Showing 1 - 10 of 112
The dissertation consists of two parts. The first part investigates whether and how to protect cultural goods. In particular, Chapter II analyses how the notion of social identity affects the respective demand for protection of cultural goods independent of its tangible or intangible nature....
Persistent link: https://www.econbiz.de/10011297188
mitigated because the put option reduces sensitivity of the security's value to the changes in the firm's volatility. Prior to … value has only a limited negative impact on the security. …
Persistent link: https://www.econbiz.de/10009431118
degree on IT efficiency and security. The findings of this study, which has been conducted in partnership with the … of the present e-security situation in SMEs of Queensland's Gold Coast region. The data shows that the installation and … updating process in order to be on top of the IT development, which is why most SMEs rely to a substantial degree on the …
Persistent link: https://www.econbiz.de/10009437520
risk is placed on the security and privacy of the data. PVI, LoBot, and TVEM provide a means for clients to establish trust … in cloud platforms, thus reducing their risk exposure. PVI is a new management and security model that shares the … responsibility of security management in cloud computing between the service provider and client, decreasing the risk exposure to …
Persistent link: https://www.econbiz.de/10009439441
are more likely to affect user satisfaction than unintentional security breaches. Additional analyses were performed using …. The results also facilitated the development of a usability model and associated recommendations for how sites that … privacy policies and the impact of privacy and security breaches. As part of this research, a conceptual model is presented …
Persistent link: https://www.econbiz.de/10009439442
necessitating more innovative approaches to solving the problem of phishing attacks at the company level. Security standards are … security protection against phishing attacks; the findings communicated to the technical audience was the successful adaptation … of an existing security standard to produce a usable framework. Further research initiatives should extend the types of …
Persistent link: https://www.econbiz.de/10009457741
literature review, and the development of theoretical frameworks, a number ofhypotheses are put forward. The methodological … significant relationship on the utilisation of the NPGS: the amount of security orcollateral; limited company status …
Persistent link: https://www.econbiz.de/10009461076
In this thesis we discuss two demanding problems from the field of computer and communication security that involve …, other than in traditional computer security problems, the adversary has a lot of control over the situation. The untrusted … ways: We propose relaxed, but still practically useful, notions of security for the DSP problem; we identify theoretical …
Persistent link: https://www.econbiz.de/10009467070
an untrusted service provider. We explore the limits of the security that is achievable in these scenarios. When … discussing security, we refer to the state of the art definitions from cryptography and complexity theory. The key contributions … prove its correctness and security. - We describe a new searchable encryption scheme that exceeds existing analogues with …
Persistent link: https://www.econbiz.de/10009467071