Sökresultat:
1509 Uppsatser om Computer crime - Sida 12 av 101
Buss eller spårvagn? Framtida kollektivtrafikförsörjning av området mellan Kungssten, Frölunda torg och Saltholmen i Göteborg
Today more effective computer programs are in use, regarding design of geotechnicalconstructions. There is a risk that the theoretical background of the computerprograms, its limitations and the signification of the choice of soil parameter isforgotten when the computer programs become more user-friendly.This Master thesis deals with simulation and analysis regarding three computerprograms, FEM-design, with the addition Raft, Plaxis and BE-slab. Comparisons aremade for settlement and maximum moment in a concrete-plate. FEM-design is a threedimensional FEM-program, foremost created for design engineers. Plaxis is a twodimensional FEM-program, intended for geotechnical engineers while BE-Slab is aBoundary elements program in two dimensions that is mainly used by designengineers.
Trafiksäkra vägar genom god vägutformning baserat på kunskap om det mänskliga beteendet - en utvärdering av metoden IST-Checklist 2005
Today more effective computer programs are in use, regarding design of geotechnicalconstructions. There is a risk that the theoretical background of the computerprograms, its limitations and the signification of the choice of soil parameter isforgotten when the computer programs become more user-friendly.This Master thesis deals with simulation and analysis regarding three computerprograms, FEM-design, with the addition Raft, Plaxis and BE-slab. Comparisons aremade for settlement and maximum moment in a concrete-plate. FEM-design is a threedimensional FEM-program, foremost created for design engineers. Plaxis is a twodimensional FEM-program, intended for geotechnical engineers while BE-Slab is aBoundary elements program in two dimensions that is mainly used by designengineers.
Samband mellan trafikolyckor och väggeometri. En analys av kopplade olycks- och vägdata för större vägar i Region Väst
Today more effective computer programs are in use, regarding design of geotechnicalconstructions. There is a risk that the theoretical background of the computerprograms, its limitations and the signification of the choice of soil parameter isforgotten when the computer programs become more user-friendly.This Master thesis deals with simulation and analysis regarding three computerprograms, FEM-design, with the addition Raft, Plaxis and BE-slab. Comparisons aremade for settlement and maximum moment in a concrete-plate. FEM-design is a threedimensional FEM-program, foremost created for design engineers. Plaxis is a twodimensional FEM-program, intended for geotechnical engineers while BE-Slab is aBoundary elements program in two dimensions that is mainly used by designengineers.
HAVECA-modellen - En metod för att fortlöpande säkra ett internt nätverk mot tredjepart
This thesis will address a problem concerning availability of information
systems at an enterprise within the financial sector and its external
suppliers, so called trusted third party. The information system resides on the
internal network of the enterprise and must be available to both employees of
the enterprise and the trusted third party simultaneously. This contradicts the
company policy which
disallows third parties access to the internal network. The HAVECA-model
introduced in this thesis provides a framework of methods, each solving a sub
problem identified in the model. The identified methods are hardening,
verification, control and assurance, together supplying a method for
continuously securing the internal network against a trusted third party.
En undersökning i datasäkerhet för hemanvändare - Är det nödvändigt att använda brandvägg?
The emphasize of this study is to evaluate security issues for home users
having a personal computer connected to the Internet. It focus on the usage of
advantages and disadvantages when using a firewall while connected to the
Internet.
The hypothesis is that it gives a better protection to install and use a
firewall compared not to do so, due to security flaws in the operating system.
The prediction was tested on a home user's personal computer. The testwork was
divided into two major tests, each of them performed with, respectively
without, a firewall. These major tests were divided into five smaller semi
tests. The first semitest without a firewall suffered from a virus or worm
attack resulting in loss of data and log files.
Media and the priming of stereotypes : Direct effect of news articles racial stereotypes on individuals judgements of people of foreign extraction.
The present research examined both automatic and controlled processes in newpapers ability of priming racial stereotypes via the portrayals of people of foreign extraction. The automatic process were examined through articles which; a) involved an illegal act or b) the act was not illegal but morally questionable. Swedish-born subject?s explicit opinions against foreign people were also measured through ?The Modern Racial Prejudice Scale?. In the experiment participants read four different articles which included; Swedish person/noncrime, foreign person/noncrime, Swedish person/crime and foreign person/crime.
Företags investeringsutgifter för datorprogram : en inkomstskatterättslig analys
The legal situation of companies costs for investing in computer software in an income tax law perspective is described by a tax law guidance that generelly acount these costs according the principles of research and development. If there is any reason to classify the costs differently, it could mean that immediate deduction not will be allowed. For this reason it is important to establish what the legal situation would be in a more nuanced tax law classification. The tax law categories that will be analysed in the thesis are research and development, inventories, intangible assets, stocks and ongoing projects. The purpose of this thesis is mainly to give examples of what such an income tax law classification can look like.While dealing with the problems of classifying the costs some situations of competition will occure.
Bluetooth and security
Detta arbete behandlar hur Bluetooth fungerar samt säkerheten kring Bluetooth
och några allmänt tillgängliga attack verktyg.
Syftet med uppsatsen är att försöka fastställa hur säkert Bluetooth är i dagens
läge. Bluetooth har länge varit tillgängligt för att utbyta data över korta
avstånd. Därför har man valt att implementera det i kommunikationsenheter som
mobiltelefoner och laptops med mera. Det har funnits en debatt om hur säkert
Bluetooth är. För att kunna genomföra denna undersökning så har vi satt oss in
i hur Bluetooth fungerar, vilka allmänt tillgängliga attacker och
implementationer av dessa, som finns.
Internetbaserade insamling och behandling av data
AbstractAim of this project was to analyse signals and try to localize the position of source of sound. It is donewith three microphones which have 90 degrees angle to each other. Each microphone detects one partof the sound wave. The microphones are connected toan ADC which turns signals from analogue todigital shape. After that the three signals are transformed to a computer.
Säkerhetshot och lösningar för privatpersoner med bredband
As more and more people gain access to broadband in their properties, the
security threats get bigger. A lot more people also have computers that they
carry home from work where they store important information concerning the
company. The information stored on theese computers can be very easy to
retrieve if you have the will and the skill to do it. Very few people have any
knowledge how to protect themselves from theese threats..
Mutor och bestickning - vad säger lagen, vad säger moralen?
What is a bribe? Sweden has a strict legal provision in how to handle crimes of corruption in comparison to the rest of the world. In spite of the strict law companies seem to have problems understanding the differences between what is legal and what is illegal. Bribery and corruption are not only counter-acted within the law but are also a frowned upon socially and morally. The common thought is that to accept a bribe is more corrupt than to offer one.
Forumkonkurrens. Prövning av folkmord inför ICJ och ICTY
The conflict in the former Yugoslavia was characterised by extensive war crimes committed by all parties in the conflict. Two international courts, The International Court of Justice and the International Criminal Tribunal for the Former Yugoslavia, have both judged if a genocide was committed in this conflict. This paper examines how these two courts relates to each other concerning their legal judgement of the crime of genocide. Two cases are analysed; the judgement of Radislav Krstic´ at the ICTY and the case Bosnia and Hercegovina v. Serbia and Montenegro at the ICJ.
Tensor representation of 3D structures
This is a thesis written for a master's degree at the Computer Vision Laboratory, University of Linköping. An abstract outer product is defined and used as a bridge to reach 2:nd and 4:th order tensors. Some applications of these in geometric analysis of range data are discussed and illustrated. In idealized setups, simple geometric objects, like spheres or polygons, are successfully detected. Finally, the generalization to n:th order tensors for storing and analysing geometric information is discussed..
Den dubbla avvikaren : En kvalitativ studie om frivårdsinspektörers konstruktioner av kvinnor som begår brott
The purpose of this study has been to examine how female probation officers construct the concept of women who commit crime. This have been done by examining how the probation officers describe the phenomenon from their own point of view, how they perceive society's view of the phenomenon, how they describe the women's self-images and how their own perceptions affect the treatment of these women. To fulfill this aim the study is based on qualitative interviews with five female probation officers. We analyzed their statements by using Gender theory, Goffmans stigma term and Beckers deviant term. The result of this study shows that women who commit crime are described more as victims than offenders and that they are constructed as deviant in two ways; both in relation to the law but also in relation to their gender.
Våldets olika ansikten : En gärningsanalys av våldsbrott utifrån gärningsmannens relation till offret
Violent crime can traditionally be classified as a reactive or an instrumental aggression. A reactive aggression is often characterized by some sort of provocation by the victim and the act is impulsive and the offender reacts by harming the victim. The provocation can be a threat, an insult or an attack and the act can be said to be a reaction induced by emotions. An instrumental act of violence however, often described as planned, targeted and emotional cold. The goal of the act can be to acquire money or power to maintain their status.