Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Unauthorized access). Showing records 1 – 7 of 7 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


NSYSU

1. Wang, Yu-ching. A Study of Employee Unauthorized Computer Access Intention â An Integration of Neutralization, Differential Association and Containment Theory.

Degree: Master, Information Management, 2012, NSYSU

Unauthorized computer access by employees is the most common hacking behavior in every company. Hence, it is necessary to first understand why an employee engages… (more)

Subjects/Keywords: Differential Association Theory; Neutralization Theory; Unauthorized Computer Access; Containment Theory; Computer Hacking

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wang, Y. (2012). A Study of Employee Unauthorized Computer Access Intention â An Integration of Neutralization, Differential Association and Containment Theory. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0817112-194405

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Wang, Yu-ching. “A Study of Employee Unauthorized Computer Access Intention â An Integration of Neutralization, Differential Association and Containment Theory.” 2012. Thesis, NSYSU. Accessed January 26, 2021. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0817112-194405.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Wang, Yu-ching. “A Study of Employee Unauthorized Computer Access Intention â An Integration of Neutralization, Differential Association and Containment Theory.” 2012. Web. 26 Jan 2021.

Vancouver:

Wang Y. A Study of Employee Unauthorized Computer Access Intention â An Integration of Neutralization, Differential Association and Containment Theory. [Internet] [Thesis]. NSYSU; 2012. [cited 2021 Jan 26]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0817112-194405.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Wang Y. A Study of Employee Unauthorized Computer Access Intention â An Integration of Neutralization, Differential Association and Containment Theory. [Thesis]. NSYSU; 2012. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0817112-194405

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Cambridge

2. Vetterl, Alexander. Honeypots in the age of universal attacks and the Internet of Things.

Degree: PhD, 2020, University of Cambridge

 Today's Internet connects billions of physical devices. These devices are often immature and insecure, and share common vulnerabilities. The predominant form of attacks relies on… (more)

Subjects/Keywords: Network security; Honeypot; Fingerprinting; Attackers; Distributed Denial of Service (DDoS); Malware; Threat analysis; Honware; Network measurement; Internet of Things (IoT); Firmware; Emulation; Virtualisation; Warning messages; Deterrence; Detection; System trespassing; Unauthorized access; Customer Premise Equipment (CPE); Zero days; Network protocols

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Vetterl, A. (2020). Honeypots in the age of universal attacks and the Internet of Things. (Doctoral Dissertation). University of Cambridge. Retrieved from https://www.repository.cam.ac.uk/handle/1810/303171

Chicago Manual of Style (16th Edition):

Vetterl, Alexander. “Honeypots in the age of universal attacks and the Internet of Things.” 2020. Doctoral Dissertation, University of Cambridge. Accessed January 26, 2021. https://www.repository.cam.ac.uk/handle/1810/303171.

MLA Handbook (7th Edition):

Vetterl, Alexander. “Honeypots in the age of universal attacks and the Internet of Things.” 2020. Web. 26 Jan 2021.

Vancouver:

Vetterl A. Honeypots in the age of universal attacks and the Internet of Things. [Internet] [Doctoral dissertation]. University of Cambridge; 2020. [cited 2021 Jan 26]. Available from: https://www.repository.cam.ac.uk/handle/1810/303171.

Council of Science Editors:

Vetterl A. Honeypots in the age of universal attacks and the Internet of Things. [Doctoral Dissertation]. University of Cambridge; 2020. Available from: https://www.repository.cam.ac.uk/handle/1810/303171

3. Mačužić, Vladimir. Nepooblaščeno zbiranje poslovnih podatkov gostinskih lokalov preko Wi-Fi.

Degree: 2018, Univerza v Mariboru

V magistrskem delu raziskujemo pojav in razvoj Wi-Fi tehnologije in kibernetske kriminalitete ter potrebo po učinkovitih varnostnih nastavitvah računalniških sistemov z namenom preprečevanja nepooblaščenega dostopanja… (more)

Subjects/Keywords: brezžična omrežja; Wi-Fi; podatki; poslovni podatki; nepooblaščeni vdori; informacijska varnost; gostinski lokali; magistrska dela; cybercrime; Wi-Fi technology; awareness level; computer systems; unauthorized access; info:eu-repo/classification/udc/004.056(043.2)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mačužić, V. (2018). Nepooblaščeno zbiranje poslovnih podatkov gostinskih lokalov preko Wi-Fi. (Masters Thesis). Univerza v Mariboru. Retrieved from https://dk.um.si/IzpisGradiva.php?id=69856 ; https://dk.um.si/Dokument.php?id=124122&dn= ; https://plus.si.cobiss.net/opac7/bib/3538922?lang=sl

Chicago Manual of Style (16th Edition):

Mačužić, Vladimir. “Nepooblaščeno zbiranje poslovnih podatkov gostinskih lokalov preko Wi-Fi.” 2018. Masters Thesis, Univerza v Mariboru. Accessed January 26, 2021. https://dk.um.si/IzpisGradiva.php?id=69856 ; https://dk.um.si/Dokument.php?id=124122&dn= ; https://plus.si.cobiss.net/opac7/bib/3538922?lang=sl.

MLA Handbook (7th Edition):

Mačužić, Vladimir. “Nepooblaščeno zbiranje poslovnih podatkov gostinskih lokalov preko Wi-Fi.” 2018. Web. 26 Jan 2021.

Vancouver:

Mačužić V. Nepooblaščeno zbiranje poslovnih podatkov gostinskih lokalov preko Wi-Fi. [Internet] [Masters thesis]. Univerza v Mariboru; 2018. [cited 2021 Jan 26]. Available from: https://dk.um.si/IzpisGradiva.php?id=69856 ; https://dk.um.si/Dokument.php?id=124122&dn= ; https://plus.si.cobiss.net/opac7/bib/3538922?lang=sl.

Council of Science Editors:

Mačužić V. Nepooblaščeno zbiranje poslovnih podatkov gostinskih lokalov preko Wi-Fi. [Masters Thesis]. Univerza v Mariboru; 2018. Available from: https://dk.um.si/IzpisGradiva.php?id=69856 ; https://dk.um.si/Dokument.php?id=124122&dn= ; https://plus.si.cobiss.net/opac7/bib/3538922?lang=sl


University of Cambridge

4. Vetterl, Alexander. Honeypots in the age of universal attacks and the Internet of Things.

Degree: PhD, 2020, University of Cambridge

 Today's Internet connects billions of physical devices. These devices are often immature and insecure, and share common vulnerabilities. The predominant form of attacks relies on… (more)

Subjects/Keywords: Network security; Honeypot; Fingerprinting; Attackers; Distributed Denial of Service (DDoS); Malware; Threat analysis; Honware; Network measurement; Internet of Things (IoT); Firmware; Emulation; Virtualisation; Warning messages; Deterrence; Detection; System trespassing; Unauthorized access; Customer Premise Equipment (CPE); Zero days; Network protocols

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Vetterl, A. (2020). Honeypots in the age of universal attacks and the Internet of Things. (Doctoral Dissertation). University of Cambridge. Retrieved from https://doi.org/10.17863/CAM.50250 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.801825

Chicago Manual of Style (16th Edition):

Vetterl, Alexander. “Honeypots in the age of universal attacks and the Internet of Things.” 2020. Doctoral Dissertation, University of Cambridge. Accessed January 26, 2021. https://doi.org/10.17863/CAM.50250 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.801825.

MLA Handbook (7th Edition):

Vetterl, Alexander. “Honeypots in the age of universal attacks and the Internet of Things.” 2020. Web. 26 Jan 2021.

Vancouver:

Vetterl A. Honeypots in the age of universal attacks and the Internet of Things. [Internet] [Doctoral dissertation]. University of Cambridge; 2020. [cited 2021 Jan 26]. Available from: https://doi.org/10.17863/CAM.50250 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.801825.

Council of Science Editors:

Vetterl A. Honeypots in the age of universal attacks and the Internet of Things. [Doctoral Dissertation]. University of Cambridge; 2020. Available from: https://doi.org/10.17863/CAM.50250 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.801825


Youngstown State University

5. Steh, Stephen R. Unauthorized Access Crimes.

Degree: MSin Criminal Justice, Department of Criminal Justice, 2009, Youngstown State University

 This paper examines the concept of unauthorized access crimes statutes in the fifty states and the federal system in order to determine the concept of… (more)

Subjects/Keywords: Computer Science; Criminology; Law; Technology; computer crime; hacking; unauthorized access; legislation and case law

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Steh, S. R. (2009). Unauthorized Access Crimes. (Masters Thesis). Youngstown State University. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=ysu1254939817

Chicago Manual of Style (16th Edition):

Steh, Stephen R. “Unauthorized Access Crimes.” 2009. Masters Thesis, Youngstown State University. Accessed January 26, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1254939817.

MLA Handbook (7th Edition):

Steh, Stephen R. “Unauthorized Access Crimes.” 2009. Web. 26 Jan 2021.

Vancouver:

Steh SR. Unauthorized Access Crimes. [Internet] [Masters thesis]. Youngstown State University; 2009. [cited 2021 Jan 26]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ysu1254939817.

Council of Science Editors:

Steh SR. Unauthorized Access Crimes. [Masters Thesis]. Youngstown State University; 2009. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ysu1254939817


Pontifícia Universidade Católica de São Paulo

6. Sérgio Luiz de Almeida Ribeiro. Habeas data e tutela jurisdicional da privacidade: aspectos processuais.

Degree: 2013, Pontifícia Universidade Católica de São Paulo

Versa a presente dissertação sobre o instituto do habeas data como tutela jurisdicional da intimidade e seus aspectos processuais. O principal objetivo é analisar a… (more)

Subjects/Keywords: DIREITO; Direito fundamental à intimidade; Acesso à justiça; Habeas data; Entidades públicas e/ou privada mantenedoras de bancos de dados; Prevenção contra manuseio e disseminação desautorizados de dados da vida privada; Fundamental right to privacy; Access to justice; Habeas data; Public entities and private administrators of data banks; Protection against handling and unauthorized divulgation of private life data

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ribeiro, S. L. d. A. (2013). Habeas data e tutela jurisdicional da privacidade: aspectos processuais. (Thesis). Pontifícia Universidade Católica de São Paulo. Retrieved from http://www.sapientia.pucsp.br//tde_busca/arquivo.php?codArquivo=16198

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ribeiro, Sérgio Luiz de Almeida. “Habeas data e tutela jurisdicional da privacidade: aspectos processuais.” 2013. Thesis, Pontifícia Universidade Católica de São Paulo. Accessed January 26, 2021. http://www.sapientia.pucsp.br//tde_busca/arquivo.php?codArquivo=16198.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ribeiro, Sérgio Luiz de Almeida. “Habeas data e tutela jurisdicional da privacidade: aspectos processuais.” 2013. Web. 26 Jan 2021.

Vancouver:

Ribeiro SLdA. Habeas data e tutela jurisdicional da privacidade: aspectos processuais. [Internet] [Thesis]. Pontifícia Universidade Católica de São Paulo; 2013. [cited 2021 Jan 26]. Available from: http://www.sapientia.pucsp.br//tde_busca/arquivo.php?codArquivo=16198.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ribeiro SLdA. Habeas data e tutela jurisdicional da privacidade: aspectos processuais. [Thesis]. Pontifícia Universidade Católica de São Paulo; 2013. Available from: http://www.sapientia.pucsp.br//tde_busca/arquivo.php?codArquivo=16198

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Wollongong

7. Kong, Yibing. Security and privacy model for association databases.

Degree: Master of Computer Science by Research, School of Information Technology and Computer Science - Faculty of Informatics, 2003, University of Wollongong

  With the rapid development of information technology, data availability is improved greatly. Data may be accessed at anytime by people from any location. However,threats… (more)

Subjects/Keywords: information technology • data security • privacy • associations • association databases • direct access control • inference control • inference detection • unauthorized inference • confidentiality • mandatory model • logic reasoning • probabilistic reasoning • belief networks • logic inference rules • probabilistic inference rule

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kong, Y. (2003). Security and privacy model for association databases. (Masters Thesis). University of Wollongong. Retrieved from ; https://ro.uow.edu.au/theses/8

Chicago Manual of Style (16th Edition):

Kong, Yibing. “Security and privacy model for association databases.” 2003. Masters Thesis, University of Wollongong. Accessed January 26, 2021. ; https://ro.uow.edu.au/theses/8.

MLA Handbook (7th Edition):

Kong, Yibing. “Security and privacy model for association databases.” 2003. Web. 26 Jan 2021.

Vancouver:

Kong Y. Security and privacy model for association databases. [Internet] [Masters thesis]. University of Wollongong; 2003. [cited 2021 Jan 26]. Available from: ; https://ro.uow.edu.au/theses/8.

Council of Science Editors:

Kong Y. Security and privacy model for association databases. [Masters Thesis]. University of Wollongong; 2003. Available from: ; https://ro.uow.edu.au/theses/8

.