Change search
Refine search result
1 - 4 of 4
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1.
    Floderus, Sebastian
    et al.
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science.
    Rosenholm, Linus
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science.
    An educational experiment in discovering spear phishing attacks2019Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Background: Spear phishing attacks uses social engineering targeting a specific person to steal credential information or infect the users computer with malware. It is often done through emails and it can be very hard to spot the difference between a legitimate email and a scam email. Cybercrime is a growing problem and there is many ways to inform and educate individuals on the subject.Objectives: This study intends to perform an experiment to see if an educationalsupport tool can be used to better identify phishing emails. Furthermore see if there is a difference in susceptibility between students from different university programs. Methods: A qualitative research study was used to get the necessary understanding how to properly develop a phishing educational tool. A Pretest-Posttest experiment is done to see if there is an improvement in result between an experimental group that received education and the control group that did not. Results: The result shows an overall higher score for the technical program compared to the non-technical. Comparing the pretest with the posttest shows an increase in score for the non-technical program and a decrease in score for the technical program. Furthermore 58% of the non-technical students who started the test did not complete it. Conclusions: There is a noticeable difference in susceptibility between the programs for detecting scam emails for students. However further research is needed in order to explore to what extent the education process had an impact.

  • 2.
    Johansson, Gorana
    Blekinge Institute of Technology, Faculty of Engineering, Department of Industrial Economics.
    En etnografisk resa inom sårvården: Mötet med specialiserad vård av svårläkta sår inom hemsjukvården2015Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This study is an empirical work about healthcare in the process of transformation. The speciic healthcare concerns foot and leg wound care within the homecare. The theoretical frame of the study relies on the Activity theory applied onto the healthcare workers involved into the wound care of the hard healing leg and foot ulcers. The transformation process involving this activity is seen as the example of the expansive learning and which is part of the activity theory. The method used is known, according to the Engeström (the leading figure within the currunt Activity research) as "etnography of trouble". The focus is on identifying conflicts which take place within the work activity. The purpose of the study was to increase understanding of how the wound care business is performed in home care in light of expansive learning theory. Results show the need for the wound care within the homecare to develop at the subject level as much as the system level. There are two specific developmental areas in concern, the tehnical-instrumental (development of digital assistance) and interaction-communication dmension (development of a new communication channel on vertical level). Both solutions liberate individuals competens. In the question of communication channel connected to the leadership this would create conditions for tehnical solutions to appear quicker.

  • 3.
    Linde, Peter
    Blekinge Institute of Technology, The Library.
    BTH Newsletter on Science Publishing and Open Access Issues: June 20192019Other (Other (popular science, discussion, etc.))
  • 4.
    Linde, Peter
    Blekinge Institute of Technology, The Library.
    BTH Newsletter on Science Publishing and Open Access Issues: March20192019Other (Other (popular science, discussion, etc.))
1 - 4 of 4
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf