
Sökresultat:
7987 Uppsatser om Actor Network Theory - Sida 6 av 533
Grosshandlare i konkurs. Stockholm 1746 till 1799
Denna studie belyser svårigheten för teknik och virtuell geografi att nå ut till mottagaren genom en kartläggning av e-postens geografi. För att skapa förståelse och fånga den osynliga processen bakom e-postens geografi utgår uppsatsen dels från teorin Actor Network Theory (ANT) och dels från intervjuer.Under studiens gång uppstod ny förståelse för e-postens komplexitet och ledde fram till en reviderad syn. I början av uppsatsarbetet betraktades e-posten enbart utifrån sin funktion som aktant och intermediarie men i takt med att undersökningen fortgick framkom att den samtidigt, utöver dessa funktioner, fungerar e-posten som ett heterogent nätverk med betydelsefulla komponenter såsom aktörer och aktanter. Enligt uppsatsens konklusioner är e-postens trajektoria beroende av den strategi som producenten använder under skapandet av elektroniska meddelanden. Ett kontinuerligt arbete mellan producent och konsument krävs för att e-postens trajektoria ska upprätthållas och leda fram till att det elektroniska meddelande som löper igenom det virtuella nätverket når sitt syfte..
Stuxnet-attacken mot Iran : Strukturell realism i informationsrevolutionens tidsålder
This study aims to explain the Stuxnet-attack against Iran in 2009-2010 by using the IR-theory of structural realism. By doing so the theory also faces the challenge of the impact of the information revolution on security and international relations. The structural realism that is at hand is that of Kenneth Waltz and his Theory of International Politics from 1979.The study reaches the conclusion that Waltzs focus on the structure of the international system and the distribution of capabilities applies well to the case of Stuxnet as a cyber attack. The creators of the sophisticated Stuxnet, USA and Israel, also indicates that when it comes to this certain aspect of the information revolution and IR, states seem to still be the main actor. Finally the character of one of the major features of the Stuxnet-attack; the internet, is shown to have an anarchic structure that fits well as an extension of the realist view of the international system..
Lärande i molnet : EduSync belyst ur ett connectivistiskt synsätt
This essay has discussed and analyzed a draft for an idea about a network called EduSync. This idea is based on that teachers and students, attending and holding courses, all over the world should be able to find and interact with each other. EduSync is founded from a new learning theory, connectivism. Interviews, participation in a conference and two workshops have been used to gather information and different points of view concerning e-learning, for example possibilities and problems with this idea of a network. A comparison of web communities and e-learning environments that exists today was also done. The gathered information from persons as well as literature resulted in a discussion concerning learning and what would or would not be possible with the creation of EduSync.
Access to the market - a question of collaboration?
When contemplating entering an alliance the rationale behind the decision should differ
depending on the size of the companies involved as well as on other important factors. The important
factors influencing the decision are related to the resource pooling potential of the alliance,
the power structure along with the business network the companies are a part of. The
analysis has shown proof of a need for cooperation if one wish to succeed in the telecommunication
industry and it has also determined which resources that are deemed to be most important to
get in touch with, for our study object, to facilitate its access to the market. Those resources are
defined as a direct channel to the customer, funds/capital and the access to relevant business
networks. To get in touch with these lacking resources, three alternative approaches has been
proposed; all of them involving a strategic alliance decision.
Brandväggar för hemmakontor
Firewalls protect network traffic and decide witch traffic to send further and witch traffic will be blocked. All this depends on the rules in the firewall. The firewall is installed between the internal network and the Internet. It is difficult to find a firewall that can protect us against different threats. Firewalls have both advantages and disadvantages and all this make them vulnerable.
Network Coopetition ? Samarbete mellankonkurrerande aktörer inom hälso- och sjukvården : En fallstudie av vårdkedjan för patienter ibehov av neurokirurgisk vård inom Stockholms län ochGotlands län
Det övergripande syftet med den här avhandlingen var att utreda om network coopetition, samarbete mellan konkurrerande aktörer, kan öka värdeskapandet inom hälso- och sjukvården. Inom hälso- och sjukvården är network coopetition ett ämne som fått liten uppmärksamhet i tidigare studier. För att besvara syftet utvecklades en modell för network coopetition inom hälso- och sjukvården. Modellen applicerades sedan på en del av vårdkedjan för patienter i behov av neurokirurgisk vård.Resultaten från avhandlingen visar att: (1) Förutsättningarna för network coopetition i vårdkedjan för patienter i behov av neurokirurgisk vård är uppfyllda. (2) Det finns exempel på horisontell network coopetition i den studerade vårdkedjan.
BSR Prestandaverktyg / BSR Performance tool : Prestandamätning via diagnosuttag över CAN / Performance measure via diagnostic socket over CAN
This abstract describes the bachelor degree thesis in computer technology at Växjö University. The company BSR in Växjö has requested an application that can measure a cars performance, with attributes like acceleration times and engine power estimation. The communication between car and computer is via the USB port on the computer and the OBD-II socket on the car with the network protocol CAN, controller area network. Cars from VAG have been the primary focus group and the application has been tested on a Volkswagen Passat CC from 2009. The system is developed in the programming language C# in the environment Visual Studio with the framework .NET.
Skådespelarens hemligheter : Om Zeamis estetik och värdet av det som inte framträder
This work examines how the aesthetics of Japanese actor and playwright Zeami Motokiyo (1346-1443) offers insight into the value of the unseen elements in art, specifically in the art of acting. What acting makes appear is likened to a vessel, which creates an empty space of what doesn?t appear. This non-appearing element is at the same time what gives the vessel its function. N? theater is described as an art of suggesting, giving a background to Zeami?s theories.
Artificiell intelligens : Prestanda hos beteendeträd och Hierarchical Task Network
Detta arbete undersöker skillnader i tidseffektivitet mellan beteendeträd ochHierarchical Task Network. En enklare spelprototyp av typen top-down 2D shoot-emup implementerades. Spelprototypen använder två typer av autonom motspelare så kallade botar. En bot för beteendeträd och en bot för Hierarchical Task Network. Spelprototypen mäter körtiden för varje typ av bot i sex olika situationer.
Granskning och optimering av data- och IP-telefoninätverk
The company Västra Mälardalens Kommunalförbund, VMKF, wishes to revise and optimize their present data and IP-telephony network as of today consists of the three municipalities Köping, Arboga and Kungsör. As a municipal corporation, they seek consultation regarding internal as well as external review and investigation of the main structure of the network, its functionality and safety. By today?s increasing demands of Internet accessibility, availability of services and security far more extends the requirement of a complete network design. The foundation of networking rests on the balance between each of these necessities.
HAVECA-modellen : En metod för att fortlöpande säkra ett internt nätverk mot tredjepart
This thesis will address a problem concerning availability of information systems at an enterprise within the financial sector and its external suppliers, so called trusted third party. The information system resides on the internal network of the enterprise and must be available to both employees of the enterprise and the trusted third party simultaneously. This contradicts the company policy which disallows third parties access to the internal network. The HAVECA-model introduced in this thesis provides a framework of methods, each solving a sub problem identified in the model. The identified methods are hardening, verification, control and assurance, together supplying a method for continuously securing the internal network against a trusted third party.
Förtal på internet : en analys av det allmännas ansvar och den enskildes möjlighet till rättslig prövning
Because social media is personal and reaches users directly, it has become an important means of communication for companies trying to reach out to their audience (Nygren & Wadbring, 2013). Especially the possibility of interactivity has been discussed as social media's big advantage. But how much two-way communication is actually possible on social media? This is a quantitative study that focuses on how Swedish Facebook users in the ages of 16-25 interact with companies on the social network. The aim was to contribute with increased information and knowledge about how the users mentioned above interact with the companies as well as how the users perceive the companies communication and presence on Facebook.
Offer, aktör eller överlevare? : En diskursteoretisk analys av unga tjejers utsagor om att leva med sex som självskadebeteende
The purpose of this study is that through a discourse theoretical perspective, analyze young girls 'statements about living with self-injuring by sexual behavior. The aim is to locate the discourses that surround them, visualize how discursive constructions affect these young girls' identity as victims and/or actors in relation to self-injury, the sexual violence and in meetings with the professionals within the health authorities. In addition discourse theory as an analyze method, the authors also use Nils Christie's (2001) theory of the ideal victim and Ingrid Landers (2003) theoretical perspectives on normative femininity. The authors of the study show a diversity of discourses that surround the young girls. All discourses contain normative actor- and victim?s positions that young girls constantly are obliged to relate to, which partially conflict with social constructions of the idea of victim and femininity.
Jakten på en trygg oas i en torr öken : En studie om varför studententreprenörer väljer att delta i självorganiserade företagsnätverk
The aim of this study is to, by developing ideal types, describe why studententrepreneurs participate in self organised business network. The investigation is based on answers from 41 participants in the business network ?Företagare på Lnu?, as well astwo semi-focused groups, which where analysed by using Webers (1978) ideal types.The investigation shows that there are several reasons for student entrepreneurs to participate in self organised business network. For instance some people participate to gather knowledge from other student entrepreneurs for their own future, since they have an idea of soon starting their own business. Others participate just for the fun of knowing what?s going on at the university..
Access to the market - a question of collaboration?
When contemplating entering an alliance the rationale behind the decision should differdepending on the size of the companies involved as well as on other important factors. The importantfactors influencing the decision are related to the resource pooling potential of the alliance,the power structure along with the business network the companies are a part of. Theanalysis has shown proof of a need for cooperation if one wish to succeed in the telecommunicationindustry and it has also determined which resources that are deemed to be most important toget in touch with, for our study object, to facilitate its access to the market. Those resources aredefined as a direct channel to the customer, funds/capital and the access to relevant businessnetworks. To get in touch with these lacking resources, three alternative approaches has beenproposed; all of them involving a strategic alliance decision.