
Sökresultat:
6493 Uppsatser om Computer science - electronic security - Sida 17 av 433
Trådlösa nätverk
This report describes what wireless local area networks are and the use and configuration of them. These WLAN as they also are called can be used both in new installations and expansion of existing networks. Further on this report reveals security in this area. Security is incredible important in all networks not at least wireless because you don?t have to be in the environment physically to get the information, you only have to be in the coverage area that can be several hundred meters.
Flygvapnets Transformation : Fallstudie i flygutbildningens omtvistade placering
The transformation among armed forces in Europe is a consequence due to shifted security perspective and the growth of international security actors, such as NATO and the EU. Sweden has played an active role in EU to ensure its influence in forming the security policy for the organisation. Some studies mean it´s because of Sweden?s interest in strengthen EUs roll as a security actor they transformed their own armed forces to be able to take part in international operations. This transformation led to what can be called ?the Swedish defence dismantle? and some studies mean that it has led to the point where Sweden completely lacks the ability to defence themselves.The question is if the ambition to become an active member in these security organisations can explain all the decisions made throughout the Swedish defence-transformation, or if some decisions were made due to other factors?By studying the decision process leading up to the decision to locate the flight education to Malmen in Linköping this study seeks to answer why the decision was made.
How do intrinsic and extrinsic motivation correlate with each other in open source software development?
Open source is growing outside the boundaries of hackers, amateurs and software
development, creating a humongous potential in many different areas and aspects
of society. The intrinsic and extrinsic motivations that drives open source
have been in the subject of much research recently, but how they affect each
other when paid and unpaid contributors come together is still hidden in
obscurity. In this study I investigate how intrinsic and extrinsic motivation
correlates with each other and how those correlations affect paid and unpaid
open source software contributors. The literature synthesis is based on of
systematic reviews through searches in library databases, identification of
articles by searching on the Internet and by reading relevant books. My results
indicate that intrinsic and extrinsic motivations continuously affect each
other and that paid contributors are more vulnerable since their extrinsic
motivation in terms of money is reached only when many other motivations are
fulfilled.
Ett plus ett blir två : Introduktion av likhetstecknet i förskoleklass och årskurs 1
Today there is a shortage of skilled IT-technicians in Sweden. It is approximated that Swedish companies can hire 31 000 IT-technicians in 2015 and the need seems to increase in the coming years. One proposed solution to this problem is to make programming more desirable to youths. In this study we attempt to investigate the effects of an introductory course in computer science on youths? (16-17 years old) in a classroom setting.
ELF-EAR, Teknik i Levande Rollspel
Vårt mål är att förhöja deltagarnas upplevelse i levande rollspel (även kallat
lajv). Idag finns det inga möjligheter att visualisera övernaturliga förmågor.
I den här rapporten visar vi ett exempel på hur detta kan realiseras med hjälp
av teknik. Vi har inriktat oss på att simulera alvers övernaturliga hörsel.
Levande rollspel är mycket känsligt för störningar från ?världen utanför?,
exempelvis modern teknik och språk.
Riktlinjer för implementering av ISO 17799
An ongoing concern within the Intellectual Technological world is the issue of security. There are severe consequences if someone without permission searches a computer for secret information that was left unlocked. In order to prevent this situation from occurring, rules about password lengths or employees bringing personal flash drives into the company should be created and followed.As Internet become a worldwide phenomenon, the use of information technology is growing more than ever. With more use and accessibility to Internet, new threats against companies have also emerged. This report brings up the main issues that a company needs to regulate today.The standard for regulations and proposals for IT-security comes in a document called ISO 17799 and very complicated for those who are not experts in the field.
En studie i användbarhet: En kritisk analys av användbarhetsstudier i biblioteks- och informationsvetenskap
Usability studies are not a central field of research in library and information science. Although literature in library and information science treats the importance of usable user interfaces quite extensively, the literature does not significantly treat potential problems in measuring usability. The aim of this master thesis is to investigate, through a critical analysis, the methods used when conducting usability studies in library and information science. The critical analysis is based on potential problems in measuring usability identified through a literature review from the field of studies Human-Computer Interaction, the concept of usabilitys original domain. The material which is to be analysed, is chosen from one library and information science journal Journal of the American Society for Information Science and Technology.
Ungdomars motivation till att lära sig programmering genom introduktionskurser
Today there is a shortage of skilled IT-technicians in Sweden. It is approximated that Swedish companies can hire 31 000 IT-technicians in 2015 and the need seems to increase in the coming years. One proposed solution to this problem is to make programming more desirable to youths. In this study we attempt to investigate the effects of an introductory course in computer science on youths? (16-17 years old) in a classroom setting.
Möjligheternas land? En kvalitativ studie om ensamkommande barns upplevelser av att leva i Sverige
This study concerns unaccompanied refugee children and their experiences of living in Sweden and also their thoughts about identity and security. The aim of this study was to find a deeper understanding of these children?s situation. We formulated three research questions in order to obtain this deeper understanding:? What experiences do the informants have of living in Sweden?? What are the informants? views of their identity in their new life situation?? What is security to the informants?This is a qualitative study based on six semi-structured interviews with six youths whom have come to Sweden as unaccompanied refugee children.
Ser ni mer än bara min kropp? -Patienters upplevelser av trygghet under operation
ABSTRACTIntroduction: An increasing number of patients undergo surgery under local anesthesia and are thereforeawake during the procedure. Nursing care that is provided to these patients can differ from those thatreceive general anesthesia. Previous research has focused on patients? general experiences of being awakeintraoperative. But there is no research that focuses on patients perceptions of security.
Lika makter leka lika? Sanktioner eller dialog, varför skiljer sig USA respektive EU handlingsplaner från varandra angående Irans kärnvapen?
In this thesis I will discuss how US respectively EU general international security policies are formed with the scientific theories Rational Choice and Cognitive theory in mind. I?ll discuss how come US tends to go towards a more sanction orientated strategy while European Union seems to prefer a dialog and diplomatic problem solving strategy. I?ll exemplify respective security strategy through the qualitative cases study of Iran and analyse why they have taken different cores of action while trying to solve the problem with Iran's alleged nuclear weapon.
Att mötas under en övervakningskamera - En studie av Malmö stads trygghetsarbete
This essay is about security and safety in the city. More precisely it is concerned about the role of the institutions that aims to raise the perceived security and safety and their understanding of these concepts. I study two of the municipality's project in this field in the city of Malmö. Documents concerning these projects are analysed with a discourse analysis inspired by Chantal Mouffe and Ernesto Laclau as well as Michel Foucault. The two projects consist of one discourse each; the surveillance discourse and the discourse about meetings.
Karakterisering av bioslam för modellering av biogasproduktion
The report aims to investigate how well a certain type of affordable embedded single board computer can hold up against today's more expensive computers in a computer system by doing various tests on a system with the specified requirements. The system has a Raspberry Pi as the single board computer which task is to control a camera based on coordinates obtained from a server as well as capture and stream a video signal on a network.The researches were conducted to check how much network traffic a single-chip computer sent in different video formats and how much CPU utilization was required. Studies were also made to ensure the accuracy of the camera control. The researches have been experimental, where several tests have been performed and analyzed.The results show that a sufficiently good accuracy can be obtained from the camera steering unit, in which two different servos have been investigated. When the video format MJPEG and H.264 are used, the single-chip computer is able to transmit a video signal up to 1280x720 at 15 fps.
Mätning av besökares ljudtrycksdos under musikfestival
Folkets Hus och Parker gav under våren 2008 en förfrågan om att under sommaren
uppmäta den ljudtrycksdos en normal festivaldeltagare tillskansar sig under ett
festivalbesök. De mätningar som genomfördes skedde på tre olika festivaler,
Hultsfredsfestivalen, Peace & Love och Storsjöyran. Mätningarna skulle ske över
hela festivalbesöket och inte endast innefatta mätningar av konserter, för att
kunna ge en rättvisare bild av den ljudtrycksdos som en person kan tänkas
utsättas för under en festival. De två av Socialstyrelsen uppsatta gränsvärdena
som ska följas är att evenemanget ska hålla sig under ett medelvärde på max 100
dB(A)LEQ och dess toppvärde får vara högst 115 dB(A). I överlag kunde vi se att
ljudnivåerna hölls relativt bra inom riktvärdena på de tre festivalerna.
Irans anrikning av uran - Analys av aktörer och säkerhetiseringsprocesser
This theory consuming thesis is concerned with why Iran's uranium enrichment has become a security issue, and will focus on the five most important and involved actors: China, Russia, Iran, the US and the UN. I will do this by using instruments of analysis such as securitization and strategic analysis. With these instruments I will examine different factors, such as deterrence, the action-reaction model and armament. Since, according to my opinion, security matters include more sectors than military I will also examine the political, societal and economic sectors. China and Russia have acted differently compared to the US in this matter and this thesis will highlight the factors that can explain the different actions made by these countries.