Now showing items 1-19 of 19

  • Advancing User Authentication and Access Management 

    Crume, Jeffery (University of Plymouth, 2019)
    In order for online systems to transact business or exchange other sensitive information, there must be an environment where the parties involved can verify that the other is who they claim to be. Authentication mechanisms ...
  • Authentication Aura: A cooperative and distributed approach to user authentication on mobile devices 

    Hocking, Christopher George (Plymouth University, 2015)
    As information technology pervades our lives we have increasingly come to rely on these evermore sophisticated and ubiquitous items of equipment. Portability and the desire to be connected around the clock has driven the ...
  • Behavioural Profiling In Mobile Networks 

    Zincir, Ibrahim (University of Plymouth, 2011)
    In the last 20 years mobile devices gained an important role in daily life and became must have items for everyone. As mobile devices give us the much needed flexibility and mobility, they also represent one major concern; ...
  • Building Cyber Defense Training Capacity 

    Moore, Erik (University of Plymouth, 2020)
    As society advances in terms of information technology, the dependency on cyber secure systems increases. Likewise, the need to enhance both the quality and relevance of education, training, and professional development ...
  • Computational model of negotiation skills in virtual artificial agents 

    Pacella, Daniela (University of Plymouth, 2019)
    Negotiation skills represent crucial abilities for engaging in effective social interactions in formal and informal settings. Serious games, intelligent systems and virtual agents can provide solid tools upon which ...
  • Effective information assurance with risk management 

    Dimopoulos, Vassileios Andreas (University of Plymouth, 2007)
    Today's businesses base their operation on their IT infrastructure, which consequently demands that it should be protected accordingly. Nevertheless, surveys tend to indicate that the number of IT security incidents is ...
  • Effective Online Safety Awareness for Young People in Less Developed Countries 

    Herkanaidu, Kona Ramesswar Kona (University of Plymouth, 2020)
    In less developed countries (LDCs) there is a research deficit on the positive and negative aspects of their respective emerging digital cultures. Education programmes that seek to raise awareness of online safety, needs ...
  • Establishing an Information Security Awareness and Culture 

    Korovessis, Peter (Plymouth University, 2015)
    In today’s business environment all business operations are enabled by technology. Its always on and connected nature has brought new business possibilities but at the same time has increased the number of potential ...
  • Evaluation and Enhancement of Public Cyber Security Awareness 

    Alotaibi, Faisal Fahad G (University of Plymouth, 2019)
    With the spread of the Internet and the technology, Cyberspace has become the life of everyone, which requires them to be aware of the threats of it. Also, to be prepared with the speed of the technology, whether electronic ...
  • An Evaluation of Targeted Security Awareness for End Users 

    Mahmoud Ahmmed Ahmmed, Najem (University of Plymouth, 2019)
    Users are frequently cited as being the weakest link in the information security chain. However, in many cases they are ill-positioned to follow good practice and make the necessary decisions. Part of the reason here is ...
  • A Framework for Understanding and Establishing an Effective Information Security Culture 

    Tolah, Alaa (University of Plymouth, 2021)
    A challenge facing organisations is information security, as security breaches pose a serious threat to sensitive information. Organisations face security risks in relation to their information assets, which also stems ...
  • Improving Intrusion Prevention, Detection and Response 

    Ibrahim, Tarik Mohamed Abdel-Kader (University of Plymouth, 2011)
    In the face of a wide range of attacks. Intrusion Detection Systems (IDS) and other Internet security tools represent potentially valuable safeguards to identify and combat the problems facing online systems. However, ...
  • Incident Prioritisation for Intrusion Response Systems 

    Jumaat, Nor Badrul Anuar (University of Plymouth, 2012)
    The landscape of security threats continues to evolve, with attacks becoming more serious and the number of vulnerabilities rising. To manage these threats, many security studies have been undertaken in recent years, ...
  • An Insider Misuse Threat Detection and Prediction Language 

    Magklaras, Georgios Vasilios (University of Plymouth, 2012)
    Numerous studies indicate that amongst the various types of security threats, the problem of insider misuse of IT systems can have serious consequences for the health of computing infrastructures. Although incidents of ...
  • A Model for Monitoring End-User Security Policy Compliance 

    Alotaibi, Mutlaq (University of Plymouth, 2017)
    Organisations increasingly perceive their employees as a great asset that needs to be cared for; however, at the same time, they view employees as one of the biggest potential threats to their cyber security. Organizations ...
  • Network Security Intelligence Centres for Information Security Incident Management 

    Miloslavskaya, Natalia (University of Plymouth, 2019)
    Intensive IT development has led to qualitative changes in our living, which are driving current information security (IS) trends and require sophisticated structures and adequate approached to manage IS for different ...
  • Performance Metrics for Network Intrusion Systems 

    Tucker, Christopher John (University of Plymouth, 2013)
    Intrusion systems have been the subject of considerable research during the past 33 years, since the original work of Anderson. Much has been published attempting to improve their performance using advanced data processing ...
  • Risk Communication Framework for Parental Control in the Digital World 

    Alotaibi, Moneerah N (University of Plymouth, 2020)
    The Internet is growing rapidly and is becoming an essential part of children’s lives. Internet use has many benefits for learning, participation, creativity, entertainment and communication. Along with such benefits, ...
  • Transparent User Authentication For Mobile Applications 

    Alotaibi, Saud Nejr S (University of Plymouth, 2019)
    The use of smartphones in our daily lives has grown steadily, due to the combination of mobility and round-the-clock multi-connectivity. In particular, smartphones are used to perform activities, such as sending emails, ...

All items in PEARL are protected by copyright law.
Author manuscripts deposited to comply with open access mandates are made available in accordance with publisher policies. Please cite only the published version using the details provided on the item record or document. In the absence of an open licence (e.g. Creative Commons), permissions for further reuse of content should be sought from the publisher or author.
Theme by 
@mire NV