
Sökresultat:
6493 Uppsatser om Computer science - electronic security - Sida 2 av 433
Doktorander och e-böcker ? en användarundersökning
The purpose of this thesis is to study the usage of and attitudes towards electronic books among graduate and PhD students at Karlstad University. The main questions are: How do graduate and PhD students use electronic books? To what extent are electronic books used compared to printed books? To find the answers, a user study was carried out at Karlstad University library. The results show that a majority of the respondents are aware of the possibility to use electronic books but prefer to use printed ones if they have to choose. Many respondents also complained about difficulties reading a text on the computer screen.
Elektronisk signering ? Kommer användaracceptansen att påverkas inom 24-timmars myndigheten?
Utvecklingen av medborgare samt företags användande av Internet har ökat
dramatiskt under de senaste fem åren. Det ökande Internetanvändandet ledde till
att statskontoret 1999 fick i uppdrag av regeringen att ta fram olika förslag
samt underlag som skulle ligga till grund för begreppet 24-timmars myndigheten.
Tjänsten är beräknad att tas tillbruk i Sverige år 2005. 24-timmars myndigheten
kommer tillämpa ett antal olika säkerhetslösningar, därav elektronisk
signering. Denna utredning skall belysa hur stort inflytande säkerhetslösningen
elektronisk signering kommer att ha på användaracceptansen av denna tjänst.
Elektroniska tidskrifter - var, när, hur och i så fall varför?
An increasing number of scholarly publishers are beginning to make their journals available electronically. At the same time there is a growing amount of exclusively electronic journals freely accessible on the Internet. These are facts that librarians have to take into consideration.This master's thesis aims to describe the electronic journal and its role in Swedish academic libraries. In a review of current literature about electronic journals, the authors discuss their strengths and weaknesses, and their impact on scholars, publishers and libraries. To investigate the situation in Sweden, a questionnaire was sent out to 43 academic libraries.Questions were raised about the selection and acquisition of electronic journals, access, technology and economy.The results show that almost half of the 35 responding libraries offer electronic journals to their users.
IT-säkerhetspolicy ? efterlevs den av anställda?
ABSTRACT
The main purpose of IT security policies is to protect companies against
intrusion and unwanted spread of information. Statistics show that IT related
crimes tend to increase and because of that it is important, from the company?s
side of view, to be well prepared. The IT security policy is an important part
of that preparation.
A lot of the crimes related to IT can be deduced indirectly to employees at the
companies where the crime takes place.
Riskanalys inom intrångsäkerhet på webbplatser
Attacker och intrång på webbservrar är idag vanligt förekommande. Webben gör
det lätt för hackare, knäckare och andra inkräktare att hitta sårbara servrar,
och det finns gott om tips att hämta för den som vill lära sig hur man gör
intrång. Det finns ett flertal olika intrångsmetoder som utnyttjar olika typer
av svagheter i datorsystemen. Denna uppsats inriktar sig på svagheter i
webbplatsernas serverskriptsystem, dess skriptkod och konfiguration. Syftet är
att undersöka huruvida intrång kan göras med endast en webbläsare via
webbplatsens offentliga webbsidor.
Genom att kombinera tre olika metoder - litteraturundersökning, en enkät och
ett experiment - undersöker uppsatsen hur serverskriptintrång fungerar.
Skriftligt formkrav : det digitala dokumentet
This thesis seeks to investigate how an agreed written form requirement is met in an electronic environment. Swedish Contract law is applied since Sweden lack specific regulation for electronically closed agreements. Since contractual freedom prevails in Swedish law, it is up to the parties themselves to decide if the formal requirements to be applied.In order to assess whether the written requirement is fulfilled in the electronic environment, a purpose-oriented analysis should be made. When the purpose of why a written form requirement applies has been clarified, the analysis continues to assess whether the objective can be achieved with the modern form of communication. The method is called functional equivalence and means that when an electronic media fulfill the same functions as the paper medium so will the electronic medium as a starting point to give the same legal effect as if it were the case of a written paper document.
Utvärdering av Near Field Communication och Certified Wireless USB: Säkerhet vid utveckling av applikationer
Today?s society is one where technological advances are made daily, which
increases the need to stop and assess the risks against users? integrity when
integrating new technology in contemporary systems all the greater. We have
taken two technologies, Near Field Communication and Certified Wireless USB,
whose envisioned area of use is to be integrated into mobile phones, and
evaluated what security threats are revealed for the respective technologies.
The threats against security have been identified through research of the
standards and existing reports for each technology. Practical experiments have
not been conducted on account of us not having access to any equipment to run
such trials.
En guide till antivirusprogram - ett hjälpmedel för hemanvändare
Detta arbete handlar om antivirusprogram och vad det finns för hjälpmedel för
hemanvändare utan teknisk bakgrund att finna det antivirusprogram som passar
dem bäst. Målet med arbetet är att producera en guide för hemanvändare som ska
hjälpa dem inför deras val av
antivirusprogram.
I detta arbete har tre olika metoder använts för att besvara de frågor och den
hypotes som ställts. Först gjordes en litteraturstudie där bakgrundsmaterial
inhämtades. Nästa steg var att genomföra intervjuer med experter inom området
för att ta reda på vad guiden skulle innehålla. Som sista steg utfördes en
enkätundersökning som riktade sig till hemanvändare för att ta reda på om den
framtagna guiden besvarade hypotesen.
Webbdesign för iPhone
Detta kandidatarbete utgår ifrån vilka aspekter som är viktiga att tänka på när
man anpassar av en webbsida till en mobil enhet och de problem som uppstår när
en
webbsida skalas ner till en låg skärmupplösning. Vi har behandlat
användarvänlighet, designprinciper, grafiska element och tekniska aspekter för
att svara på problemformuleringen. Slutsatsen vi kommit fram till är ett antal
punkter inom områdena ovan..
Elektronisk identifiering vid 24-timmarsmyndighet - en fallstudie i Karlskrona kommun
Användningen av Internet och antalet nya tjänster ökar mer och mer. Internet är
ett öppet system och för att Internet i högre utsträckning skall kunna användas
även vid hantering av känslig information krävs bättre säkerhet.
Syftet med denna rapport är att utifrån Karlskrona kommuns säkerhetspolicy samt
medborgarnas åsikter om säkerhet, undersöka vilken eller vilka
säkerhetslösningar som lämpar sig bäst vid den planerade 24-timmarsmyndigheten.
I denna rapport undersöks vilken eller vilka av de alternativa
medborgarcertifikat som myndigheter får använda sig av. Målet är att komma fram
till en möjlig lösning för elektronisk identifiering inom den framtida,
24-timmarsmyndigheten inom Karlskrona kommun.
För att genomföra denna utredning har vi använt oss av intervjuer, enkäter och
litteraturstudier. Rapporten innehåller även bakgrundsfakta för att få en ökad
förståelsen av innehållet.
Vägen mot säkerhet - får alla gå med? En kritisk, feministisk analys av det traditionella säkerhetsbegreppet.
In this essay I analyze the concepts security and security policy from a critical, feministic point of view. The traditional way of thinking security is state-centred and narrow with its military oriented threatening pictures and solutions.I advocate that the two concepts need a more feministic and holistic approach to be able to cope with the threats of our time and include the security for women explicitly.To suggest how this can be done I introduce a model; security-sphere, which should be seen as a way to constructively connect my objections to the existing research with a new approach to security problems. The security-sphere is based on two analytical parts; the private security sub-sphere and the public security sub-sphere, in order to make new images of security problems visible.It is a fact that most of the threats against women specifically, take place in the private sphere where no traditional analytical tools reach in - these threats have not been seen as 'real' security problems. My aim is therefore to integrate these issues into the agenda of security policy..
Språkstöd i distanslaboratoriet på BTH
To study and laborate at distance, its necessary that the coursematerial is
accessible via internet.
Teaching at more languages than swedish bocomes more common,
why the information of courses needs to exist at several languages.
As teacher, you need a way to publish and edit material of a course. It also
has to be easy for the students to find the information. The distance
laboratory have developed an administrative websystem that handles programme,
courses and students, but misses the possibility for teachers to change content
at the webpages and publish new coursematerial on a way..
Kommunikation i multiagentsystem
Communication is an important part of any multi-agent system. There are
different ways of communicating and they have different effects on a
multi-agent system. This project describes and evaluates two different ways of
communication, implicit and explicit. To compare the two methods, two
experiments have been executed. The result of the experiments have been
compared and discussed.
Säkerhetsklassificering av IT-system på Fläkt Woods AB
This report presents a method for modelling a computer system from a security perspective. The questions that are going to be treated are:? What defines a secure system and how does the company relate to these factors?? What are the threats today based on hardware/software, human factors and company routines/policies?? What measures should be taken for the organisation to reach a higher level of security for their systems?? How do we develop a method for classification of security and what components should it contain?? What changes are reasonable and necessary with the respect to the company?s resources?The report has been done through interviews and analysis of existing systems on Fla?kt Woods AB. From analysis of material, the aspects judged relevant to the subject and to the company?s needs, have been compiled to a document.
Påverkan på elektronik och sensorer i radiologisk miljö
The objective of this thesis is to make a training material for KSU, which shows how radiation affects the different electronic components in a radiological environment.All electronic systems in the presence of high ionizing radiation can experience difficulties and be destroyed.This influence may compromise the control system and thus the safety of a nuclear reactor plant.To achieve this objective requires a description of electronic components and sensors, to better understand its function.This thesis will also show the possible solutions available that the author found interesting.Organizations such as NASA, CERN and ESA have worked to develop electronic components immune to radiation. Those organizations have also developed a test protocol that guarantees to a certain extent the security of electronic components in a radiological environment.Since we know how the material reacts with the radiation, it could develop a material that can be resistant to radiation or like CMOS technology has proposed, to reduce the component to avoid the storage of charge in the oxide.Another solution can be the GRAPHENE. Its features will revolutionize the electronics and provide answer to the radiation problems, Graphene will replace Silicium and the electronic components will only have a few nanometers dimensions so the oxide area also reduces, and in this way avoid the known problem of storage of charge..