Blar i Institutt for informasjonssikkerhet og kommunikasjonsteknologi på tittel
Viser treff 1184-1203 av 2543
-
Inexpensive Data Hiding on USB Memory Sticks
(Bachelor thesis, 2011)ENGELSK: Memory sticks have increased their storage capacity while the price have decreased. Memory sticks are small, can carry lots of information and are easy to carry around. Unfortunately, it is also easy to lose a ... -
Inferring Delay Discounting Factors from Public Observables: Applications in Risk Analysis and the Design of Adaptive Incentives
(Chapter, 2021)Decision-makers regularly need to make trade-offs between benefits in the present and the future. Smaller immediate rewards are often preferred over larger delayed rewards. The concept of delay discounting describes how ... -
Influence of Changes in Audio Spatialization on the Experience of Immersion in Audiovisual Experiences
(Peer reviewed; Journal article, 2022)Understanding the influence of technical system parameters on audiovisual experiences is important for technologists to optimize experiences. The focus in this study was on the influence of changes in audio spatialization ... -
Influence of Gender and Viewing Frequency on Quality of Experience
(Peer reviewed; Journal article, 2020)Some of the most important aspects for content creators and service providers are the content appeal and the time consumed by the end users on a particular application or service. Gender and age can influence the Quality ... -
Influence of Image Effects and Filters in Deepfake Detection
(Master thesis, 2022)Videoer har blitt en viktig del av vårt digitale samfunn, som en kilde for informasjon og underholdning. I samsvar med denne digitale utviklingen har det kommet nye måter å redigere og manipulere videoer. Deepfakes er et ... -
Influence of Software and Hardware Failures with Imperfect Fault Coverage on PONs OPEX
(Proceedings of the 19th International Conference on Optical Network Design and Modeling;ONDM 2015, Chapter, 2015)Passive Optical Networks (PONs) are one of the preferred technologies to deploy broadband access networks. As time passes, end users presuppose network connectivity to be always available, and expect PONs to be highly ... -
The Influence of Team Workload Demands During a Cyber Defense Exercise on Team Performance
(Peer reviewed; Journal article, 2021)Research has shown that cyber defense is dependent on individual functioning as well as teamwork[1, 2]. Research has identified teamwork factors, such as communication and coordination, that increase performance [1, 3], ... -
Influencing Factors and Effectiveness of a Security Awareness Campaign
(Master thesis, 2018)As an organisation, it is important with technical security controls to protect information assets, but without cooperation from the employees, this is nearly useless. Gradually realising the importance of information ... -
Informasjonssikkerhetskultur i spesialisthelsetjenesten - En sosio-teknisk casestudie av Akershus universitetssykehus
(Master thesis, 2023)Økt digitalisering har gjort det mulig å levere helsetjenester av god kvalitet. Bruk av teknologi har imidlertid dannet grobunn for sikkerhetsrelaterte utfordringer og det observeres en drastisk økning i antall cyberangrep ... -
Information Inconsistencies in Smart Distribution Grids under Different Failure Causes modelled by Stochastic Activity Networks
(Chapter; Peer reviewed, 2019)The ongoing digitalization of the power distribution grid will improve the operational support and automation which is believed to increase the system reliability. However, in an integrated and interdependent cyber-physical ... -
Information security as a countermeasure against cheating in video games
(Master thesis, 2017)Most cheating in video games is possible due to information being accessible outside the intended frames of the game developer. The issue of protecting sensitive information have been handled in many areas outside of video ... -
Information Security Educational case study on the advanced network infrastructure security and technical aspects for large scale international organization
(Master thesis, 2013)Modern Organizations are highly depending on its network. It is because the communication process in the enterprises is impossible without a network. Networking and network security are the advanced terms for the modern ... -
Information security expertise and oversight among Norwegian boards of directors
(Master thesis, 2019)Corporate governance is under pressure after world-wide large-scale scandals, which were caused by inadequate internal control and supervision. Reforms, such as the Sarbanes-Oxley Act, brought changes to the internal control ... -
Information Security in Norwegian High Schools: A Case Study
(Master thesis, 2016)In Norwegian high schools, the use of information technology has changed dramatically the last years. At the same time, challenges related to information security have grown. Several students are just curious and want to ... -
Information Security Incident Management: A case study about preparedness and readiness
(Master thesis, 2014)Organisasjoner idag øker sin konkurranseevne ved stadig å benytte seg av nyere teknologi, og avhengigheten rettet til informasjonsteknologi ser bare ut til å bre seg. I dagens samfunn lagres mesteparten av informasjonen ... -
Information Security Incident Management: An Empirical Study of Current Practice
(Master thesis, 2013)An increasing use of digital solutions suggests that organizations today are more exposed to attacks than before. Recent reports show that attacks get more advanced and that attackers choose their targets more wisely. ... -
Information Security Measuring: Evaluation of concepts for measuring information security in an organisation, and an outline of a practical approach for this implementation
(Master thesis, 2008)Information security is essential in many situations in organisations to manage information. The threat of revealing crucial information is relevant in many businesses. Several suggestions to how an organisation could ... -
Information Security on the Web and App Platforms: An Economic and Socio-Behavioral Perspective
(Doktoravhandlinger ved NTNU, 1503-8181; 324, Doctoral thesis, 2012)Various security measures are ineffective having been designed without adequate usability and economic considerations. The primary objective of this thesis is to add an economic and socio-behavioral perspective to the ... -
Information Security Risk Assessment: A Method Comparison
(Journal article; Peer reviewed, 2017)Numerous methods for information security risk assessment (ISRA) are available, yet there is little guidance on how to choose one. Through a comprehensive risk identification, estimation, and evaluation framework, the ...