Suggested Topics within your search.
- tietoturva 38
- data security 36
- 601 29
- Information Systems Science 17
- Tietojärjestelmätiede 17
- cyber security 16
- kyberturvallisuus 16
- safety and security 9
- turvallisuus 9
- 602 6
- Kyberturvallisuus 6
- Mathematical Information Technology 6
- Tietotekniikka 6
- ohjelmistokehitys 6
- software development 6
- Computer Science 5
- Tietojenkäsittelytiede 5
- cyber attacks 5
- information security 5
- verkkohyökkäykset 5
- cloud services 4
- information technology 4
- pilvipalvelut 4
- tietosuoja 4
- authentication 3
- tietotekniikka 3
- todentaminen 3
- uhat 3
- asenteet 2
- cloud security 2
-
21
Factors affecting information security behavior of employees : a case study
Published 2019Subjects: Get full text Get full textMaster's thesis -
22
“The law that mandates us is stronger than the consumer's rights” : what are the decisions related to authentication method selection?
Published 2023Subjects: Get full text Get full textMaster's thesis -
23
Protecting against social engineering attacks in a corporate environment
Published 2020Subjects: Get full text Get full textMaster's thesis -
24
What affects the intention to change information security behavior when using biometric authentication in mobile payments?
Published 2021Subjects: Get full text Get full textMaster's thesis -
25
Strategies for network segmentation : a systematic literature review
Published 2024Subjects: Get full text Get full textMaster's thesis -
26
HTTP cookie weaknesses, attack methods and defense mechanisms : a systematic literature review
Published 2018Subjects: Get full text Get full textMaster's thesis -
27
Secure and coherent external user identity management
Published 2023Subjects: Get full text Get full textMaster's thesis -
28
Evidence in cloud security compliance : towards a meta-evaluation framework
Published 2019Subjects: Get full text Get full textMaster's thesis -
29
Digital signing process automation and optimization
Published 2020Subjects: Get full text Get full textMaster's thesis -
30
Cloud Asset Identification Strategy
Published 2022Subjects: Get full text Get full textMaster's thesis -
31
Selection of open-source web vulnerability scanner as testing tool in continuous software development
Published 2024Subjects: Get full text Get full textMaster's thesis -
32
Coping with personal data breaches in healthcare
Published 2021Subjects: Get full text Get full textMaster's thesis -
33
Reporting cyber security to management and board of directors
Published 2022Subjects: Get full text Get full textMaster's thesis -
34
Frameworks for software threats and security in secure DevOps
Published 2022Subjects: Get full text Get full textMaster's thesis -
35
Security aspects of service chaining in software-defined networking environments
Published 2018Subjects: Get full text Get full textMaster's thesis -
36
-
37
Literature review of information security practice survey reports
Published 2018Subjects: Get full text Get full textMaster's thesis -
38
Creating secure integrations : case of Salesforce integrations
Published 2022Subjects: Get full text Get full textMaster's thesis -
39
TARA+AD: Threat Analysis and Risk Assessment for Automated Driving : cybersecurity of road vehicles
Published 2023Subjects: Get full text Get full textMaster's thesis