Sök:

Sökresultat:

1219 Uppsatser om Computer intrusion - Sida 12 av 82

Digital Materia

Med tankar från pedagogen Montessori och filosoferna Platon och Baudrillard har detta arbete behandlat frågor om datorn och dess betydelse för en grafiker. Frågeställningen formulerades efter hand och lydde tillslut: ?Hur kan materia te sig i digital form?? Forskningen resulterade i en hypotes för hur digital materia skulle födas i datorn: genom att blanda två uppsättningar av data, såsom två genuppsättningar tillsammans skapar en ny organism. Under produktionen utvecklades därmed en metod för hur en grafiker ska kunna skapa tillsammans med en dator. Syftet är att ge andra grafiker ett nytt sätt att se på digital grafik.

När spelen blev farliga: konstruktionen av dataspel som ett socialt problem i svensk press 2000-2006

This essay focuses on the construction of so called "computer game addiction" or "computer game abuse" in the Swedish press during 2000-2006. During this period computer game addiction went from an obscure phenomenon to a legit reason for the involuntary commitment of a fourteen-year-old.The study's theory is based on several social constructionist ideas. Kitsuse and Spector's theories about constructing social problems as claims-making activities are used for understanding the actions of the individual and groups involved. Hewitt and Hall's article about quasi-theory is used to explain the construction of explainations for the new social phenomenon. Blumer's five-stage model is used for categorizing the construction of the new social problem.

Förstår du vad jag menar? - En undersökning om kommunikation med hjälp av bilder mellan användare och systemutvecklare.

Ibland kan det förkomma problem mellan utvecklare och kund/användare då de tar fram kraven till ett nytt system. En anledning till detta kan vara att utvecklingsgruppen och användargruppen inte har samma kunskaper och erfarenheter och talar då inte "samma språk". En lösning till detta problem kan vara att ta hjälp av en mockup. En mockup är en fysisk och/eller interaktiv modell av ett gränssnitt. I detta arbete har vi, med hjälp av intervjuer och observationer, undersökt om detta hjälpmedel underlättar kommunikationen i verkligheten..

DATORSTÖD FÖR ARBETE : KONSEKVENSER FÖR VAL AV AFFÄRSSYSTEM En studie av en service- och supportavdelning

This report is focusing on problems with introducing standard enterprise resource planning systems (ERP) in businesses. A study has been carried out on a service and support department at a Swedish heat metering company, SVM North Node. The study aims to help the company become a better customer in choice and customization of a new ERP system. We make a description of the department studied and the work carried out there, on the basis of learning, knowledge and cooperation. As a final point we present some ideas on how computer systems could support their work, hoping that this will result in them making adequate demands on a new ERP system..

World of Warcraft : En virtuellt social värld

In today?s modern society with high-speed connections covering the globe people are more than ever finding themselves gazing into the cold lights of the computer screen. On the other side a strange and exciting world yet to be explored awaits. Many are those who spend hour after hour running over green hills swimming in vast blue oceans in the lands of Azeroth, the playfield in the MMORPG game World of Warcraft. In media we often read and hear alarming reports on players stuck in this virtual world, ceasing to play a part in the real world.

M?ns r?tt till skydd av privatliv mot kvinnors r?tt till skydd mot v?ld - Kampen om skyddet

The purpose of the essay is to investigate how the position of women and girls in society can lead to a valid infringement of the right to privacy (art. 8 ECHR) by allowing the storage of personal data belonging to people who have not been convicted of a crime. The essay uses the traditional legal method to determine the applicable law, but is also grounded in a feminist approach in order to enable an interaction between jurisprudence and societal phenomena. The essay revolves around Directive 2016/680 and relevant case law in order to analyze the set requirements to enable an infringement of the right to privacy. In order to be able to analyze whether the requirements can be met based on the need to prevent men?s violence against women and girls, the essay will also describe the life situations of women and girls in society. The essay argues that the conditions at hand fall under art.

Persona : En metod att utveckla och införa persona i en organisation

AbstractIn this thesis we aim to extend the current theories about a concept called persona. A persona is a model of a user, mostly based on qualitative research and made with such accuracy that it to some extent can be used as a replacement of a real user in a development process and as a communicative tool. We will present a way of constructing this persona without meeting the actual users and follow up with interviews from the organization using them. This will lead to a model over the process of introducing personas as a concept in an organization,previously not familiar with the concept. The model is adapted to also work for projects and organizations where the concept is already known..

Persuasiva spel: Ett medium med spännande möjligheter : Procedurell retorik i två svenska opinionsbildande datorspel

This essay is about the principles and rules that control persuasive computer games. The term persuasive games mean computer games, video games and other similar artifacts that are produced to shape opinion. The rhetorical scholar Ian Bogost at Georgia Tech claims that this kind of games mainly get their persuasive power by using procedural rhetoric and that games as a medium gives special conditions for procedurality.  By procedural rhetoric Bogost means an argumentation that is based on rules and choices, as opposed to texts, movies and images. (Bogost 2007). Bogost describes these procedures as quite specific for games and claims that they differ qualitatively from ?ordinary? rhetorical arguments even if they just as other arguments work by establishing enthymems.

Säkerhet och integritet i närfältskommunikation

Context. In today?s society we use smart cards in many areas, NFC is a smart card technology that allows contactless interaction between a reader and the tag, the tag is often in the form of a card. NFC can be used for various payment methods or as access card to a building which makes life easier. In previous studies, the technique has proven to be weak to attacks using an NFC reader connected to a computer.

Flödeslogistik vid Laponia Hotel

The aim of this report is to analyse the logistics of a medium sized restaurant and give an overall solution for improvements on the restaurant's logistics. The restaurant of interest belongs to Laponia Hotel and is located in Arvidsjaur, Sweden. Investments for over 100.000 Euros are planned for the hotel, which includes a reconstruction of the restaurant. The details on how the restaurant will be reconstructed are not yet known. I therefore chose to analyse the problemin general terms and find a solution that is focused on the logistic system itself rather than its layout.

Språklig utveckling : Pedagogers arbete med språklig medvetenhet och språklig stimulering

The aim of my study is to investigate if and in that case how the writing process and texts written by students in the upper secondary school are affected by the writing tool; does it matter if they write their texts on a computer or by longhand? Another objective is to compare such an effect with the findings of previous studies performed on earlier generations of writers. The first part of my study was a survey. It showed that two thirds of the 67 students participating thought that they would have written better texts in the national writing test if they had been able to use computers. In the second part of the study each of the fourteen participants wrote one text on computer and another by hand.

Mobilt internet för skogsbruket med CDMA2000 i450 MHz - bandet :

Improved wireless datacommunication with the forest machines might be the next big step in the logging process. The use for wireless communicationsystems within the forestry is among other things to report the production from the forest machines, to supply the machine opera-tors with the right information and for safety. CDMA2000/ 450 is a third generation mobilecommunicationsystem which could replace the old NMT- 450 and for comparatively low costs. The reason for the low costs is that you only have to use the old NMT- 450 masts and supply them with new equipment. In the test of CDMA2000/450, that has taken place in northern Uppland, two kind of files have been sent.

Webbaserad informationskanal vid stamrenoveringsprojekt : Ett verktyg för informationsflöde från entreprenör till boende?

Pipe replacements with bathroom renovations are complex construction projectshighly dependent on the construction work carried out in the residents? homes whilethe residents still live there. This fact makes the flow of information from contractorsto the residents of an important success factor. In the current situation thecontractor, Aros Bygg & Förvaltning AB, notifies the residents? information throughpaper notification, which gives managing the work involves a lot of paper work.This thesis examines whether and to what extent the contractor may replace thepaper notification with a web-based information channel.

Möjligheter och begränsningar i molnet

Idag väljer många företag och kommuner att placera data i molnet istället för på en lokal server, detta medför nya problem som tidigare inte varit aktuella. Datainspektionen har påpekat brister i hur två kommuner använder molntjänster för att lagra personlig data då de ställer sig tveksamma till molnleverantörernas hantering av data samt insynen till molnleverantörerena. I detta arbete kommer det undersökas hur den svenska personuppgiftslagen fungerar när data läggs ut i en molntjänst. Resultatet av uppsatsen kommer även visa på de olika säkerhetshoten som finns i molnet och se vad säkerhetsexperter säger för att ta reda på om kommuner och företag är medvetna om och uppmärksammar samma hot. För att ta reda på detta har intervjuer genomförts med en svensk molnleverantör, företag som utvecklar tjänster mot molnet, privatpersoner som nyttjar molnet och experter inom säkerhet från Blekinge Tekniska Högskola, BTH. Resultatet av studien visar att det är svårt att se om en amerikansk leverantör uppfyller de svenska lagarna för personuppgifter, det visar också att det är teoretiskt möjligt att anlita en svensk leverantör och uppfylla lagen. Det har även visat sig att den största oron gällande molnet är bristen på kontroll av data..

Mer kreativitet med fler patent? En textanalys av förslaget till nytt EU-direktiv Patenterbarhet för datorrelaterade uppfinningar och anslutande dokument.

In February 2002 the European commission put forward a proposal for a new directive on The patentability of computer-implemented inventions, but which during my work on this essay has not been decided on yet. The directive has divided the decision-makers in the union, the commission and parliament, into two different positions regarding by which range computer-implemented inventions should be patentable. The parliament has amended the commissions proposal in a substantial way and the legal process has caused a heated debate both within the unions administration and among various interest groups both in favour of and against a patent on computer-implemented inventions. The loudest protests have come from a group that feels threatened by a possible software patent: Open Source. In this study I examine both the arguments by the decision-makers and by the lobbying for and against the proposal.

<- Föregående sida 12 Nästa sida ->