Sök:

Sökresultat:

6493 Uppsatser om Computer science - electronic security - Sida 3 av 433

Analys, design och implementering av Orbit ones dokumenthanteringssystem

This report describes the development of a system for controlling documents. The report starts with a problem description which the company wants an intranet-based solution for. The report then continues to describe the development phase for the different parts of the system which results in a complete system. The company that wanted this system is called Orbit One and is located in Ronneby, Sweden. They have had a problem with old documents circulating in different versions and in different binders. Now thanks to their new system they can access their documents easy and on demand through their intranet..

En undersökning i datasäkerhet för hemanvändare : Är det nödvändigt att använda brandvägg?

The emphasize of this study is to evaluate security issues for home users having a personal computer connected to the Internet. It focus on the usage of advantages and disadvantages when using a firewall while connected to the Internet. The hypothesis is that it gives a better protection to install and use a firewall compared not to do so, due to security flaws in the operating system. The prediction was tested on a home user's personal computer. The testwork was divided into two major tests, each of them performed with, respectively without, a firewall.

Datasäkerhet för hemdatorer. Brandväggar för privatpersoner.

I arbetet med denna uppsats, har vi undersökt om brandväggar håller vad de lovar och om de i så fall ger full datasäkerhet. Vårt syfte är att, ur hemmaanvändarens perspektiv undersöka vad datasäkerhet innebär, hur hotbilden vid Internet-användning i hemmet ser ut och vad personliga brandväggar kan erbjuda för skydd. För att ta reda på detta gjorde vi följande frågeställningar: Vad är/innebär datasäkerhet? Vad skyddar en brandvägg mot? Vad skyddar brandväggen inte mot? För att besvara våra frågor har vi använt oss av tre metoder; litteraturstudie, test av tre stycken brandväggar och intervjuer med två personer med kunskaper inom datasäkerhet. Vi har med hjälp av metoderna kommit fram till att beroende på att en av de tre undersökta brandväggarna släppte igenom en trojan, trots att denna brandvägg sade sig stoppa sådana, så håller inte alla brandväggar vad de lovar. På grund av många användares omedvetenhet om farorna eller brist på insikt om sin egen utsatthet men även på grund av att hotbilden är så föränderlig, är det svårt, för att inte säga omöjligt att uppnå full datasäkerhet.

Nya förutsättningar en jämförelse mellan traditionellt och elektroniskt referensarbete.

The purpose of this master thesis is to investigate the differences between the traditional way of conducting a reference interview and the electronic way. The main questions of this thesis are: How does the electronic reference interview appear in comparison to the traditional one? How do the librarians experience the differences? Is quality affected in the electronic reference interview? Examples from Fråga biblioteket Ask the Library have been used in this study. The method used in the investigation is based on qualitative interviews in combination with studies of relevant and recent literature. The librarians interviewed all have experience from both traditional and electronic reference work.

Datorspel till nytta eller nöje? En intervjuundersökning utifrån folkbibliotekariers perspektiv

This Masters thesis concerns computer games in Swedish public libraries. We have investigated the opinions of public librarians concerning what they think about computer games, and to what extent they believe it should be a part of the public library. The method we have chosen is qualitative interviews. The theory we have used is a pedagogical literature strategy, which we have reformulated so that it fits our investigation. The results show that the interviewed public librarians think that the library should offer computer games for children and youths to use at the library, and that they should offer computer games for lending, to all the library users.

Sjuksköterskors uppfattning av elektronisk dokumentation avseende tidsåtgång, teknik och vårdkvalitet

Documentation in electronic journals is perceived as time consuming and sometimes technically difficult to handle, but also leads to an improved quality of care. Objective: The purpose of this study was to investigate nurses' perceptions of documentation with a focus on timing, technique and quality of care and whether any differences in these perceptions were dependent on age. Method: Quantitative descriptive cross-sectional study in the survey form, 28 nurses at a university hospital in central Sweden participated in the study. Regression analysis was performed with Spearman's rank correlation coefficient. Results: Electronic documentation takes 30 to 60 minutes for most nurses and half of them considered it a reasonable time.

Hur hanterar institutioner en miljö med blandade Operativsystem?

The purpose of this thesis is to investigate if there are environments that use some kind of central authentication system within institutions/schools. The hypothesis is that an institution not using a form of central authentication service has more need for maintenance and as such is considered a higher cost for the organization. The gathering of data has been done through interviews with technical personal at Blekinge Tekniska Högskola and Linköpings Universitet. Based on the technical background of the authors, and the system limited to discussing Windows and UNIX operating systems, a discussion and analysis of the systems working today has been done, with emphasize on the hypothesis..

XML som informationsbärare för EDI

Information handling has been a key issue for different companies for a long time. Electronic Data Interchange (EDI) is used to transfer different business documents from one company to another. This is done in such way that the information itself is separated from how this information is stored and handled in the companies internal systems. As different companies have different systems there is a need for a standardised format for this exchange. There is a big difference between EDI-systems based on what kind of EDI-standard is used. The most common standard in Europe is EDIFACT, but with increased interest of using the Internet for business communication there is a need for a standard that is adjusted for use over the Internet.

GPS-­baserad virtuell geografisk inhägnad för mobil enhet

The aim of this paper is to find an algorithm to establish and maintain a virtual enclosure around a mobile unit. The area may take any form and should be scalable up to and including national borders. The enclosure is managed on the mobile unit. The target system is Android. Smartphones, tablets and more recently, cameras is examples of mobile units. A modern mobile unit is part of a computer network.

Livsmedelssäkerhet, konflikt och hållbar fred - en teoriutvecklande studie om matens makt

In our world, more than two billion people are living under insecure food conditions and more than eight hundred million people are estimated to be starving. The majority of these people live in developing counties which are poor and often subject of civil war. The past fifty years the main subject of security analysis has been the sovereign and rational state and the threats have been viewed in terms of military and weapons of mass destruction. This has come to change over the last decades and security as a concept has broadened, which better represents the reality of today. Within this broader conceptualization of security the main referent of security is the individual, rather than the state, and threats are not only analyzed from a military point of view, but also seen as threats against human rights and freedoms.

Sjukvårdsrådgivningen i Karlshamn, Blekinge Län, - Från utredning till verklighet, om processen att införskaffa ett system

This Batchelor?s Thesis concerns 20 points at the MDA-program (People, Computers and Work) at Blekinge Institute of Technology in Ronneby, Sweden. 10 points concerns Computer Science and 10 points Human Work Science. The thesis is about the process of starting a new department of Blekingesjukhuset [Blekinge Hospital] in Karlshamn, Blekinge called Sjukvårdsrådgivningen [Health Care Advice Bureau]. The thesis starts with a description of the ethnographical methods used, followed by the process of establishing the department. In this new department, the nurses are using a computer based system called Teleråd, developed by TietoEnator. The thesis takes up the issues of how the department uses this system today and concerns what ?user-friendliness? is.

E-böcker och bibliotek : En kritisk diskursanalys av Biblioteksbladet 2005-2011

The aim of this two years master´s thesis is to examine discourses about electronic books in relation to libraries that occur in the Swedish library journal Biblioteksbladet by using critical discourse analysis (CDA). The thesis also aims to discuss changes in the discourse practice, and discuss the relationship between discourse practice and social practice in the field of library and information science (LIS). A main point of CDA is that language is a form of social practice that helps shape social reality. Furthermore the concept of ideology, as understood with-in CDA, brings understanding to the way discursive events help reproduce and transform social relations of pow-er. The text samples span from 2005 up to and including 2011 and were examined by using Norman Fairclough´s three-dimensional conception of discourse, which allows for interpretation of text on a linguistic, discursive and social level.The result of the analysis showed that there are several different discourses about electronic books and li-braries, none of which can be said to be particularly representative.

Säkerhet i smarttelefoner : En jämförelsestudie mellan bärbara datorer och smarttelefoner i verksamheter

Smartphones have become more common as business tools within the workplace. With its many features and great flexibility, the smartphone has stormed the business world and become an alternative or complement to the laptop. As these mobile units' popularity has increased, the interest of businesses to invest in this new technology has increased, but has security kept up with the technology developments?This study aims to conduct a study to see if the companies in the IT industry have the same safety awareness for smart phones to laptops.The study shows that companies have greater safety awareness and higher safety requirements for laptops than smartphones. Meanwhile, both end-users and management are well aware of the risks and threats that the smartphone is facing..

Säkerhetsutvärdering certifikatserver i stället för aktiva kort

Business and organizations use computer network in a greater extension than ever before, especially for business-critical use. That increase the demand of security for all systems, both against internal and external threats. The demand on the authentication method used today increases. Today they normally uses password or some kind of smart card. I will performa literature study that will investigate the possibility to increase the security in authentication of users without the use of extra hardware.

Privata säkerhetsföretag - Våldet som handelsvara

This essay tries, in different levels, to explain and create a deeper understanding for the phenomena ?private security companies?. By using Mary Kaldors theory about new wars, I will come to the conclusion that the insecurity that these wars create is an important part in understanding the emergence of a security need that these private security companies can provide. Later I investigate and explain howthe neoliberal privatization policy that is spreading through the world today has laid ground for development of the private security industry. When I have answered these questions I analyze how the private security companies can affect the state, war and peace both positively and negatively.

<- Föregående sida 3 Nästa sida ->