Search results for "Vendor"

showing 3 items of 23 documents

Framing Effects on Online Security Behavior

2020

We conducted an incentivized lab experiment examining the effect of gain vs. loss-framed warning messages on online security behavior. We measured the probability of suffering a cyberattack during the experiment as the result of five specific security behaviors: choosing a safe connection, providing minimum information during the sign-up process, choosing a strong password, choosing a trusted vendor, and logging-out. A loss-framed message led to more secure behavior during the experiment. The experiment also measured the effect of trusting beliefs and cybersecurity knowledge. Trusting beliefs had a negative effect on security behavior, while cybersecurity knowledge had a positive effect.

nudgeOnline securityProcess (engineering)Vendorlcsh:BF1-990Internet privacyonline behaviorgain vs. loss frame050105 experimental psychologyEconomíaPassword strength03 medical and health sciences0302 clinical medicineProspect theoryPsychology0501 psychology and cognitive sciencesGeneral PsychologyOriginal ResearchG500business.industrycyber security05 social sciencesprospect theoryFraming effectC800lcsh:Psychologythreat assessmentlab experimentPsychologybusinessThreat assessment030217 neurology & neurosurgeryFrontiers in Psychology
researchProduct

Towards Automated Classification of Firmware Images and Identification of Embedded Devices

2017

Part 4: Operating System and Firmware Security; International audience; Embedded systems, as opposed to traditional computers, bring an incredible diversity. The number of devices manufactured is constantly increasing and each has a dedicated software, commonly known as firmware. Full firmware images are often delivered as multiple releases, correcting bugs and vulnerabilities, or adding new features. Unfortunately, there is no centralized or standardized firmware distribution mechanism. It is therefore difficult to track which vendor or device a firmware package belongs to, or to identify which firmware version is used in deployed embedded devices. At the same time, discovering devices tha…

sulautettu tietotekniikkaComputer scienceVendorvulnerability02 engineering and technologycomputer.software_genreSoftware020204 information systems0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs]tietoturvadata securityhaavoittuvuusbusiness.industryFirmwareFingerprint (computing)020206 networking & telecommunicationsubiquitous computingRandom forestIdentification (information)koneoppiminenmachine learningEmbedded systemUser interfaceHardware_CONTROLSTRUCTURESANDMICROPROGRAMMINGbusinesscomputerPrivate network
researchProduct

Timing the information system upgrade

2010

A system upgrade requires careful planning as its implications to organizational systems might be enormous. Although in IS literature the requirements and process of systems upgrade have been discussed, the timing when to upgrade and what factors guide it has been of lesser interest. Consequently, in this paper we focus on information systems upgrading and its timing from the perspective of the user organization. Upgrading is enabled by the availability of a new software version. When to upgrade, meanwhile, is determined by the business interests of the customer organization, business calendar, development projects, and the vendor. These factors were identified by interviewing 14 IT manager…

system upgrade timingdeterminantitmotivesvendorcustomerajoitus (suunnittelu)Version changeupgradeinformation systems
researchProduct