Sök:

Sökresultat:

18294 Uppsatser om Access to information - Sida 14 av 1220

Ideellt kårengagemang - Drivkrafter och resultat

The purpose of this study was to examine how modern information and communication technology influence collective action within the framework of social movements. By studying the protests in the Arab World 2011, and focusing on the social movements in Suleimanya in northern Iraq, by observation taken on place, the essay discusses that collective action is closely related to the use of technology, for example cell phones and Internet.Result shows that modern communication technology has enabled immeasurable access andconnection between individuals throughout the world, which seems to be different from previouscollective action. The new communication channels in the form of social media, has been used for the dissemination of information and news, documentation, organization and membership recruitment in the social movements in the Arab World and Suleimanya. The new social movements have the tendency to be decentralized and flattened organized, they are now self-organizing and that they only do a whole as global patterns, as evidenced by the social movements in the Arab World andSuleimanya..

Internetbegränsning på stadsbibliotek

The purpose of this thesis is to investigate how city librariesmaintain the intellectual freedom in their Internet service. Thediscussion about Internet filters has been quiet in Sweden forseveral years, so I wanted to see if there had been an increased useof filters. I also wanted to see if the city libraries regulated theInternet service in another way. I sent a survey to 100 libraries andgot answer from 83. To explain what intellectual freedom is, I usedStuart Hamilton?s theory about intellectual freedom in the librarycontext.

Modularisering : Modulbaserad arkitektur ? flexibel motormodulline

 We have chosen to write our thesis within a transport company. The work was carried out at DHL activities in Uppsala. DHL is one of the leading transport companies worldwide. Our interest lies in more efficient and advanced transportation and terminals, as globalization and new trends require effective solutions.The aim of our work is to explain the need for information technology applications in road haulage and associated terminal operations. Furthermore, we analyses terminal and applied information technology.

KOLLEKTIVTRAFIKENS GEOGRAFISKA VARIATIONER I TID OCH KOSTNAD ? HUR PÅVERKAR DETTA BOSTADSPRISERNA? : Fallstudie Uppsala län med pendlingsomland

The distance between home and work has increased in recent decades. By the development of infrastructure and public transport, jobs farther from home have become more accessible and this development has in turn increased commuting. Commuting travellers often pass over administrative boundaries which often serve as borders for public transport pricing. Also the market control prices. Research shows that travel times and costs significantly affect commuting choice.

Att tillgängliggöra kvalitetskontrollerade Internetresurser: en studie av två ämnesportaler och två samverkansprojekt

The purpose of this masters thesis is to study two subject gate-ways within the field of Swedish higher education and academic research, concerning structuring and selection of Internet resources to facilitate information retrieval for their target groups, and also to study two co-operation projects in the same field, one national and one European, to see how the co-operation is being carried through and how the gateways in the projects can serve from a wider perspective. The gateways, AGORA and NOVAGate, are being studied mainly by their Web sites and two e-mail interviews with persons responsible for the gateways. Facts about the national project are principally based on an interview with BIBSAM. The European Renardus is being studied out of articles and information on the Web site. From the results of the study it is being clear that the purpose of the gateways is to make a quality-selection of information accessible via the Internet and thereby facilitate for their target groups to find usable information.

HAVECA-modellen : En metod för att fortlöpande säkra ett internt nätverk mot tredjepart

This thesis will address a problem concerning availability of information systems at an enterprise within the financial sector and its external suppliers, so called trusted third party. The information system resides on the internal network of the enterprise and must be available to both employees of the enterprise and the trusted third party simultaneously. This contradicts the company policy which disallows third parties access to the internal network. The HAVECA-model introduced in this thesis provides a framework of methods, each solving a sub problem identified in the model. The identified methods are hardening, verification, control and assurance, together supplying a method for continuously securing the internal network against a trusted third party.

Upproren i Arabvärlden. En studie i kommunikationskanalernas roll i kollektiv handling

The purpose of this study was to examine how modern information and communication technology influence collective action within the framework of social movements. By studying the protests in the Arab World 2011, and focusing on the social movements in Suleimanya in northern Iraq, by observation taken on place, the essay discusses that collective action is closely related to the use of technology, for example cell phones and Internet.Result shows that modern communication technology has enabled immeasurable access andconnection between individuals throughout the world, which seems to be different from previouscollective action. The new communication channels in the form of social media, has been used for the dissemination of information and news, documentation, organization and membership recruitment in the social movements in the Arab World and Suleimanya. The new social movements have the tendency to be decentralized and flattened organized, they are now self-organizing and that they only do a whole as global patterns, as evidenced by the social movements in the Arab World andSuleimanya..

Förbränningslära för bubblandefluidbädd

Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report,  the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.

Filter = censur? En enkätundersökning om bibliotekariers rätt att begränsa information med hjälp av datorfilter.

The main purpose of this paper is to examine librarian's opinion of computer filters, to bring order in the debate on these filters and also to encourage future debate on this subject. The main problem is whether librarians themselves think they have the right to limit the public Access to information on the Internet by using computer filters. We will also see how many public libraries are using filters, why they have chosen to use or not to use them, what is the librarians' opinion of filters, what rules exist regarding the use of the Internet, and finally if it is legal to use filter programs in public libraries. We have also included a short report on what filters are and how they work. This paper deals only with Swedish conditions on a number of public libraries.

An enriched arena for lamb - anticipation behaviour before entering the arena, effects of skipping the anticipation phase and effects of being denied access to the arena

This study aimed to investigate whether lambs show anticipatory behaviours in a holding pen prior to entering a known arena, whether the holding pen experience prior to the arena exposure affects their play expression in the arena and whether their behaviour (in home pen) is affected if arena access is denied. Twenty pair-housed male lambs (average 14 weeks old), were exposed, in chronological order, to five treatments. Holding pen treat-ment (HP-control): Each pair was led into a holding pen (2.7 m2) and remained there for 5 minutes before returning to their home pen (6 m2). Holding pen ? arena treatment (HP-A): Each pair was led into a holding pen for 5 min and then was allowed access into the arena (22 m2, containing two hanging chains, one ball and one platform) for 15 min before re-turning to their home pen.

Den fysiska miljöns betydelse i förskolan : Miljöns utformning och barns delaktighet

My intention with this paper was to investigate how the teachers in pre-school thinks about the physical environment in pre-school. Both the significance for the pedagogical activity and the children?s involvement in the design. I have done five interviews with pre-school teachers. The result shows that the pre-school teachers consider that the size of the premises and the availability to the material is important factors for children?s development and learning.

Konstruktion av elektrolytisk ozongenerator

The work has been carried out in cooperation with the company Zenit Design in Malmö. The project's goal was to restore, improve and produce an ozone generator. During the project, the authors sought relevant literature in databases, been in contact with US suppliers of fuel cell membranes, Asian suppliers for the processing of Teflon and Titanium parts in mechanical engineering and Swedish suppliers of various standard components. The authors had access to a temporary lab at Zenit and electron microscope at Halmstad University where material tests were performed. The authors have also had access to measurement equipment to measure amounts of ozone.During the work, the authors have mapped how an existing ozone generator works and then have their own development.

Windbelt

Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report,  the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.

Analys av säkerheten av RFID i inpasseringssystem

Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report,  the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.

Testprogram till hårdvara på en viktindikator

Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report,  the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.

<- Föregående sida 14 Nästa sida ->