Pages
- 1
- 2
- document
- Najm, Z. (author) doctoral thesis 2023
- document
-
van Engelen, Yves (author)In the current digitalised society keeping assets secure is one of the most prominent challenges organisations face. In the ongoing arms race between attackers and defenders, software security patching is a well-recognised and effective strategy to mitigate vulnerabilities in software products. However, organisations struggle with the best...master thesis 2022
- document
- van de Weijer, Teun (author) master thesis 2022
- document
-
van Gurp, Ralph (author)Malware presents a growing problem in a world that is increasingly connected to, and reliant on, the internet. The growing, devastating potential of cyber attacks such as DDoS attacks on society and economy is largely the result of a new class of devices, the Internet of Things (IoT), whose characteristic vulnerabilities make them easy targets...master thesis 2021
- document
-
Brehmer, Martin (author), Abbas, A.E. (author), Vaidyanathan, Nageswaran (author)The risk of being impacted by a cyberattack is high, because of more professional attacks. Thereby, cyber criminals are bypassing technological countermeasures through tricking users. Recently collected data during the SARS-CoV-2 pandemic demonstrate, that cyberattacks including social engineering are among the main threats, especially for Small...conference paper 2021
- document
-
Hagenaars, Kay (author)The information security (IS) risk assessment process is an essential part to organisation's their protection of digital assets. However, the fast changing IS environment causes for limited knowledge of eventualities, dependencies and values of systems and phenomena. Consequently, the IS risk assessment process is depending on the judgment of...master thesis 2019
- document
-
Timmermans, Jan (author)Employees are often referred to as the main cause of cyber security incidents in organizations. These incidents can lead to huge company risks and enormous losses. Therefore insight in how organizations can improve employees’ information security behavior is important, realizing that technical measures alone cannot reduce all security risks....master thesis 2018
- document
-
Łęcka, Agnieszka (author)In the times of emerging technologies and rising individuals’ awareness more light is shed on privacy and associated risks. This does not go unnoticed by regulators, that develop and enforce tighter requirements towards organisations. Simultaneously, outsourcing relationships develop and offshoring as well as nearshoring are still popular among...master thesis 2018
- document
-
Mok, Ellen (author)Humanitarian assistance is driven by data and information. Through the whole<br/>chain of actions – from early warning systems to evaluation – information<br/>determines priorities, resource allocation, and donors’ willingness to donate.<br/>However, the potential harm that comes with data is often overlooked. Inadequate<br/>data management...master thesis 2018
- document
-
Allhoff, Fritz (author), Henschke, A.H. (author)This paper surveys foundational ethical issues that attach to the Internet of Things (IoT). In Section 1, we provide an overview of the technology, indicating both current and future applications. Subsequent sections consider particular ethical issues, including: informed consent (Section 2), privacy (Section 3), information security (Section...journal article 2018
- document
-
Bullée, Jan Willem Hendrik (author), Montoya, Lorena (author), Pieters, W. (author), Junger, M. (author), Hartel, P.H. (author)The aim of this study was to explore the extent to which persuasion principles are used in successful social engineering attacks. Seventy-four scenarios were extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenario was split into attack steps, containing single interactions between offender and...journal article 2018
- document
-
Molin, E.J.E. (author), Meeuwisse, Kirsten (author), Pieters, W. (author), Chorus, C.G. (author)It is often suggested in the literature that employees regard technical security measures (TSMs) as user-unfriendly, indicating a trade-off between security and usability. However, there is little empirical evidence of such a trade-off, nor about the strength of the associated negative correlation and the importance employees attach to both...journal article 2018
- document
-
de Bruijn, J.A. (author), Janssen, M.F.W.H.A. (author)Cybersecurity is a global phenomenon representing a complex socio-technical challenge for governments, but requiring the involvement of individuals. Although cybersecurity is one of the most important challenges faced by governments today, the visibility and public awareness remains limited. Almost everybody has heard of cybersecurity,...journal article 2017
- document
-
Chockalingam, S. (author), Pieters, W. (author), Herdeiro Teixeira, A.M. (author), van Gelder, P.H.A.J.M. (author)Bayesian Networks (BNs) are an increasingly popular modelling technique in cyber security especially due to their capability to overcome data limitations. This is also instantiated by the growth of BN models development in cyber security. However, a comprehensive comparison and analysis of these models is missing. In this paper, we conduct a...conference paper 2017
- document
-
Meeuwisse, K.V.M. (author)Companies implement technical security measures to let their employees behave in a secure manner. Employees however, can circumvent these measures. To solve this circumventing problem companies should know better what the preferences of their employees are. Employees’ preferences with regards to technical security measures are based on the...master thesis 2016
- document
-
Van der Lee, W. (author), El Maouchi, M. (author), Sewsingh, R.A. (author), Mauricio, A.C.A. (author)KPMG is a multinational firm, which is focused on three pillars: tax advisory, accountancy and advisory. The advisory section, in particular the IT Advisory, required a system that is able to analyze, process and visualize captured network traffic. This network traffic is gathered from the own company or their clients. The goal of this project...bachelor thesis 2015
- document
-
Hattangadi, N. (author)In recent years, information technology (IT) has grown from an enabling technology to an important technology we depend on in our everyday lives. For example, IT is required for the proper functioning of personal devices that store our personal information, but is also present in the on-board computers in pacemakers and systems controlling...master thesis 2015
- document
-
Pereira, N.M. (author)Information Security is an important aspect of decision making in organisations today. Organisations use Information Security Risk Management to assess, respond to and monitor risk to its information systems. Information systems are complex technical systems and the management of Information Security depends on technology, processes and people....master thesis 2015
- document
-
Schmidt, A. (author)Open source and peer production have been praised as organisational models that could change the world for the better. It is commonly asserted that almost any societal activity could benefit from distributed, bottom-up collaboration — by making societal interaction more open, more social, and more democratic. However, we also need to be mindful...doctoral thesis 2014
- document
- AlAbdulkarim, L.O. (author) doctoral thesis 2013
Pages
- 1
- 2