TF
T. Fiebig
9 records found
1
Email communication is a crucial part of the daily processes of enterprises. Organizations can opt for traditional infrastructure on-premise or use cloud-based email services provided by (foreign) cloud service providers. In Europe in particular, organizations from crucial sector
...
Centralised DNS-based Malware Mitigation
Examining the adoption and efficacy of centralised DNS-based malware mitigation services
Malware presents a growing problem in a world that is increasingly connected to, and reliant on, the internet. The growing, devastating potential of cyber attacks such as DDoS attacks on society and economy is largely the result of a new class of devices, the Internet of Things (
...
Privacy issues of mobile phone companies’ usage of Ultra-Wideband (UWB) technology
Analysing the use of UWB in mobile phones from a multi-actor perspective, magnifying privacy concerns and formulating guidelines
Ultra-Wideband (UWB) technology became unregulated within the EU in 2007. Most recently, it was integrated into mobile phones in 2019, notably Apply and Samsung adding it to all their newer models. While UWB is characterised as a radio technology with any signal above 500 MHz, it
...
Fighting Child Sexual Abuse Material better together
A stakeholder central review of the government policies
This study aims to make recommendations about how the Internet can be more thoroughly cleaned of Child Sexual Abuse Material (CSAM), focusing on the Dutch government policies. In the past years, several organizations, including the European Commission, called out the Netherlands
...
More effective and efficient risk communication in the cybersecurity field needs to be designed to improve risk awareness among people and to increase resiliency. The field of cyber risk communication is relatively new, which limits the current knowledge on how to design risk com
...
Customer Acceptance of a Revenue Management Platform with Multi-Party Computation
Application of Multi-Party Computation to Revenue Management in the Semiconductor Industry
Research ProblemIn today’s competitive and fast-paced nature of conducting business in the semiconductor industry, the discipline of revenue management (RM) is often mentioned. Through a dynamic pricing capability, RM enables firms to maximize profits by capitalizing on missed re
...
In recent years, many countries and administrative domains exploit control over their communication infrastructures to censor online materials. The concrete reasons behind the Internet censorship remain poorly understood due to the opaque nature of the systems. Generally, Interne
...
Development of Injected Code Attacks in Online Banking Fraud Incidents
An exploratory study for understanding the evolution of code used by cyber criminals in financial malware
The frequency of online banking fraud incidents has increased over the last years. A method used by different cybercriminals is the injection of malicious code into the targeted web pages. For example, attackers might inject an additional piece code into the webpage of a targeted
...