Sök:

Sökresultat:

6493 Uppsatser om Computer science - electronic security - Sida 25 av 433

"Jag ser det som ett smörgåsbord" : En studie om två olika läs- och skrivutvecklingsmetoder

In this study I have compared two different development methods of reading and writing. I have done this by interviewing five first grade teachers in elementary schools and it is based on qualitative research interviews. The aim of the study was to immerse myself in which methods these five teachers describe that they have used. They got to describe how they work and how they have tought the students to read and write. I have investigated if the teachers think that the computer is a good tool. The investigation also shows if the teachers believe that the students´ writing skills deteriorate if they can use the keyboard instead. I came to the conclusion that four of the teachers used Arne Trageton´s method (2005) which means that the students learn how to write by using to computer.

Framtagande av kravspecifikation för standardsystem

There are several methods and models within the areas of software engineering on how to proceed during a software development process. For each of these methods and models there are benefits and drawbacks, depending on how you choose to look at them. A difference of principle between the different models is that they either advocate iterative development or not. In parts of software engineering one makes use of different methods depending on which is most fitting in a specific situation. There are several methods on how to recieve more qualitative data from the end-users during the requirement collection, but the reappearing pattern is still user centric participation, which means that the user participates more actively in part of or the entire development process.

Säkerhetshot och lösningar för privatpersoner med bredband

As more and more people gain access to broadband in their properties, the security threats get bigger. A lot more people also have computers that they carry home from work where they store important information concerning the company. The information stored on theese computers can be very easy to retrieve if you have the will and the skill to do it. Very few people have any knowledge how to protect themselves from theese threats..

Kommunicera rätt! - En studie om kommunikation mellan systemutvecklare med kundkontakt och kund

Titel: Kommunicera rätt! ? En studie om kommunikation mellan systemutvecklare med kundkontakt och kund. Författare: Peter Johansson Oskar Hanson Handledare: Johanna Törnquist Examinator: Guohua Bai Problemområde: Anledningen till detta examensarbete är att problem som kan uppstå vid systemutvecklingsprojekt vanligtvis har sin grund i kommunikationen mellan systemutvecklare med kundkontakt och dess kunder. Exempelvis hör en systemutvecklingsgrupp och ett bageri till två vitt skilda yrkesområden och därmed pratar de ?olika språk?, vidare kan det skapas semantiskt brus i kommunikationskanalen som i slutändan kan leda till en felaktig kravspecifikation och de verkliga förändringsbehoven förblir oupptäckta. Hypotes: Examensarbetet baseras på hypotesen: ?Semantiskt brus[1] i kommunikationskanalen[2], otillräcklig negativ feedback[3] från sändare[4] och mottagare[5] och svårighet att hitta rätt nivå på samtalet med hjälp av kodning[6] och avkodning[7] ger upphov till en felaktig bild av kundens verkliga förändringsbehov[8] .? Slutsats: Alla delar ur Shannons kommunikationsmodell tillsammans med cybernetikens negativa feedback påverkar resultatet vid framtagande av kravspecifikation. Delar som både teori och respondenter tar upp är att som konsult måste denne ?kunna tala kundens språk?, hitta rätt nivå på samtalet, ge och ta negativ feedback samt undvika semantiskt brus i kommunikationskanalen.

Citeringsanalys och citeringsteorier: En kritisk granskning

The purpose of this Masters thesis is to make an outline of different methods and theories within the field of bibliometrics and critically review their strengths and weaknesses. The author studied literature that discussed bibliometric methods and theories. The number of empirical studies that are based on bibliometric methods and theories are numerous and where principally excluded, but some empirical studies were included as part of the argumentation for and against different methods and theories. The author first gives an outline of which methods and theories there are and describes their different strengths and weaknesses. Citation analysis has many different fields of application such as information retrieval, mapping science, evaluative studies and monitoring literature.

Energibolagens framtida datainsamling

The Swedish energy companies have several different systems for data collection of the energy consumption of their clients. Often computerized remote meter readers are put in practice in order to register the energy consumption of large companies. The majority of household clients, however, are read off by the assistance of manual methods. Household power consumption is read off once a year. As a result, these clients are not debited for their actual consumption; their invoices during the year are the result of estimations. At times when the electricity supply system is highly loaded, electricity is more expensive.

Privilegierad mobilitet? : Flygplatser, resande och säkerhet

Never before have so many moved so frequently as now. Mobility lies at the centre for the concern ofstates, business and technological development. Some even claim that we are witnessing a mobility turn inthe social sciences. However, as the capacity to move has increased so too has the control and surveillanceof mobility become more extensive. Since September 11, 2001 security has been the defining paradigm fora variety for actors.

Samverkan eller motverkan? En studie om myndighetssamverkans konsekvenser för rättssäkerheten och barnperspektivet

Children that are taken care of for institutional care by the social services are unprivileged as a group. When society takes over the parenting role, it forces local governments and other accountable authorities to guarantee these children satisfactory support and good care according to each child's needs. The aim of this thesis is to analyze and discuss problems with implementation in policy processes when authorities incorporate. From the normative standpoint of legal security and the United Nations Children's Convention, this thesis investigates the consequences of interaction between two Swedish supervisory authorities for the social services: Socialstyrelsen and länsstyrelserna. To fulfill the aim I will investigate the approach taken by the authorities and the work division between Socialstyrelsen and länsstyrelserna.

En jämförelse av krypteringsalgoritmer

Today the Internet is used more and more as a transportation for information. Much of the information is confidential and should not be read by those not privileged. To protect the information from unauthorized access cryptography can be applied. The cryptography algorithms in use today all have their pros and cons. They are therefore suited for different applications.

"Storebror" kommer till stan? En diskursanalytisk studie av debatten kring kameraövervakning av "Stråket" i Malmö

Social control in different forms has existed in all known societies. This control has taken different shapes and expressions. In older smaller communities there was a collective control among the citizens. In modern societies the state is trying to control the lives of the citizens. These control mechanisms can be seen as both freedom-reducing and freedom inducing depending on which concept of freedom one upholds.

Ansökan om körkortstillstånd via Internet

Länsstyrelsen i Stockholms län hade en projektidé som gick ut på att det skulle skapas en Internetbaserad ansökan för körkortstillstånd med behörighet B, inklusive hälsodeklaration. Även en optiker skulle kunna fylla i ett synundersökningsformulär via webben. Dessa skulle sedan knytas ihop för behandling av den Länsstyrelse där den sökande bor. Alla personer som skall använda tjänsten måste inneha ett personligt medborgarcertifikat som används för elektronisk signering av ansökan. Optikern behöver ett företagscertifikat för att identifiera sig. Vi utvecklade två interaktiva användargränssnitt samt ett gränssnitt där administratören kunde hantera all data som inkommit.

Programmeringsstruktur med dyslektiskt tänkande

During the period of this project I have programed a web site in php4, and also built the database in MySQL. The purpose with the projekt is to create a common web site for the various activities in the different churches located in the area of Örnsköldsvik. In my project I have chosen to try to find a structure of programming that fits my needs as a dyslexic. In the essay you can find a more thorough description of my procedure and the structure that I have chosen to use. .

Användbar användarmedverkan : Är användarmedverkan positivt för systemutvecklingsprocessen?

Computer use at work has risen considerably over the past fifteen years and is currently a relatively common phenomenon when 76 percent of women and 72 percent of men using the computer in their daily work (SCB Arbetsmiljörapport 2009).According to Gulliksen and Göransson (2009), Sweden is one of the countries which are more advanced in the procurement of computer systems at work. He means that Sweden has unique opportunities and conditions for user participation in the development of computer systems, when the user has the right to influence their working environment through a law in the Work Environment Act. The paper examines the importance of user involvement in system development and the Swedish company's approach and experience of user involvement. To highlight and explore the importance of user involvement, there has been a case study in which users have been representative of the development process. The case study has been conducted on a case company where the system IST analys was in need of a new interface.

Förklaringsmisstag : - i ett elektroniskt sammanhang

The thesis hears content-error in relation to agreements closed by electronic means. The purpose of the thesis is to elucidate how the rules in 32 §(1) AvtL apply to agreements closed by such means and to evaluate its suitability. The elucidation is done on the basis of, the rules? adequacy in relation to their objectives in collaboration with a comparative view on a selection of international legal framework under private law, such as DCFR, UNCITRAL Model Law, UNIDROIT Principles and CISG.Since Sweden lack a specific regulation for electronically closed agreements, all modern closing methods will be evaluated from the dated outlook of the Swedish Contract Act. In relation to entirely automated processes which results in the closing of an agreement, particular difficulty arise in correlation with prerequisites, which requires a human stance.

Automatisk mätning och detektering av röjande signaler

This master thesis has been performed at Sectra Communications AB in Linköping where they manufacture electronic encryption devices. In cryptology it is essential that an eavesdropper cannot find the plain text. To assure that a system is safe, all devices are thoroughly examined so that they don?t emit any secret information, so called Compromising Emanations (CE). This is done by comparing the secret signal with measured signals on the screen of an oscilloscope, a process that is very time consuming and furthermore, the risk of missing compromising emanations is high.

<- Föregående sida 25 Nästa sida ->