Searched for: contributor:"van Eeten, Michel (mentor)"
(1 - 13 of 13)
document
Grapperhaus, Valentijn (author)
The thesis reconstructed and analysed transaction-level data of a particular darknet market. Moreover, the thesis reveals what kind of vendors are active on this darknet market, based on their characteristics. Finally, this research identified what the relative importance is of different vendor characteristics for vendor performance on darknet...
master thesis 2019
document
Hoppenreijs, Marrit (author)
The European financial sector is a frequent victim of banking malware leading to massive losses. It appears that not all customers’ banks are equally attractive targets among cybercriminals who deploy banking malware. This research established a comprehensive regression model explaining why certain banks are more attractive to cybercriminals....
master thesis 2019
document
Hagenaars, Kay (author)
The information security (IS) risk assessment process is an essential part to organisation's their protection of digital assets. However, the fast changing IS environment causes for limited knowledge of eventualities, dependencies and values of systems and phenomena. Consequently, the IS risk assessment process is depending on the judgment of...
master thesis 2019
document
Timmermans, Jan (author)
Employees are often referred to as the main cause of cyber security incidents in organizations. These incidents can lead to huge company risks and enormous losses. Therefore insight in how organizations can improve employees’ information security behavior is important, realizing that technical measures alone cannot reduce all security risks....
master thesis 2018
document
Sewnandan, Jhoties (author)
Cyberattacks are a constant threat to organisations worldwide. The uncertainty and difficulty of properly conducting cyber risk management processes do not make it easier for organisations to cope with cyberattacks. Cyber insurance can be a partial solution to the dilemma that organisations face. However, it has not seen the expected growth...
master thesis 2018
document
Bouwman, Xander (author)
Organizations benefit from improved cybersecurity threat detection capabilities if they share information in a community of their peers. However, organizations are unlikely to share the sensitive information that is most valuable as this poses individual risks. Information sharing in cybersecurity communities therefore forms a collective action...
master thesis 2018
document
Natalius, Samuel (author)
Understanding target selection is a step before making a suitable proactive measure to address the complex issue of banking malware in online banking landscape. Despite several previous studies, gaps in the research of target selection are still present like the lack of attention to the non-targeted entities, the presence of other potential...
master thesis 2018
document
Turcios Rodriguez, Elsa (author)
Tracking is a pervasive mechanism across the web which is capable to trace and collect users’ online data. One of the most widely used mechanisms for tracking are cookies, and they are used to deliver online behavioral advertisement. Since these mechanisms pose a threat to privacy, the E-Privacy Directive was created as the regional legal...
master thesis 2018
document
Martinez Bustamante, Inés (author)
Cyber security is getting more attention in the last decades. Unfortunately, the 100% cyber security protection is impractical and impossible, and therefore, we need to consider other cyber risk management strategies. One of them is cyber insurance, but its adoption has been slow in Europe and even more among SMEs. This thesis presents a...
master thesis 2018
document
Tuttobene, Luigi (author)
master thesis 2018
document
Altena, Lisette (author)
Many Internet of Things (IoT) devices that are currently on the market lack security and therefore many of them got infected with malware to launch powerful distributed denial of service (DDoS) attacks. Notifications from Internet Service Providers (ISPs) to their customers play a crucial role in the fight to clean up the malware infected IoT...
master thesis 2018
document
Rieff, Iris (author)
master thesis 2018
document
Andita Rahmi Faradina, Dity (author)
The EU General Data Protection Regulation (EU GDPR) is about to come in force in May 2018. It poses new queries for both policymakers and businesses. Policymakers want o know how effective the new EU GDPR will be while the businesses would like to know how the EU GDPR should be implemented. To answer that question, empirical studies on how...
master thesis 2017
Searched for: contributor:"van Eeten, Michel (mentor)"
(1 - 13 of 13)