Dissertations / Theses on the topic 'Perception of security risks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Perception of security risks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
De, Villiers R. R. (Raoul Reenen). "The role of risk perception in Internet purchasing behaviour and intention." Thesis, Stellenbosch : Stellenbosch University, 2001. http://hdl.handle.net/10019.1/52570.
Full textENGLISH ABSTRACT: In recent years the importance and number of users of electronic commerce and its medium, the Internet, have grown substantially. Despite this, the Business-to- Consumer sector has shown slow expansion and limited growth, with the majority of consumers slow to adopt the Internet as a medium for purchase. A probable factor affecting the purchasing behaviour of individuals is the perception of risk of a breach in (credit card) security and/or a violation of privacy. The research discussed here indicates that two closely related constructs, namely perceived privacy risk and perceived security risk exerts an influence on the Internet purchasing behaviour of Internet users, and more importantly, the intention to purchase. In addition, the role of social pressures regarding the provision of personal and credit card information is indicated to be of considerable importance.
AFRIKAANSE OPSOMMING: Die afgelope aantal jare het die belangrikheid en gebruik van eletroniese handel en die Internet aansienlik toegeneem. Ongeag hierdie groei het die sektor gemoeid met die handel tussen besighede en verbruikers egter beperkte groei getoon. 'n Waarskynlike rede vir die tendens in Internet aankoop gedrag is die persepsie dat daar 'n risiko is van misbruik van 'n krediet kaart sowel as misbruik en skending van privaatheid. Die studie wat hier bespreek word toon aan dat twee nou verwante kostrukte, naamlik persepsie van sekuriteits- en persepsie van privaatheidsrisiko 'n rol speel in die bepaling van Internet aankoop gedrag, sowel as die intensie om te koop. Verder is die rol van sosiale druk rakende die verskaffing van persoonlike en krediet kaart inligting uitgelig as 'n faktor van uiterste belang.
Mabanga, Silingile Portia. "South Africa's official external threat perceptions : 1994-2012." Diss., University of Pretoria, 2013. http://hdl.handle.net/2263/43680.
Full textDissertation (MSecurity Studies)--University of Pretoria, 2013.
gm2015
Political Sciences
MSecurity Studies
Unrestricted
BROOKS, David, and d. brooks@ecu edu au. "Public street surveillance: a psychometric study on the perceived social risk." Edith Cowan University. Computing, Health And Science: School Of Engineering, 2003. http://adt.ecu.edu.au/adt-public/adt-ECU2006.0007.html.
Full textHeeb, Alexis. "Violent crime, public perceptions and citizen security strategies in Colombia during the 1990s." Thesis, University of Oxford, 2002. http://ora.ox.ac.uk/objects/uuid:9aa285b1-15e6-402f-a4e8-2f7322c9adc3.
Full textJohnson, Kim. "Better Safe than Sorry: The Relationship Between Locus of Control, Perception of Risk, and Cyber Misbehaviors." Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7630.
Full textNuth, Michael John. "Ontological Security and the Global Risk Environment: A Case Study of Risk and Risk Perception in the Tourist-Dependent Township of Akaroa." Thesis, University of Canterbury. Sociology and Anthropology, 2007. http://hdl.handle.net/10092/988.
Full textHou, Wenliang. "How Accurate are Retirees' Assessments of Their Retirement Risk?:." Thesis, Boston College, 2020. http://hdl.handle.net/2345/bc-ir:108826.
Full textRetirees with limited financial resources face numerous risks, including out-living their money (longevity risk), investment losses (market risk), unexpected health expenses (health risk), the unforeseen needs of family members (family risk), and even retirement benefit cuts (policy risk). This study systematically values and ranks the financial impacts of these risks from both the objective and subjective perspectives and then compares them to show the gaps between retirees’ actual risks and their perceptions of the risks in a unified framework. It finds that 1) under the empirical analysis, the greatest risk is longevity risk, followed by health risk; 2) under the subjective analysis, retirees perceive market risk as the highest-ranking risk due to their exaggeration of market volatility; and 3) the longevity risk and health risk are valued less in the subjective ranking than in the objective ranking, because retirees underestimate their life spans and their health costs in late life
Thesis (PhD) — Boston College, 2020
Submitted to: Boston College. Graduate School of Arts and Sciences
Discipline: Economics
Realista, Andreia cristina Saraiva. "A perceção do risco na atividade dos bombeiros." Master's thesis, Instituto Politécnico de Setúbal. Escola Superior de Ciências Empresariais. Escola Superior de Tecnologia de Setúbal, 2014. http://hdl.handle.net/10400.26/7157.
Full textO presente trabalho tem como objetivo, analisar e caracterizar a Perceção do Risco de elementos de corporações de Bombeiros. Na abordagem desta problemática, realizou-se uma análise dos determinantes da Perceção de Riscos, bem como a caraterização da Perceção de Riscos específicos nesta atividade. A primeira parte do trabalho efetua uma referência à realidade dos Bombeiros em Portugal, nomeadamente dos riscos a que estão sujeitos e ainda à perceção do risco, dando especial atenção aos fatores que a podem influenciar. A segunda parte apresenta a caracterização do instrumento de diagnóstico, o procedimento, a amostra e a análise e discussão dos resultados obtidos. Relativamente aos dados obtidos, verifica-se que a média das várias subescalas avaliadas nos Determinantes da Perceção do Risco está compreendida entre 1,49 (Irrelevância de Evitar o Risco) e 5,56 (Ansiedade), o desvio padrão entre 0,71 (Recompensas e Influência Social) e 0,97 (Severidade/Efeito Imediato ou Remoto). Nos dados obtidos nas subescalas da Perceção do Risco, os valores da média variam entre 5,29 (Risco Cognitivo) e 5,51 (Risco Emocional) e o desvio padrão entre 3,35 (Risco Cognitivo) e 5,55 (Risco Emocional). Os dados revelam que variáveis como Sexo, Vínculo com os Bombeiros, Chefia/Supervisão, Acidentes, Agregado familiar, Antiguidade, Estado civil, Graduação, Habilitações académicas e idade influenciam de forma significativa as perceções relativamente às subescalas dos Determinantes da Perceção do Risco.
Abstract: The current work settles has its objective to analyze and characterize, the risk perception of the fireman corporations. Within this problem approach, a determinants Risk Perception analyze was made, as well as the characterization of the Perception of specific risks in this activity. The first part in this work regards the Portugal Fireman reality, mainly the risks that they came across every day and also the Risk Perception they have, giving a special attention to the main factors that can actually influence this perception. The second part presents the characterizations of this diagnose instrument, the procedure, the sample and the analysis and discussion of the obtained results. Regarding the obtain data, it’s verified that the several dimensions, appraised average in the Risk Perception Determination is comprehended between 1.49 (Avoiding Risk Irrelevance) and 5.56 (Anxiety) and the standard deviation 0.71 (Rewards and Social Influence) as well as 0.97 (Severity/ Immediate Effect or Remote One). In the obtained data from the Risk Perception dimension, the average values vary between 5.29 (Cognitive Risk) and 5.51 (Emotional Risk) and the standard deviation settles between 3.35 (Cognitive Risk) and 5.55 (Emotional Risk). This data shows that different variables like Sex, Fireman bond, Leadership/Supervision, Accidents, Family, Seniority, Marital Status, Graduation, Academic Qualifications and Age, are a significant influence within the perceptions regarding the dimensions of the Risk Perception determinants.
Fantino, Benoît. "Quels élements d'influence pour l'adoption symbolique de la sécurité des systèmes d'information?" Thesis, Aix-Marseille, 2018. http://www.theses.fr/2018AIXM0586.
Full textThe information system security for which the interest joins in the increasing dependence of companies to them information system and in prospect of increasing number of security incidents. We are interested in the information system risk management, for whom the literature underlines the lack of involvement of top-managers.We approach the concern under the view of the decision of top executives for ISS, through four theoretical streams: the models of the managerial perceptions of IS risks, the risks perception in psychology, the institutional theory and the theory about symbolic adoption of the innovations. The aim is to make intelligible the influences on the symbolic adoption of such ISS approach. We use a qualitative method organized around 17 case studies in companies with varied activities. Our results highlight the relevance to study the ISS according to an individual perspective of risk management. On one hand, the characteristics of the psychological evaluation of the risks enlighten the biases for the management of the information system risk. On the other hand, the study of these biases brings a new perspective on the understanding of the investment of the top executives for the ISS. In particular, we underline the insensitivity of the top managers in the exposure of the risk, a preference to approach the risks under a threats point of view. We expose the influences which contribute to adopt a technical and not managerial ISS such as suggests by the Research. Finally, our analysis brings to the foreground perspectives to extend the comprehension of a reactive ISS, defame by ISS’ academics
Afshar, Faranak. "Investigating the Determinants of Disaster Recovery Technology Investment Choice in Small and Medium-sized Enterprises." NSUWorks, 2014. http://nsuworks.nova.edu/gscis_etd/7.
Full textTalaie, Daniel, and Sara Ursu. "Kunders förtroende för mobila bankapplikationer : En empirisk studie som identifierar unga bankkunders förtroende för mobila bankapplikationer i samband med säkerhetsrisker." Thesis, Södertörns högskola, Företagsekonomi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:sh:diva-45904.
Full textBankbranschen förändras ständigt där allt fler flexibla betalningsmetoder och användarvänliga tjänster uppkommer. Dagens digitaliserade samhälle lockar till sig unga människor där nya attityder och beteenden attribueras. Således anses mobila bankapplikationer vara en teknologisk utveckling och effektivisering av banken. Med denna utveckling kan även operativa risker såsom säkerhetsrisker tillkomma. Förtroendet är följaktligen av stor betydelse för förhållandet mellan bankkunder och banken för att bevara kundnöjdheten och kundlojaliteten. Tidigare forskning visar att unga bankkunders förtroende för mobila bankapplikationer influeras av och uppvisar samband mellan ett flertal faktorer. Syftet med studien är att beskriva och analysera sambandet mellan unga bankkunders förtroende för mobila bankapplikationer och upplevda säkerhetsrisker. Studien tillämpar en kvantitativ forskningsmetod. Metoden baseras på en deduktiv och positivistisk ansats med utgångspunkt i teoretiska ramverk som prövar studiens sex hypoteser. Den empiriska datan har samlats in genom en enkätundersökning, som vidare besvarades av 183 respondenter. Därefter bearbetades data med hjälp av en univariat och bivariat analys samt en multipel regressionsanalys. Studiens teoretiska referensram introducerar ett flertal teorier med ändamål att utreda studiens bakgrund och problemdiskussion. En oberoende variabel och fem kontrollvariabler har framtagits som inflytelserika faktorer för unga bankkunders förtroende för mobila bankapplikationer. Den oberoende variabeln består av perception av säkerhetsrisker och de fem kontrollvariablerna utgörs av kön, ålder, utbildningsnivå, befattning och sparande, vilka alla står i relation till den beroende variabeln förtroende. Resultatet påvisar att det inte finns ett statistiskt säkerställt samband mellan unga bankkunders förtroende för mobila bankapplikationer i relation till kön, utbildningsnivå och befattning. Däremot tyder resultatet på ett statistiskt säkerställt samband mellan unga bankkunders förtroende för mobila bankapplikationer i förhållande till perception av säkerhetsrisker, ålder och sparande. Studiens resultat fastslog även att ju äldre den unga bankkunden är desto lägre förtroende erhåller kunden för de mobila bankapplikationerna.
Rahman, Naseef. "International Students’ Perception of Risk and Safety when Travelling : Case Study on students of Dalarna University, Borlange, Sweden." Thesis, Högskolan Dalarna, Turismvetenskap, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:du-28877.
Full textLiu, XiaoTong. "Privacy exposure on WeChat from users' perspective : A study among the university students in China." Thesis, Linnéuniversitetet, Institutionen för informatik (IK), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-80610.
Full textLiu, Fang. "Mining Security Risks from Massive Datasets." Diss., Virginia Tech, 2017. http://hdl.handle.net/10919/78684.
Full textPh. D.
Ambrose, William, Samuel Athley, and Niclas Dagland. "Cloud Computing : Security Risks, SLA, and Trust." Thesis, Jönköping University, JIBS, Business Informatics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-12484.
Full textWith Cloud Computing becoming a popular term on the Information Technology (IT) market, security and accountability has become important issues to highlight. In our research we review these concepts by focusing on security risks with Cloud Computing and the associated services; Software, Platform and Infrastructure (SPI) and connecting them with a social study of trust.
The method that was conducted during our research was reviewing secondary literature, interviewing different experts regarding Cloud Computing and relating standards already established by ENISA, NIST, and CSA to the interviews.
The result of this study shows connections between the specific SPIs, both how they compare, but also how they differ. In the end we were also able to rank the top security risks from interviews with experts and see which SPI could be the most insecure one and what countermeasures could be applied.
This was further related to trust and Service Level Agreement (SLA) in Cloud Computing to show how the security risks we discuss are related to these two specific areas. By highlighting this we wanted to present useable information for both clients and providers in how to create a better Cloud Computing environment.
Messaggi, Kaya Monica. "Trust and security risks in mobile banking." Thesis, University of Oxford, 2013. http://ora.ox.ac.uk/objects/uuid:bccf1f59-70cc-4b67-bf87-bfc7af22880f.
Full textWard, Shannon-Jane. "The consumer-perceived risk associated with the intention to purchase online." Thesis, Link to the online version, 2008. http://hdl.handle.net/10019/1891.
Full textBoksasp, Trond, and Eivind Utnes. "Android Apps and Permissions: Security and Privacy Risks." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2012. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-18898.
Full textBrand, Johanna Catherina. "The governance of significant enterprise mobility security risks." Thesis, Stellenbosch : Stellenbosch University, 2013. http://hdl.handle.net/10019.1/85853.
Full textENGLISH ABSTRACT: Enterprise mobility is emerging as a megatrend in the business world. Numerous risks originate from using mobile devices for business-related tasks and most of these risks pose a significant security threat to organisations’ information. Organisations should therefore apply due care during the process of governing the significant enterprise mobility security risks to ensure an effective process to mitigate the impact of these risks. Information technology (IT) governance frameworks, -models and -standards can provide guidance during this governance process to address enterprise mobility security risks on a strategic level. Due to the existence of the IT gap these risks are not effectively governed on an operational level as the IT governance frameworks, -models and -standards do not provide enough practical guidance to govern these risks on a technical, operational level. This study provides organisations with practical, implementable guidance to apply during the process of governing these risks in order to address enterprise mobility security risks in an effective manner on both a strategic and an operational level. The guidance given to organisations by the IT governance frameworks, -models and -standards can, however, lead to the governance process being inefficient and costly. This study therefore provides an efficient and cost-effective solution, in the form of a short list of best practices, for the governance of enterprise mobility security risks on both a strategic and an operational level.
AFRIKAANSE OPSOMMING: Ondernemingsmobiliteit kom deesdae as ‘n megatendens in die besigheidswêreld te voorskyn. Talle risiko's ontstaan as gevolg van die gebruik van mobiele toestelle vir sake-verwante take en meeste van hierdie risiko's hou 'n beduidende sekuriteitsbedreiging vir organisasies se inligting in. Organisasies moet dus tydens die risikobestuursproses van wesenlike mobiliteit sekuriteitsrisiko’s die nodige sorg toepas om ‘n doeltreffende proses te verseker ten einde die impak van hierdie risiko’s te beperk. Informasie tegnologie (IT)- risikobestuurraamwerke, -modelle en -standaarde kan op ‘n strategiese vlak leiding gee tydens die risikobestuursproses waarin mobiliteit sekuriteitsrisiko’s aangespreek word. As gevolg van die IT-gaping wat bestaan, word hierdie risiko’s nie effektief op ‘n operasionele vlak bestuur nie aangesien die ITrisikobestuurraamwerke, -modelle en -standaarde nie die nodige praktiese leiding gee om hierdie risiko’s op ‘n tegniese, operasionele vlak te bestuur nie. Om te verseker dat organisasies mobiliteit sekuriteitsrisiko’s op ‘n effektiewe manier op beide ‘n strategiese en operasionele vlak bestuur, verskaf hierdie studie praktiese, implementeerbare leiding aan organisasies wat tydens die bestuursproses van hierdie risiko’s toegepas kan word. Die leiding aan organisasies, soos verskaf in die IT-risikobestuurraamwerke, - modelle en -standaarde, kan egter tot’n ondoeltreffende en duur risikobestuursproses lei. Hierdie studie bied dus 'n doeltreffende, koste-effektiewe oplossing, in die vorm van 'n kort lys van beste praktyke, vir die bestuur van die mobiliteit sekuriteitsrisiko’s op beide 'n strategiese en 'n operasionele vlak.
Klasmark, Jacob, and Valter Lundegårdh. "Potential security risks in Google Nest Indoor Camera." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280288.
Full textVår värld blir mer och mer uppkopplad varje dag. Nyligen har en trend tagit fart: smarta hem. När människor investerar i att göra sitt hus anslutet inkluderar det vanligtvis också någon typ av övervakning, mer exakt en kamera. En kamera i ditt hem lyfter emellertid frågan: hur säker är den? I denna kandidatuppsats genomfördes en undersökning av hur säker Google Nest Indoor Camera är. Denna kamera valdes eftersom den är relativt billig jämfört med andra Nest kameror vilket gör den mer attraktiv för gemene man. Då kameran är utvecklad av Google skulle en dessutom kunna förvänta sig rejäl säkerhet. Tidigare penetrationstest upptäckte tvärtemot flera sårbarheter vilket resulterade i medieuppmärksamhet över hela världen. Dessa faktorer kombinerade gav oss tillräckligt med anledning att genomföra vår kandidatexamen kring denna enhet.En studie kring hur säker kameran är genomfördes. Den inleddes med en forskningsfas för att identifiera de mest avgörande hoten. Tillsammans med en hotmodell av systemet och tidigare forskning summerades hoten i en hotmatris. Dessa rankades sedan med DREAD för att ytterligare begränsa mängden hot så att endast de mest potentiellt skadliga skulle kunna undersökas vidare. Penetrationstest utfördes därefter.Från vår studie hittade vi inga bevis på befintliga sårbarheter som kan göra det möjligt för en tuff motståndare att se kameraflödet eller komma åt andra delar av ens hemnätverk genom den. Trots det hittades andra, kanske farliga, sårbarheter och utnyttjanden. Detta inkluderar möjligheten att lära sig i vilket läge kameran är i eller hindra en användare från att ansluta till kameran via Bluetooth.
Alawaji, Ahmed S. "Privacy and security risks for national health records systems." Thesis, Massachusetts Institute of Technology, 2018. http://hdl.handle.net/1721.1/118558.
Full textPage 104 blank. Cataloged from PDF version of thesis.
Includes bibliographical references (pages 101-103).
A review of national health records (NEHR) systems shows that privacy and security risks have a profound impact on the success of such projects. Countries have different approaches when dealing with privacy and security considerations. The aims of this study were to explore how governments can design secure national health records systems. To do that systematically, we developed a framework to analyze NEHR systems. We then applied the framework to investigate the privacy and security risks in these systems. The studied systems demonstrate that getting privacy and security right have a considerable impact on the success of NEHR projects. Also, our study reveals that the healthcare system structure has a substantial impact on the adoption and usage rates of the system. The studied cases uncover many opportunities for improving privacy and security measures in future projects. The framework demonstrates the utility of applying it to the three cases.
by Ahmed S. Alawaji.
S.M. in Engineering and Management
Han, Jun. "Advantages and Risks of Sensing for Cyber-Physical Security." Research Showcase @ CMU, 2018. http://repository.cmu.edu/dissertations/1161.
Full textSedlack, Derek J. "Reducing Incongruity of Perceptions Related to Information Risk: Dialogical Action Research in Organizations." NSUWorks, 2012. http://nsuworks.nova.edu/gscis_etd/299.
Full textAlkaabi, Ahmed. "Strategic framework to minimise information security risks in the UAE." Thesis, University of Bedfordshire, 2014. http://hdl.handle.net/10547/344600.
Full textWindow, Marc. "Security in Precision Agriculture : Vulnerabilities and risks of agricultural systems." Thesis, Luleå tekniska universitet, Datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-74309.
Full textSiljeströmer, Henrik. "Risks of Internet of ThingsA study of risks, consumer knowledge and behaviours regarding IoT usage and security." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-447017.
Full textAbreu, Nair JÃlia Andrade de. "Perception of flooding risks in the PreguiÃa neighborhood - Maranguape(CE)." Universidade Federal do CearÃ, 2015. http://www.teses.ufc.br/tde_busca/arquivo.php?codArquivo=14654.
Full textThis research addresses the risks of flooding in the PreguiÃa neighborhood, Maranguape / CearÃ, covering more specifically the perceptual approach these risks. This approach is of great importance in that it presents data showing how residents perceive and understand the context of risks to which they belong, including information that can be extremely useful to risk management. In addition, aspects related to perception are hardly highlighted in studies of risks. Thus, this study aimed to analyze the perception that of the residents of the PreguiÃa neighborhood have about the flooding risk in that area, addressing the different aspects that may have influenced the observed perceptions. At the same time, the objective was to verify the measures taken (and to be made) in respect of such risks. The development of this study was performed by means of surveying and mapping and literature review; field observations; making maps; development and implementation of questionnaires; and discussion of the data obtained through the questionnaires and field surveys. The data on the perception of residents and issues relating to it were organized and analyzed on the following variables: experiences and knowledge related to accidents and / or alert conditions; conditions of flooding, causality and responsibility; evaluation and choice; threshold security and lastly, adjustments and other reactions to the risks. The results show that 92% of respondents consider the existence of flood risk in the area, 58% have adopted at least one preventive measure of immediacy and only 22% had changes in the structure of their respective residences. In the end, proposals were presented and discussed measures to be taken in order to reduce the risk of flooding in the area and prevent accidents.
A presente pesquisa aborda os riscos de inundaÃÃes existentes no bairro PreguiÃa, Maranguape/CearÃ, contemplando mais especificamente a abordagem perceptiva desses riscos. Esse tipo de abordagem reveste-se de grande importÃncia na medida em que apresenta dados que revelam como os moradores locais percebem e compreendem o contexto de riscos no qual estÃo inseridos, informaÃÃes que inclusive podem ser extremamente Ãteis à gestÃo de riscos. AlÃm disso, aspectos relacionados à percepÃÃo dificilmente sÃo destacados nos estudos sobre riscos. Desse modo, objetivou-se analisar a percepÃÃo que alguns dos residentes do bairro PreguiÃa apresentam sobre os riscos de inundaÃÃes na referida Ãrea, abordando os diferentes aspectos que podem ter influenciado nas percepÃÃes observadas. Paralelamente, objetivou-se verificar as medidas tomadas (e a serem tomadas) em relaÃÃo a esses riscos. O desenvolvimento desse estudo deu-se por meio de levantamento e revisÃo bibliogrÃfica e cartogrÃfica; observaÃÃes em campo; confecÃÃo de mapas; elaboraÃÃo e aplicaÃÃo de questionÃrios; bem como discussÃo dos dados obtidos por meio dos questionÃrios e dos levantamentos de campo. Os dados referentes à percepÃÃo dos moradores e aos aspectos relacionados a ela foram organizados e analisados em torno das seguintes variÃveis: experiÃncias e conhecimentos relacionados à ocorrÃncia de acidentes e/ou a situaÃÃes de alerta; condicionantes e deflagradores, causalidade e responsabilidade; avaliaÃÃo e escolha; limiar de seguranÃa e por Ãltimo, ajustamentos e outras reaÃÃes frente aos riscos. Os resultados obtidos mostram que 92% dos pesquisados consideram a existÃncia de riscos de inundaÃÃes na Ãrea, 58% jà adotaram pelo menos uma medida preventiva de carÃter imediato e apenas 22% deles realizaram modificaÃÃes na estrutura de suas respectivas residÃncias. Ao final sÃo apresentadas e discutidas propostas de medidas a serem tomadas no intuito de reduzir os riscos de inundaÃÃes na Ãrea e prevenir acidentes.
Masci, Stefano. "Airport Security: Passenger's Perception and Design Issues." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2016. http://amslaurea.unibo.it/10468/.
Full textMehmood, Furhan, and Rajia Rafique. "Management of operational risks related to information security in financial organizations." Thesis, Mälardalen University, School of Sustainable Development of Society and Technology, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-9823.
Full textDate: 30th May 2010
Authors: Rajia Rafique, Furhan Mehmood
Tutor: Dr. Michael Le Duc, Dr. Deepak Gupta
Title: Management of Operational Risks related to Information Security in Financial Organizations
Introduction: Information security is very significant for organizations, especially for financial organizations where customer information and their satisfaction are considered the most important assets for financial organizations. Therefore customer information must be sustained from information security breaches in order to satisfy customers. Financial organizations use their customer’s information several times a day to deal with different operations. These operations contain several types of risks. Operational risks related to information security are becoming sensational for financial organizations. Financial organizations concentrate to reduce the exposure of operational risk related to information security because these risks can affect the business to a great extent. Financial organizations need such policies and techniques which can be used to reduce the exposure of operational risk and to enhance information security. Several authors discuss about several types of operational risk related to information security, and several authors discuss about the techniques to avoid these risks in order to enhance information security.
Problem: Investigate the concept of Operational Risks related to Information Security and how it is perceived in Financial Organization?
Purpose: The aspiration of writing this report is to describe and analyze operational risks related to information security in financial organizations and then to present some suggestions in form of polices or techniques which can be used by financial organizations to enhance their information security.
Method: Since the type of our thesis is Qualitative based, therefore exploratory research approach is used to carry out research. Authors tried to use secondary source of information as well as primary source of information in order to get maximum knowledge about the topic and to come up with maximum possible output.
Target Audience
The target audience in our mind for this paper consists of both, academic readers and professionals who have interest and some knowledge about information security and operational risks. Target audience for this research work includes professionals, academic readers and both investigated organizations (NCCPL and CDC).
Conclusion
By critically analyzing the literature written by various authors and the worthy information provided by our primary sources gave us the opportunity to develop a solution to keep the operations secure from risks and to fix the current problems related to information security. We found that there are different types of operational risks related to information security which can affect the business of financial organizations and there are various techniques which can be used by financial organizations to solve the current issue related to operational risks in order to enhance information security. It was also found that top management in financial organizations is interested in issues about information security operational risk and they showed their keen interest in adopting new effective techniques.
Keywords: Information Security, Information Security Risks, Operational Risks, Operational Risk Management, Operational Risks in Financial Organizations.
Fielk, Klaus W. "Cyberciege scenario illustrating integrity risks to a military like facility." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Sep%5FFielk.pdf.
Full textThesis advisor(s): Cynthia E. Irvine, Paul C. Clark. Includes bibliographical references (p. 97-101). Also available online.
Sung, Martin (Ming-Che). "The perception and management of pollution risks in Taiwan's electric utility." Thesis, Glasgow Caledonian University, 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.313175.
Full textAckley, Mary. "Evaluating Environmental Risks in Mining: a Perceptual Study." ScholarWorks @ UVM, 2008. http://scholarworks.uvm.edu/graddis/7.
Full textMillman, Caroline Elizabeth. "Perceptions and risks : food-borne pathogens in the domestic environment." Thesis, University of Manchester, 2012. https://www.research.manchester.ac.uk/portal/en/theses/perceptions-and-risks-foodborne-pathogens-in-the-domestic-environment(daae2641-ddf5-41d0-877c-1ba1533ad243).html.
Full textZwickle, Adam K. "Communicating Environmental Risks." The Ohio State University, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=osu1397500693.
Full textGaupp, Franziska. "Water security, droughts and the quantification of their risks to agriculture : a global picture in light of climatic change." Thesis, University of Oxford, 2017. https://ora.ox.ac.uk/objects/uuid:a9a1a456-0f3f-4795-8b9d-149cd804aeb0.
Full textBa, Jing. "Analysis of Security Risks in Mobile Payments : A Case Study Using DNAT." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-119997.
Full textBrandt, Aric. "Feedyard biocontainment, biosecurity, and security risks and practices of central plains feedyards." Thesis, Manhattan, Kan. : Kansas State University, 2007. http://hdl.handle.net/2097/343.
Full textSaleh, Mohamed Saad Morsy. "Analysis of information security risks and protection management requirements for enterprise networks." Thesis, University of Bradford, 2011. http://hdl.handle.net/10454/5414.
Full textLever, K. E. "Identifying and mitigating security risks in multi-level systems-of-systems environments." Thesis, Liverpool John Moores University, 2018. http://researchonline.ljmu.ac.uk/8707/.
Full textFeldbaume, Harley. "The HIV-AIDS national security nexus : a history of risks and benefits." Thesis, London School of Hygiene and Tropical Medicine (University of London), 2009. http://researchonline.lshtm.ac.uk/682417/.
Full textde, Groot Caroline Sofie. "Security risks of climate change : Climate change induced conflicts in western Kenya." Thesis, Uppsala universitet, Statsvetenskapliga institutionen, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-364947.
Full textMancini, Guilio M. "Education and Security: Design and Evaluation Tools for Deliberate Disease Risks Mitigation." Thesis, University of Bradford, 2016. http://hdl.handle.net/10454/15740.
Full textSaleh, Mohamed S. M. "Analysis of Information Security Risks and Protection Management Requirements for Enterprise Networks." Thesis, University of Bradford, 2011. http://hdl.handle.net/10454/5414.
Full textNunes, Sérgio Rodrigues. "Value focused assessment of cyber risks to gain benefits from security investments." Doctoral thesis, Instituto Superior de Economia e Gestão, 2018. http://hdl.handle.net/10400.5/15874.
Full textCom a multiplicação de dispositivos tecnológicos e com as suas complexas interacções, os ciber riscos não param de crescer. As entidades supervisoras estabelecem novos requisitos para forçar organizações a gerir os ciber riscos. Mesmo com estas crescentes ameaças e requisitos, decisões para a mitigação de ciber riscos continuam a não ser bem aceites pelas partes interessadas e os benefícios dos investimentos em segurança permanecem imperceptíveis para a gestão de topo. Esta investigação analisa o ciclo de vida da gestão de ciber risco identificando objectivos de mitigação de ciber risco, capturados de especialistas da área, prioritizando esses objectivos para criar um modelo de decisão para auxiliar gestores de risco tendo em conta vários cenários reais, desenvolvendo um conjunto de princípios de gestão de risco que possibilitam o estabelecimento de uma base para a estratégia de ciber risco aplicável e adaptável às organizações e finalmente a avaliação dos benefícios dos investimentos em segurança para mitigação dos ciber riscos seguindo uma abordagem de melhoria contínua. Duas frameworks teóricas são integradas para endereçar o ciclo de vida completo da gestão de ciber risco: o pensamento focado em valor guia o processo de decisão e a gestão de benefícios assegura que os benefícios para o negócio são realizados durante a implementação do projecto, depois de tomada a decisão para investir numa solução de segurança para mitigação do ciber risco.
With the multiplication of technological devices and their multiple complex interactions, the cyber risks keep increasing. Supervision entities establish new compliance requirements to force organizations to manage cyber risks. Despite these growing threats and requirements, decisions in cyber risk minimization continue not to be accepted by stakeholders and the business benefits of security investments remain unnoticed to top management. This research analyzes the cyber risk management lifecycle by identifying cyber risk mitigation objectives captured from subject matter experts, prioritizing those objectives in a cyber risk management decision model to help risk managers in the decision process by taking into account multiple real scenarios, developing the baseline of cyber risk management principles to form a cyber risk strategy applicable and adaptable to current organizations and finally evaluating the business benefits of security investments to mitigate cyber risks in a continuous improvement approach. Two theoretical frameworks are combined to address the full cyber risk management lifecycle: value focused thinking guides the decision process and benefits management ensures that business benefits are realized during project implementation, after the decision is taken to invest in a security solution to mitigate cyber risk.
info:eu-repo/semantics/publishedVersion
Townshend, William Roger. "From new world order to superpower accommodations : political realism and Russian-European security: security risks, objectives and strategies." Thesis, Lancaster University, 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.322341.
Full textMalec, Mieczyslaw. "Security perception : within and beyond the traditional approach /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FMalec.pdf.
Full textThesis advisor(s): Jeffrey Knopf, Boris Keyser. Includes bibliographical references (p. 69-73). Also available online.
Bengtsson, Tobias. "Citizen Perception of Private Security Guards in Malmö." Thesis, Malmö högskola, Fakulteten för hälsa och samhälle (HS), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-25592.
Full textDespite the rapid increase in private security guards in recent decades, little is known about citizens’ perception of security guards. In this paper citizens’ trust and satisfaction with security guards is assessed. The aim of the study is to get an insight into citizens’ perception of private security guards in Malmö. Paper and pencil surveys were distributed in Malmö with questions regarding perceived trust and satisfaction with security guards and about security guards’ professionalism, accountability, imagery, and civility. The sample consisted of 78 respondents and the findings suggest that the overall perception of security guards was more positive than negative, however, the results were largely mixed. Perceived professionalism predicted satisfaction with security guards and perceived civility predicted trust in security guards. Also, security guard behavior while interacting with the public was a strong predictor of both trust and satisfaction with security personnel. Results from this study and similar studies can be used by private security organizations to educate staff in order to improve the public perception of security guards. It may also be useful for policy makers in order to make more educated decisions about future regulation of the private security industry.
Lages, Nadine Cathérine [Verfasser]. "Risk Perception and Behavior Related to Changing Health Risks / Nadine Cathérine Lages." Konstanz : KOPS Universität Konstanz, 2021. http://nbn-resolving.de/urn:nbn:de:bsz:352-2-1jreaj87dwsce3.
Full textJung, Jeyong. "A study of cyber security management within South Korean businesses : an examination of risks and cybercrime involving industrial security." Thesis, University of Portsmouth, 2018. https://researchportal.port.ac.uk/portal/en/theses/a-study-of-cyber-security-management-within-south-korean-businesses(4f6f8a10-c31a-4eec-b092-2b38ac8815d9).html.
Full textNarayanan, Anu. "The Emerging Smart Grid: Opportunities for Increased System Reliability and Potential Security Risks." Research Showcase @ CMU, 2012. http://repository.cmu.edu/dissertations/138.
Full text