2016
document
Van Moorsel, D.P. (author)
master thesis 2016
document
Slangen, R. (author)
Cyber-attacks have become inevitable in modern day society. Therefore, the occurrence of cyber-attacks is increasingly seen as a risk in an organisation. This has increased the interest in risk analysis methods since these try to better understand this so-called cyber-risk. However, these methods fall short since they do not sufficiently take...
master thesis 2016
document
Van Meijeren, P.M. (author)
master thesis 2016
document
Antoniou, D. (author)
This thesis is a coding scheme with which people can perform simulated phishing tests in systematic way. This enables the making of evidence-based phishing and allows for future analysis of the phishing results.
master thesis 2015
document
Van Driel, J.W. (author)
Like most consumers, you probably take the payment process when checking out at your favorite webshop, for granted. Regardless of which payment method you select, chances are big that the schemes of one of the few players within the payment industry - i.e. MasterCard or Visa - are used. We refer to this part of the industry as the card network....
master thesis 2015
document
Zhu, Y. (author)
Cyber attack nowadays is increasingly being reported. Defenders need a good understanding of attacker’s perspective in order to accurately anticipate threats and effectively mitigate attacks. This understanding can be obtained through sharing attack pattern. However, in the existing researches the consideration about information sharing is not...
master thesis 2015
document
Pushpakumar, H. (author)
Cyber threats are becoming more sophisticated and varied. The range of possible attacks that organizations face is higher than in the past. Analysis shows that the number of cyber incidents involving government agencies has increased by 35 percent between 2010 and 2013. E-government is a potential target to attacks of various kinds from a range...
master thesis 2015
document
Meijdam, K.C. (author)
Organisations want to protect themselves against targeted phishing attacks, and mimicking those in order to train their employees in an important measure to do so. However, previous experiments have shown that this is ethically sensitive and might lead to feelings of deception and harm at the side of the employees. In this paper, the design of...
master thesis 2015
document
Van Holsteijn, F.A. (author)
The number of cyberattacks has been growing over time and is expected to keep growing. In order to prevent such attacks, countermeasures have to be put in place by IT security experts. These IT security experts are however often tied to budgets and do not have a good overview of the threats that are present. It is thus necessary to provide them...
master thesis 2015
document
Pereira, N.M. (author)
Information Security is an important aspect of decision making in organisations today. Organisations use Information Security Risk Management to assess, respond to and monitor risk to its information systems. Information systems are complex technical systems and the management of Information Security depends on technology, processes and people....
master thesis 2015
document
Spruit, E.J.F. (author)
Cyber-crime is a large problem for society. OftenA botnet is used to for cybercrime. An infected machine is infected with a bot, this bot communicates with its controller. Other machines are infected with the same bot, which communicates with the same controller. These infected machines together form a zombie army of machines: the botnet. It is...
master thesis 2014
document
Bougioukos, D. (author)
The diffusion of mobile devices in the market place has been tremendous in the last several years. Devices such as smartphones and tablets have become a must-have for contemporary consumers. This development has not left enterprises and organizations unaffected as employees express the desire of using the same devices and consumer technologies...
master thesis 2013
document
Kulikova, O. (author)
This research project presents the decision-support framework on organizational disclosure of cyber security incident information to internal and external stakeholders, which facilitates incident response in line with organizational goals and existing requirements. In order to design the framework, different research phases have been...
master thesis 2012
Searched for: contributor:"Pieters, W. (mentor)"
(1 - 18 of 18)