Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
Articles 1 - 10 of 10
Full-Text Articles in Physical Sciences and Mathematics
Breadcrumbs: Privacy As A Privilege, Prachi Bhardwaj
Breadcrumbs: Privacy As A Privilege, Prachi Bhardwaj
Capstones
Breadcrumbs: Privacy as a Privilege Abstract
By: Prachi Bhardwaj
In 2017, the world saw more data breaches than in any year prior. The count was more than the all-time high record in 2016, which was 40 percent more than the year before that.
That’s because consumer data is incredibly valuable today. In the last three decades, data storage has gone from being stored physically to being stored almost entirely digitally, which means consumer data is more accessible and applicable to business strategies. As a result, companies are gathering data in ways previously unknown to the average consumer, and hackers are …
Designing Secure Access Control Model In Cyber Social Networks, Katanosh Morovat
Designing Secure Access Control Model In Cyber Social Networks, Katanosh Morovat
Graduate Theses and Dissertations
Nowadays, information security in online communication has become an indisputable topic. People prefer pursuing their connection and public relations due to the greater flexibility and affordability of online communication. Recently, organizations have established online networking sites concerned with sharing assets among their employees. As more people engage in social network, requirements for protecting information and resources becomes vital. Over the years, many access control methods have been proposed. Although these methods cover various information security aspects, they have not provided an appropriate approach for securing information within distributed online networking sites. Moreover, none of the previous research provides an access …
Dynamic Adversarial Mining - Effectively Applying Machine Learning In Adversarial Non-Stationary Environments., Tegjyot Singh Sethi
Dynamic Adversarial Mining - Effectively Applying Machine Learning In Adversarial Non-Stationary Environments., Tegjyot Singh Sethi
Electronic Theses and Dissertations
While understanding of machine learning and data mining is still in its budding stages, the engineering applications of the same has found immense acceptance and success. Cybersecurity applications such as intrusion detection systems, spam filtering, and CAPTCHA authentication, have all begun adopting machine learning as a viable technique to deal with large scale adversarial activity. However, the naive usage of machine learning in an adversarial setting is prone to reverse engineering and evasion attacks, as most of these techniques were designed primarily for a static setting. The security domain is a dynamic landscape, with an ongoing never ending arms race …
The Efficacy Of Perceived Big Data Security, Trust, Perceived Leadership Competency, Information Sensitivity, Privacy Concern And Job Reward On Disclosing Personal Security Information Online, Iqbal Amiri
CCE Theses and Dissertations
Individuals’ reluctance to provide sensitive personal information online could affect the US Governments’ ability to hire and retain qualified personnel for sensitive cleared positions. The aim of this research study was to show how perceived big data security, trust, perceived leadership competency, information sensitivity, privacy concern and reward of a job play a significant role in limiting an individuals’ willingness of disclosing sensitive personal information online. While a significant volume of research has examined information disclosure in the health care field, there has not been any published studies on the willingness of online disclosure in order to attain a US …
Investigation On Security Issues And Features In Social Media Sites (Face Book, Twitter, & Google+), Puneet Kumar Goud Kandikanti
Investigation On Security Issues And Features In Social Media Sites (Face Book, Twitter, & Google+), Puneet Kumar Goud Kandikanti
All Student Theses
Social media sites allow users to communicate and share their information which are a matter of privacy for users, so users should be aware about its limitations and disad-vantages to use social media sites. Likewise, there are many social media sites with its dif-ferent features and it typically works with the latest technology that is provided by the ex-perts to get connected and go along with the flow. The online privacy issues have been a re-al time problem and these however is the main aim for the experts to reduce the problems while sharing the kind of content that is …
Measuring Cybersecurity Competency: An Exploratory Investigation Of The Cybersecurity Knowledge, Skills, And Abilities Necessary For Organizational Network Access Privileges, Richard Nilsen
CCE Theses and Dissertations
Organizational information system users (OISU) that are victimized by cyber threats are contributing to major financial and information losses for individuals, businesses, and governments. Moreover, it has been argued that cybersecurity competency is critical for advancing economic prosperity and maintaining national security. The fact remains that technical cybersecurity controls may be rendered useless due to a lack of cybersecurity competency of OISUs. All OISUs, from accountants to cybersecurity forensics experts, can place organizational assets at risk. However, that risk is increased when OISUs do not have the cybersecurity competency necessary for operating an information system (IS). The main goal of …
Strategic Cyber-Risk Implications Of Cloud Technology Adoption In The U.S. Financial Services Sector, Olatunji Mujib Arowolo
Strategic Cyber-Risk Implications Of Cloud Technology Adoption In The U.S. Financial Services Sector, Olatunji Mujib Arowolo
Walden Dissertations and Doctoral Studies
According to research, the risks of adopting new technology and the technological and organizational factors that influence adopting it are not clear. Thus, many financial institutions have hesitated to adopt cloud-computing. The purpose of this quantitative, cross-sectional study was to evaluate the cyber-risk implications of cloud-computing adoption in the U.S. financial services sector. The study examined 6 technological and organizational factors: organization size, relative advantage, compliance, security, compatibility, and complexity within the context of cyber-risk. Using a combination of diffusion of innovation theory and technology-organization-environment framework as the foundation, a predictive cybersecurity model was developed to determine the factors that …
Threat Intelligence In Support Of Cyber Situation Awareness, Billy Paul Gilliam
Threat Intelligence In Support Of Cyber Situation Awareness, Billy Paul Gilliam
Walden Dissertations and Doctoral Studies
Despite technological advances in the information security field, attacks by unauthorized individuals and groups continue to penetrate defenses. Due to the rapidly changing environment of the Internet, the appearance of newly developed malicious software or attack techniques accelerates while security professionals continue in a reactive posture with limited time for identifying new threats. The problem addressed in this study was the perceived value of threat intelligence as a proactive process for information security. The purpose of this study was to explore how situation awareness is enhanced by receiving advanced intelligence reports resulting in better decision-making for proper response to security …
Strategies To Minimize The Effects Of Information Security Threats On Business Performance, Stella Ifeyinwa Okoye
Strategies To Minimize The Effects Of Information Security Threats On Business Performance, Stella Ifeyinwa Okoye
Walden Dissertations and Doctoral Studies
Business leaders in Nigeria are concerned about the high rates of business failure and economic loss from security incidents and may not understand strategies for reducing the effects of information security threats on business performance. Guided by general systems theory and transformational leadership theory, the focus of this exploratory multiple case study was to explore the strategies small and medium-sized enterprise (SME) leaders use to minimize the effects of information security threats on business performance. Semistructured interviews were conducted with 5 SME leaders who worked in SME firms that support oil and gas industry sector in Port Harcourt, Nigeria, had …
A Formal Approach To Combining Prospective And Retrospective Security, Sepehr Amir-Mohammadian
A Formal Approach To Combining Prospective And Retrospective Security, Sepehr Amir-Mohammadian
Graduate College Dissertations and Theses
The major goal of this dissertation is to enhance software security by provably correct enforcement of in-depth policies. In-depth security policies allude to heterogeneous specification of security strategies that are required to be followed before and after sensitive operations. Prospective security is the enforcement of security, or detection of security violations before the execution of sensitive operations, e.g., in authorization, authentication and information flow. Retrospective security refers to security checks after the execution of sensitive operations, which is accomplished through accountability and deterrence. Retrospective security frameworks are built upon auditing in order to provide sufficient evidence to hold users accountable …