Dissertations / Theses on the topic 'Human aspects of cyber security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 37 dissertations / theses for your research on the topic 'Human aspects of cyber security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Afzal, Muhammad. "Human and Organizational Aspects of Cyber Security : From a System Suppliers Perspective." Thesis, KTH, Industriella informations- och styrsystem, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-105778.
Full textGopisetty, Yugandhar. "A study of online users' cyber threat awareness and their use of threat countermeasures." Thesis, Umeå universitet, Institutionen för informatik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-115918.
Full textJung, Sung-Oh. "A quantitative man-machine model for cyber security efficiency analysis." Texas A&M University, 2005. http://hdl.handle.net/1969.1/4851.
Full textAyereby, Manouan Pierre-Marius. "Overcoming Data Breaches and Human Factors in Minimizing Threats to Cyber-Security Ecosystems." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/6163.
Full textSanjab, Anibal Jean. "Security of Cyber-Physical Systems with Human Actors: Theoretical Foundations, Game Theory, and Bounded Rationality." Diss., Virginia Tech, 2018. http://hdl.handle.net/10919/86204.
Full textPh. D.
Enhancing the efficiency, sustainability, and resilience of cities, infrastructure, and industrial systems is contingent on their transformation into more interactive and interconnected smart systems. This has led to the emergence of what is known as cyber-physical systems (CPSs). CPSs are widescale distributed and interconnected systems integrating physical components and humans via a cyber layer that enables sensing, connectivity, and data processing. Some of the most prominent examples of CPSs include the smart electric grid, smart cities, intelligent transportation systems, and the Internet of Things. The seamless interconnectivity between the various elements of a CPS introduces a wealth of operational benefits. However, this wide-scale interconnectivity and ubiquitous integration of cyber technologies render CPSs vulnerable to a range of security threats as manifested by recently reported security breaches in a number of CPS application domains. Addressing these culminating security challenges requires the development and implementation of fool-proof defense strategies grounded in solid theoretical foundations. To this end, the central goal of this dissertation is to enhance the security of CPSs by advancing novel analytical frameworks which tightly integrate the cyber, physical, and human elements of a CPS. The developed frameworks and tools enable the derivation of holistic defense strategies by: a) Characterizing the security interdependence between the various elements of a CPS, b) Quantifying the consequences of possible attacks on a CPS and the effectiveness of any implemented defense mechanism, c) Modeling the multi-agent interactions in CPSs, involving humans and automated systems, which have a direct effect on the security state of the system, and d) Capturing the role that human perceptions and decision making processes play in the security of CPSs. The developed tools and performed analyses integrate the engineering principles of CPSs with the mathematical concepts of game theory and human behavioral models and introduce key contributions to a number of CPS application domains such as the smart electric grid and drone systems. The introduced results enable strengthening the security of CPSs, thereby paving the way for their wide-scale adoption in smart cities and critical infrastructure.
Миронець, Оксана Миколаївна, and Tigadi Nageshwar. "Theoretical and legal aspects of human security in the republic of India." Thesis, Київський кооперативний інститут бізнесу і права, 2017. http://er.nau.edu.ua/handle/NAU/35620.
Full textLeppan, Claudette. "Analysis of a South African cyber-security awareness campaign for schools using interdisciplinary communications frameworks." Thesis, Nelson Mandela Metropolitan University, 2017. http://hdl.handle.net/10948/18167.
Full textMunir, Sundas, and Mirza Sanam Iqbal Baig. "Challenges and Security Aspects of Blockchain Based Online Multiplayer Games." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-38771.
Full textKirkham, E., and C. Flew. "Strengthening embargoes and enhancing human security." Thesis, International Alert, Saferworld and University of Bradford, Department of Peace Studies, Centre for International Co-operation and Security, 2003. http://hdl.handle.net/10454/4275.
Full textArms embargoes are one of the principal tools of states in seeking to prevent, limit and bring an end to armed conflict and human rights abuses. Despite the frequency with which arms embargoes have been imposed, there are significant problems with their implementation. Pressure is therefore growing for the international governmental community to act in order to ensure that the political commitment embodied by the imposition of arms embargoes is matched by the commitment to ensure their rigorous enforcement and to achieve enhanced human security on the ground. Increasing the effectiveness of arms embargoes is a specific aim of the United Nations Programme of Action for Preventing and Combating the Illicit Trade in Small Arms and Light Weapons in All Its Aspects1 which specifically calls upon states "To take appropriate measures, including all legal or administrative means, against any activity that violates a United Nations Security Council arms embargo in accordance with the Charter of the United Nations".2 Accordingly, within the context of the implementation of the UN PoA, the overall aim of this paper is to explore ways in which the international community can act in order to strengthen the impact of arms embargoes and enhance human security. It will begin by examining the purposes, processes and effects relating to arms embargoes, with particular attention to those agreed at international (UN) level, and by highlighting issues of concern in each regard. An overview of the main issues and challenges facing implementation of arms embargoes will include the elaboration of three case-study examples showing the impact of UN arms embargoes on the availability of arms and on human security and a further five that illustrate the dilemmas faced by states in seeking to implement arms embargoes. Priority areas for attention in any international effort to strengthen the effectiveness of arms embargoes will be followed by more extensive proposals for enhancing international embargo regimes within the context of implementing the UN PoA. Whilst it is recognised that the UN PoA contains measures that relate only to the illicit trade in small arms and light weapons (SALW), if implemented fully, many of these would serve to strengthen the international apparatus of control, information exchange and provision of assistance relating to arms proliferation and misuse as a whole. In turn, this would greatly enhance the implementation of UN arms embargoes. Therefore, as well as providing an opportunity for reviewing progress on implementing the PoA, the first Biennial Meeting of States in July 2003 is clearly a major opportunity for states to address a number of the pressing challenges facing states in the implementation of UN embargoes.
Hakkestad, Mårten, and Simon Rynningsjö. "Who hacked my toaster? : A study about security management of the Internet of Things." Thesis, Linköpings universitet, Informatik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-158468.
Full textInternet of Things eller Sakernas internet är ett växande område med en växande hotbild och nya hot uppkommer dagligen. Att hålla sig uppdaterad, övervaka nätverk och enheter samt att reagera på att enheter och nätverk blir hackade är en svår och komplicerad uppgift. Den här uppsatsen ämnar undersöka hur ett IT-företag kan arbeta med säkerhetshantering inom Internet of Things. Detta har gjorts genom att kolla utmaningar och säkerhetslösningar inom de tre områdena uppdatera, övervaka och reagera. En kvalitativ forskningsmetod har använts i denna fallstudie tillsammans med ett tolkande synsätt och en abduktiv ansats. Vi har utfört intervjuer på ett stort IT-företag baserat i Sverige tillsammans med en utförlig dokumentanalys. Resultatet av denna uppsats påvisar ett antal utmaningar inom säkerhetshanteringen inom områdena uppdatera, övervaka och reagera tillsammans med hur vårt fallföretag jobbar med att motarbeta dessa utmaningar. I stort sett kan utmaningarna sammanfattas till att allting är svårare när mängden enheten är så hög som den är inom Internet of Things.
Lo, Yuk-ping, and 盧鈺苹. "The securitisation of HIV/AIDS: China and India." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2012. http://hub.hku.hk/bib/B4832968X.
Full textpublished_or_final_version
Humanities and Social Sciences
Doctoral
Doctor of Philosophy
Tamrakar, Anjila. "SPICE: A Software Tool for Studying End-user’s Insecure Cyber Behavior and Personality-traits." ScholarWorks@UNO, 2016. http://scholarworks.uno.edu/td/2236.
Full textSundaramurthy, Sathya Chandran. "An Anthropological Study of Security Operations Centers to Improve Operational Efficiency." Scholar Commons, 2017. http://scholarcommons.usf.edu/etd/6958.
Full textBuabeng-Baidoo, Johannes. "‘Human Rights do not stop at the border' : a critical examination on the fundamental rights of regular migrants in South Africa." Diss., University of Pretoria, 2011. http://hdl.handle.net/2263/18607.
Full textMini Dissertation (LLM (Human Rights and Democratisation in Africa)) -- University of Pretoria, 2011.
http://www.chr.up.ac.za/
nf2012
Centre for Human Rights
LLM
Albar, Ali Aldroos. "Development of an Instrument to Measure the Level of Acceptability and Tolerability of Cyber Aggression: Mixed-Methods Research on Saudi Arabian Social Media Users." Thesis, University of North Texas, 2016. https://digital.library.unt.edu/ark:/67531/metadc849766/.
Full textJames, Peter. "Secure portable execution and storage environments: A capability to improve security for remote working." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2015. https://ro.ecu.edu.au/theses/1707.
Full textAngulo, Julio. "Usable privacy for digital transactions : Exploring the usability aspects of three privacy enhancing mechanisms." Licentiate thesis, Karlstads universitet, Avdelningen för informatik och projektledning, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-14832.
Full textKhayundi, Francis Mapati Bulimo. "The effects of climate change on the realisation of the right to adequate food in Kenya." Thesis, Rhodes University, 2012. http://hdl.handle.net/10962/d1003190.
Full textSäfström, Märta, and Estrid Ereback. "Känslig hälsoinformation i händerna på oerfarna studenter : En enkätstudie om läkarstudenters kunskap, attityd och beteende gällande informationssäkerhet." Thesis, Uppsala universitet, Institutionen för informatik och media, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-446338.
Full textMed ökad digitalisering inom vården ökar behovet av god informationssäkerhet inom hälso- och sjukvård. Läkarstudenter är en grupp som redan under sin utbildning kommer i kontakt med mycket känslig information och studier visar på att studenter inom hälso- och sjukvård löper stor risk att hantera känslig information felaktigt under sin praktik. Syftet med den här studien är att mäta hur bra kunskap läkarstudenter har om informationssäkerhet och hur stor inverkan detta har på deras attityd och beteende i informationssäkerhetsfrågor. För att testa detta utförs en enkätundersökning online med teoretisk utgångspunkt i kunskap-attityd-beteende-modellen samt tidigare studier gjorda inom samma område. Enkäten utformas med stor inspiration från HAIS-Q, vilket är en beprövad enkätmetod för att mäta informationssäkerhetsmedvetenhet. Resultatet visar på att läkarstudenterna uppvisar bättre kunskap än attityd och beteende i informationssäkerhetsfrågor. Genom studien identifieras även att kunskap har en positiv inverkan på attityd och beteende, där det går att se att ökad kunskap leder till bättre attityd och beteende. Slutsatserna innefattar bland annat rekommendationer om fortsatta undersökningar inom området med större urvalsgrupp där jämförelser mellan olika lärosäten bör göras för att få en med holistisk bild av situationen. En mer noggrann utvärdering av HAIS-Q som enkätmetod bör också genomföras då denna undersökning identifierar brister med metoden.
Olsson, Martin, Max Ring, and Hassan Sabbagh. "Att förebygga det interna hotet med IT-regler." Thesis, Högskolan i Borås, Akademin för bibliotek, information, pedagogik och IT, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-15080.
Full textThe study aims to investigate the internal threat within organizations caused by human mistakes and negligence amongst employees. The purpose of this paper is to identify reasons for the mistakes and the negligence, describe some of the consequences and also investigate how the design of and work with IT policies, which is a set of rules and guidelines for IT security work, should be performed to minimize mistakes and negligence. A survey of previous literature has been conducted and a qualitative data collection has been made. The qualitative data collection included interviews with an e-commerce company, an IT consulting company and an IT security consultant. Previous literature and collected data have been analysed which resulted in a set of suggestions, for instance that customized language usage and categorization of IT policies, together with continuous training of employees is advocated to help prevent employees' mistakes and negligence. Thereby minimizing the internal threat. Any type of company that wants to improve its IT security by preventing the internal threat caused by its employees will benefit from these suggestions.
Swartz, Erik. "Mänskligt beteende - ett ofrånkomligt hot mot informationssäkerhet?" Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-44967.
Full textMakame, Makame Omar. "Vulnerability and adaptation of Zanzibar east coast communities to climate variability and change and other interacting stressors." Thesis, Rhodes University, 2014. http://hdl.handle.net/10962/d1011895.
Full textPsaroulis, Georgia. "Leadership in Organisational Cyber Security." Thesis, 2022. https://hdl.handle.net/2440/136018.
Full textThesis (Ph.D.) -- University of Adelaide, Business School, 2022
Lonergan, Shawn William. "Cyber Power and the International System." Thesis, 2017. https://doi.org/10.7916/D88D07PH.
Full text(7525319), Megan M. Nyre-Yu. "Determining System Requirements for Human-Machine Integration in Cyber Security Incident Response." Thesis, 2019.
Find full textBarnett, Jonathon Richard. "Environmental security : a critical examination and a human-centred reformulation." Phd thesis, 1998. http://hdl.handle.net/1885/144155.
Full textGadina, Milton. "The impact of HIV/AIDS on the human security of households in Bulawayo." Thesis, 2009. http://hdl.handle.net/10413/7943.
Full textThesis (M.Com.)-University of KwaZulu-Natal, Westville, 2009.
Perrichon, Lisa. "Kybernetická bezpečnost ve vesmírném prostoru: Rámec zvládání rizik spojených s kybernetickými útoky a model vylepšení evropských politik." Master's thesis, 2018. http://www.nusl.cz/ntk/nusl-389505.
Full textHerington, Jonathan. "The concept of security : uncertainty, evidence and value." Phd thesis, 2013. http://hdl.handle.net/1885/150947.
Full textBhomoyi, Ntombikayise Mandisa. "Human security and development : a case of Diepsloot, extention 12, Johannesburg." Diss., 2020. http://hdl.handle.net/10500/27551.
Full textLesifundvolucwaningo sihlose kuphenya Kuvikeleka Kweluntfu Nentfutfuko: Sehlakalolucwaningo saseDiepsloot Extension 12 eJozi. Linani selilonkhe lalabangenela lolucwaningo bebangu-30; bonkhe bebahlala eDiepsloot Extension 12, lokuyindzawo lehlala bantfu lekangahleleki eJozi. Lesifundvolucwaningo lesehlakalo sisetjentiswe ngekuhlanganisa nendlela yelizingasimo. Kwakhetfwa labatawungenela lolucwaningo labangu-30 ngekusebentisa kukhetsa emasamphula ngenhloso. Kwasetjentiswa inkhombandlela yekwenta i-inthaviyu kute kubanjwe ema-inthaviyu lasakuhleleka nalabo labangenele lolucwaningo. Lama-inthaviyu bekagcile ekuvikelekeni kweluntfu nentfutfuko, futsi arekhodwa. Kwasetjentiswa luhlatiyo ngekwengcikitsi kutfola bunjalo kuleyo datha. Kwakugcilwe ekuboneni, ekuhlatiyeni nasekuhumusheni emaphethini enshokutsi kuleyo datha yelizingasimo, kanye nekwetfula loko lokutfoliwe ngekulandzela tingcikitsi letesekelwa ticashunwa. Lokutfolwe ngulolucwaningo kuveta kutsi bahlali baseDiepsloot Extension 12 bebanganikwa kuvikeleka kweluntfu kanye nematfuba langagcugcutela intfutfuko yabo. Hulumende waseNingizimu Afrika utitjela kutsi yena unika takhamuti tawo tinsita ekwesekeleni inhloso yeLisu lakhe Lavelonkhe Lentfutfuko (i-NDP) kute kucedvwe buphuya nga-2030. Nanome kunjalo, lesifundvolucwaningo siveta kutsi bahlali basendzweni lengakahleli yaseDiepsloot badzinga kakhulu kwesekelwa kanye nematfuba emisebenti kute bente ncono timo tabo tekuphila.Lesifundvolucwaningo sincoma kutsi kuvikeleka kweluntfu kanye nentfutfuko kufanele kutsi kube tintfo hulumende latibeka embili kutsi utawucala ngato atente; kanye nekutsi kugcilwe ekufezekiseni tinchubomgomo tentfutfuko, ikakhulu etindzaweni letihlala bantfu letingakahleleki
Esi sifundo sajolisa ukuphanda Ukhuseleko Nophuhliso Loluntu: Imeko yase D Diepsloot Extension 12 eRhawutini (Human Security and Development: A Case of Diepsloot Extension 12 in Johannesburg). Bangama-30 abantu abathatha inxaxheba kolu phando; bonke babehlala eDiepsloot Extension 12, indawo yokuhlala engekho sesikweni eRhawutini. Kwasetyenziswa uyilo lophando lwesifundo esingumzekelo kunye nendlela yophando ngokuphonononga izimvo (ukuzathuza). Kwachongwa ngononophelo isampulu yabathathi nxaxheba abangama-30. Kwasetyenziswa isikhokelo sodliwano ndlebe ekuqhubeni iindliwano ndlebe ezingaqingqwanga nabathathi nxaxheba. Iindliwano ndlebe zagxininisa kukhuseleko nophuhliso loluntu kwaye zashicilelwa njengengxelo. Kwasetyenziswa uhlalutyo lwemixholo ukuze kuhluzwe ingxam/undoqo womcimbi kwidatha. Kwakugxininiswe ekuchongeni, ekuhlalutyeni nasekutolikeni iipatheni zeentsingiselo kwidatha yozathuzo, nasekunikezeleni okufunyanisiweyo ngokwemixholo exhaswa kokucatshuliweyo. Okufunyaniswe kuphando kwadiza ukuba abemi baseDiepsloot Extension 12 abanamathuba okhuseleko anokukhuthaza uphuhliso lwabo. URhulumente woMzantsi Afrika uthi unikezela ngeenkonzo zoluntu kubemi bakhe ngeenjongo zokuxhasa iCebo Lophuhliso Likazwelonke (iNational Development Plan - NDP) ukuze uthi ufika owama-2030 kube kupheliswe tu ubuhlwempu. Noxa kunjalo, olu phando lububungqina bokuba abemi baseDiepsloot badinga ngamandla inkxaso namathuba emisebenzi ukuze baphucule iimeko zabo zentlalo. Esi sifundo siphakamisa ukuba ukhuseleko nophuhliso loluntu ibe yimiba esentloko kulungiselelo karhulumente; kwaye kufuneka kugxininiswe ekusetyenzisweni kweenkqubo zophuhliso, ngakumbi kwiindawo zokuhlala ezingekho sesikweni.
Development Studies
M.A. (Development studies)
(9187496), Priyanka Tiwari. "EXPLORING PHISHING SUSCEPTIBILITY ATTRIBUTABLE TO AUTHORITY, URGENCY, RISK PERCEPTION AND HUMAN FACTORS." Thesis, 2020.
Find full textSecurity breaches nowadays are not limited to technological orientation. Research in the information security domain is gradually shifting towards human behavioral orientation toward breaches that target weaknesses arising from human behaviors (Workman et al., 2007). Currently, social engineering breaches are more effective than many technical attacks. In fact, the majority of cyber assaults have a social engineering component. Social Engineering is the art of manipulating human flaws towards a malicious objective (Breda et al., 2017). In the likely future, social engineering will be the most predominant attack vector within cyber security (Breda et al., 2017). Human failures, persuasion and social influences are key elements to understand when considering security behaviors. With the increasing concerns for social engineering and advancements in human factors-based technology, phishing emails are becoming more prevalent in exploiting human factors and external factors. Such factors have been researched upon in pairs, not overall. Till date, there is not much research done to identify the collaborative links between authority, urgency, risk perception and human factors such as personality traits, and knowledge. This study investigates about phishing email characters, external influences, human factors influences, and their collaborative effects.
Buthelezi, Mokateko Portia. "Addressing ambiguity within information security policies in higher education to improve compliance." Diss., 2017. http://hdl.handle.net/10500/23778.
Full textSchool of Computing
(11023221), Fahad Salamh. "A 3-DIMENSIONAL UAS FORENSIC INTELLIGENCE-LED TAXONOMY (U-FIT)." Thesis, 2021.
Find full textNigusso, Fikadu Tadesse. "Support programme for facilitating the integration of nutrition and food security with HIV prevention, treatment and care." Thesis, 2019. http://uir.unisa.ac.za/handle/10500/25642.
Full textHealth Studies
D. Litt. et Phil. (Health Studies)
Ndou, Mmbengeni Stanley. "Post - 1994 Migration: The experiences of Mozambican migrants in Johannesburg, South Africa." Diss., 2019. http://hdl.handle.net/11602/1324.
Full textDepartment of Development Studies
South Africa attracts a variety of migrants, largely from the Southern African region. It has become the largest recipient of foreign nationals in Africa. South Africa’s porous borders linked to its neighbouring countries contribute to the influx of foreign nationals. Mozambique has been the largest supplier of workers in mining and agricultural sectors of South Africa. However, along the way and upon arrival, migrants are surrounded by treacherous conditions. This is because both documented and undocumented migrants are susceptible to xenophobic sentiments, violence and discrimination. Therefore, in search for security, migration initiates a new risk of insecurity. This study employed the qualitative approach to explore the causes of migration and experiences of Mozambican migrants in Johannesburg, South Africa. Research findings reveal that migrants come to South Africa for different reasons, not limited to economic factors. Some migrants come to South Africa for education and to seek refuge. Foreign nationals’ experiences vary from one person to another, as the findings show that some migrants get the privilege to start a thriving business and employ the locals. Therefore, migrants also contribute to the South African economy.
NRF
Mbewe, Jeremiah. "Evaluation of pass-on the gift concept on the socioeconomic welfare of rural households: the case of SACHZEP and ELITE Projects in Katete District, Zambia." Diss., 2019. http://hdl.handle.net/10500/26687.
Full textDevelopment Studies
M.A. (Development Studies)
Bikombo, Bunana Gaby. "Understanding household food insecurity and coping strategies of street traders in Durban." Diss., 2014. http://hdl.handle.net/10500/14659.
Full textGeography
M.A. (Human Ecology)