Search results for "Vendor"
showing 3 items of 23 documents
Framing Effects on Online Security Behavior
2020
We conducted an incentivized lab experiment examining the effect of gain vs. loss-framed warning messages on online security behavior. We measured the probability of suffering a cyberattack during the experiment as the result of five specific security behaviors: choosing a safe connection, providing minimum information during the sign-up process, choosing a strong password, choosing a trusted vendor, and logging-out. A loss-framed message led to more secure behavior during the experiment. The experiment also measured the effect of trusting beliefs and cybersecurity knowledge. Trusting beliefs had a negative effect on security behavior, while cybersecurity knowledge had a positive effect.
Towards Automated Classification of Firmware Images and Identification of Embedded Devices
2017
Part 4: Operating System and Firmware Security; International audience; Embedded systems, as opposed to traditional computers, bring an incredible diversity. The number of devices manufactured is constantly increasing and each has a dedicated software, commonly known as firmware. Full firmware images are often delivered as multiple releases, correcting bugs and vulnerabilities, or adding new features. Unfortunately, there is no centralized or standardized firmware distribution mechanism. It is therefore difficult to track which vendor or device a firmware package belongs to, or to identify which firmware version is used in deployed embedded devices. At the same time, discovering devices tha…
Timing the information system upgrade
2010
A system upgrade requires careful planning as its implications to organizational systems might be enormous. Although in IS literature the requirements and process of systems upgrade have been discussed, the timing when to upgrade and what factors guide it has been of lesser interest. Consequently, in this paper we focus on information systems upgrading and its timing from the perspective of the user organization. Upgrading is enabled by the availability of a new software version. When to upgrade, meanwhile, is determined by the business interests of the customer organization, business calendar, development projects, and the vendor. These factors were identified by interviewing 14 IT manager…