
Sökresultat:
6493 Uppsatser om Computer science - electronic security - Sida 25 av 433
"Jag ser det som ett smörgåsbord" : En studie om två olika läs- och skrivutvecklingsmetoder
In this study I have compared two different development methods of reading and writing. I have done this by interviewing five first grade teachers in elementary schools and it is based on qualitative research interviews. The aim of the study was to immerse myself in which methods these five teachers describe that they have used. They got to describe how they work and how they have tought the students to read and write. I have investigated if the teachers think that the computer is a good tool. The investigation also shows if the teachers believe that the students´ writing skills deteriorate if they can use the keyboard instead. I came to the conclusion that four of the teachers used Arne Trageton´s method (2005) which means that the students learn how to write by using to computer.
Framtagande av kravspecifikation för standardsystem
There are several methods and models within the areas of software engineering
on how to proceed during a software development process. For each of these
methods and models there are benefits and drawbacks, depending on how you
choose to look at them. A difference of principle between the different models
is that they either advocate iterative development or not.
In parts of software engineering one makes use of different methods depending
on which is most fitting in a specific situation. There are several methods on
how to recieve more qualitative data from the end-users during the requirement
collection, but the reappearing pattern is still user centric participation,
which means that the user participates more actively in part of or the entire
development process.
Säkerhetshot och lösningar för privatpersoner med bredband
As more and more people gain access to broadband in their properties, the security threats get bigger. A lot more people also have computers that they carry home from work where they store important information concerning the company. The information stored on theese computers can be very easy to retrieve if you have the will and the skill to do it. Very few people have any knowledge how to protect themselves from theese threats..
Kommunicera rätt! - En studie om kommunikation mellan systemutvecklare med kundkontakt och kund
Titel:
Kommunicera rätt! ? En studie om kommunikation mellan systemutvecklare med
kundkontakt och kund.
Författare:
Peter Johansson
Oskar Hanson
Handledare:
Johanna Törnquist
Examinator:
Guohua Bai
Problemområde:
Anledningen till detta examensarbete är att problem som kan uppstå vid
systemutvecklingsprojekt vanligtvis har sin grund i kommunikationen mellan
systemutvecklare med kundkontakt och dess kunder. Exempelvis hör en
systemutvecklingsgrupp och ett bageri till två vitt skilda yrkesområden och
därmed pratar de ?olika språk?, vidare kan det skapas semantiskt brus i
kommunikationskanalen som i slutändan kan leda till en felaktig
kravspecifikation och de verkliga förändringsbehoven förblir oupptäckta.
Hypotes:
Examensarbetet baseras på hypotesen: ?Semantiskt brus[1] i
kommunikationskanalen[2], otillräcklig negativ feedback[3] från sändare[4] och
mottagare[5] och svårighet att hitta rätt nivå på samtalet med hjälp av
kodning[6] och avkodning[7] ger upphov till en felaktig bild av kundens
verkliga förändringsbehov[8] .?
Slutsats:
Alla delar ur Shannons kommunikationsmodell tillsammans med cybernetikens
negativa feedback påverkar resultatet vid framtagande av kravspecifikation.
Delar som både teori och respondenter tar upp är att som konsult måste denne
?kunna tala kundens språk?, hitta rätt nivå på samtalet, ge och ta negativ
feedback samt undvika semantiskt brus i kommunikationskanalen.
Citeringsanalys och citeringsteorier: En kritisk granskning
The purpose of this Masters thesis is to make an outline of different methods and theories within the field of bibliometrics and critically review their strengths and weaknesses. The author studied literature that discussed bibliometric methods and theories. The number of empirical studies that are based on bibliometric methods and theories are numerous and where principally excluded, but some empirical studies were included as part of the argumentation for and against different methods and theories. The author first gives an outline of which methods and theories there are and describes their different strengths and weaknesses. Citation analysis has many different fields of application such as information retrieval, mapping science, evaluative studies and monitoring literature.
Energibolagens framtida datainsamling
The Swedish energy companies have several different systems for data collection
of the energy consumption of their clients. Often computerized remote meter
readers are put in practice in order to register the energy consumption of
large companies. The majority of household clients, however, are read off by
the assistance of manual methods.
Household power consumption is read off once a year. As a result, these clients
are not debited for their actual consumption; their invoices during the year
are the result of estimations. At times when the electricity supply system is
highly loaded, electricity is more expensive.
Privilegierad mobilitet? : Flygplatser, resande och säkerhet
Never before have so many moved so frequently as now. Mobility lies at the centre for the concern ofstates, business and technological development. Some even claim that we are witnessing a mobility turn inthe social sciences. However, as the capacity to move has increased so too has the control and surveillanceof mobility become more extensive. Since September 11, 2001 security has been the defining paradigm fora variety for actors.
Samverkan eller motverkan? En studie om myndighetssamverkans konsekvenser för rättssäkerheten och barnperspektivet
Children that are taken care of for institutional care by the social services are unprivileged as a group. When society takes over the parenting role, it forces local governments and other accountable authorities to guarantee these children satisfactory support and good care according to each child's needs. The aim of this thesis is to analyze and discuss problems with implementation in policy processes when authorities incorporate. From the normative standpoint of legal security and the United Nations Children's Convention, this thesis investigates the consequences of interaction between two Swedish supervisory authorities for the social services: Socialstyrelsen and länsstyrelserna. To fulfill the aim I will investigate the approach taken by the authorities and the work division between Socialstyrelsen and länsstyrelserna.
En jämförelse av krypteringsalgoritmer
Today the Internet is used more and more as a transportation for information. Much of the information is confidential and should not be read by those not privileged. To protect the information from unauthorized access cryptography can be applied. The cryptography algorithms in use today all have their pros and cons. They are therefore suited for different applications.
"Storebror" kommer till stan? En diskursanalytisk studie av debatten kring kameraövervakning av "Stråket" i Malmö
Social control in different forms has existed in all known societies. This control has taken different shapes and expressions. In older smaller communities there was a collective control among the citizens. In modern societies the state is trying to control the lives of the citizens. These control mechanisms can be seen as both freedom-reducing and freedom inducing depending on which concept of freedom one upholds.
Ansökan om körkortstillstånd via Internet
Länsstyrelsen i Stockholms län hade en projektidé som gick ut på att det skulle
skapas en Internetbaserad ansökan för körkortstillstånd med behörighet B,
inklusive hälsodeklaration. Även en optiker skulle kunna fylla i ett
synundersökningsformulär via webben. Dessa skulle sedan knytas ihop för
behandling av den Länsstyrelse där den sökande bor. Alla personer som skall
använda tjänsten måste inneha ett personligt medborgarcertifikat som används
för elektronisk signering av ansökan. Optikern behöver ett företagscertifikat
för att identifiera sig.
Vi utvecklade två interaktiva användargränssnitt samt ett gränssnitt där
administratören kunde hantera all data som inkommit.
Programmeringsstruktur med dyslektiskt tänkande
During the period of this project I have programed a web site in php4, and also
built the database in MySQL. The purpose with the projekt is to create a common
web site for the various activities in the different churches located in the
area of Örnsköldsvik.
In my project I have chosen to try to find a structure of programming that fits
my needs as a dyslexic. In the essay you can find a more thorough description
of my procedure and the structure that I have chosen to use. .
Användbar användarmedverkan : Är användarmedverkan positivt för systemutvecklingsprocessen?
Computer use at work has risen considerably over the past fifteen years and is currently a relatively common phenomenon when 76 percent of women and 72 percent of men using the computer in their daily work (SCB Arbetsmiljörapport 2009).According to Gulliksen and Göransson (2009), Sweden is one of the countries which are more advanced in the procurement of computer systems at work. He means that Sweden has unique opportunities and conditions for user participation in the development of computer systems, when the user has the right to influence their working environment through a law in the Work Environment Act. The paper examines the importance of user involvement in system development and the Swedish company's approach and experience of user involvement. To highlight and explore the importance of user involvement, there has been a case study in which users have been representative of the development process. The case study has been conducted on a case company where the system IST analys was in need of a new interface.
Förklaringsmisstag : - i ett elektroniskt sammanhang
The thesis hears content-error in relation to agreements closed by electronic means. The purpose of the thesis is to elucidate how the rules in 32 §(1) AvtL apply to agreements closed by such means and to evaluate its suitability. The elucidation is done on the basis of, the rules? adequacy in relation to their objectives in collaboration with a comparative view on a selection of international legal framework under private law, such as DCFR, UNCITRAL Model Law, UNIDROIT Principles and CISG.Since Sweden lack a specific regulation for electronically closed agreements, all modern closing methods will be evaluated from the dated outlook of the Swedish Contract Act. In relation to entirely automated processes which results in the closing of an agreement, particular difficulty arise in correlation with prerequisites, which requires a human stance.
Automatisk mätning och detektering av röjande signaler
This master thesis has been performed at Sectra Communications AB in Linköping where they manufacture electronic encryption devices. In cryptology it is essential that an eavesdropper cannot find the plain text. To assure that a system is safe, all devices are thoroughly examined so that they don?t emit any secret information, so called Compromising Emanations (CE). This is done by comparing the secret signal with measured signals on the screen of an oscilloscope, a process that is very time consuming and furthermore, the risk of missing compromising emanations is high.