
Sökresultat:
6493 Uppsatser om Computer science - electronic security - Sida 5 av 433
Implementation av Network Admission Control
This examination work is about implementation of Cisco Systems Network Admission Control (NAC) within a leading IT-company in region of Jönköping. NAC is a technique that is used for securing the internal network from the inside. NAC can verify that the client who connects to the network has the latest antivirus updates and latest operative system hotfixes. Clients who don?t meet the criteria can be placed in quarantine VLAN where they only have access to the update servers.
Elektronisk handel och självreglering -möjligheterna att via självreglering skapa ett förtroende för och främja utvecklingen av elektronisk handel?
To business owners and consumers electronic commerce means new conditions and possibilities. Often and specially at the Internet information between consumers and sellers is asymmetrically distributed. Among the consumers there is a shortage of confidence in electronic commerce. In order of a positive development of electronic commerce it´s important to find a solution to the shortage of confidence. Confidence may be created by legislation or by self- regulation.
Change Lab - Att arbeta med lärande förändring
In order to be able to change, to maintain competitiveness as a company in a
world where rapid changes is part of the daily life, it is crucial to have
knowledge and methods in how to change. One method, originally developed in
Finland, is the Change Laboratory. This method is said to be efficient, not
only concerning change aspects but also learning, since change and learning in
this method is intertwined.
This Master Thesis (20p.) tells about the process of conducting a Change
Laboratory with a Swedish high-tech company and analyses factors in the process
that makes change possible..
Det etniska säkerhetsdilemmat-en idealtypsanalys över etniska konflikter
In the world after the Cold War, internal and ethnic conflicts have been predominant. Ethnic conflicts have their own theories on why they erupt and what can be done to solve them. This essay seeks to analyze how the Ethnic Security Dilemma can explain the causes, and possible solutions, of today´s armed ethnic conflicts.By making an ideal types typology over different types of ethnic conflicts, and then analyzing the Ethnic Security Dilemma´s impact on each conflict type.
Electronic Journals, Just in Case, Just in Time, Just for You ? användning av elektroniska tidskrifter vid Chalmers tekniska högskola
This user study was carried out at the library at Chalmers University of Technology in Gothenburg in the spring of 1999. Chalmers wanted to investigate how much their employees use electronic journals. To facilitate decision-making and be cost effective, the library needed to know about their customers' opinions. The main purpose was to investigate the usage of electronic journals, how the library's choice of these journals affects the frequency of use and what the attitudes towards them are. A questionnaire was sent out to 2 400 employees; 477 replies were received.
En laptop till varje elev : en studie om gymnasieskolans satsning på datorer i undervisningen
The aim of this study is to highlight the computer as a learning resource in the education and give us knowledge about how the students uses the computer in year one in a selected High School where one computer per student were introduced in autumn 2011. The aim is also to contribute to the discussion about how the computer can become a natural learning resource for all students in all subjects, including the students in need of special support.How are the High School students using the computer?Are there differences in computer use, whether the student is in academic or vocational program?Are there differences in computer use between boys and girls?Do the student experience that the digital competence is increasing together with if they experience the computer as aid?In what degree do the teachers encourage the students to use the computer?How much do the students use the computer to learn mathematic?The study is based on a survey of all students in year one in a municipal High School.The result of the study is showing that the students first of all use the computer to play music, surf the Internet and to be logged in on social media (eg. Facebook). The students have learned to use the computer for the tasks they need, although the teachers don?t encourage the students to use the computer in any higher means, not in mathematics and not in other subjects.
Container Security Initiative - En diskursanalys utifrån teorier om det il/legala
Container Security Initiative was launched in 2002 by the US Customs and Border Patrol in order to secure the global flow of containers destined for USA. This thesis attempts to analyze Container Security Initiative in relation to a possible future scenario made by the weapons industry where the state's global traderoutes are being subject to militarization. A development which is partly based on the threat posed by global illegal trade. The latter is discussed and defined based on current research made by Carolyn Nordstrom, Moíses Naím and theories on the cosmopolitan perspective made by Ulrich Beck. Strategy documents concerning Container Security Initiative are then analyzed in terms of discourse to try to say something about what the program indicates.
The digital dark age? Bevarande av elektroniskt material i Sverige
The first law in Sweden containing an act of legal deposit is from 1661. Since then the printing-houses are supposed to deliver all printed material to the Royal Library and other recipient libraries. Today, more and more information is solely published electronically. This material is not yet included in the law of legal deposit. In a similar way as our printed cultural heritage is saved for posterity our electronic cultural heritage has to be saved.
Nord Stream - Vägen till säkerhet?
Big dangerous Russia, environmental thief or house warmer? The Nord Stream pipelines are a highly debated theme in Europe and the EU. A number of different countries will be subject to the pipelines direct or indirect. This paper aims to figure out what kind of threats and possibilities Denmark, Finland, Sweden and Germany consider to be the consequences with the pipelines.The study takes as a standpoint the area of security studies and the widened of the same. The three standpoints within the security study that will be used are military security, environmental security and energy security.
Basmobilen
Today?s cell phones include more and more functionality, it is no longer
uncommon to be able to connect to the Internet or take photos with the cell
phone. In this thesis the question is if the cell phone users are interested in
this new functionality. Are there people who are interested in a cell phone
that in this thesis is called ?Basmobilen? (the entry level phone), which
include the following functions; phone call, SMS, phone book, calling lists,
clock and the possibility to change the call signal.
Förstår du vad jag menar? - En undersökning om kommunikation med hjälp av bilder mellan användare och systemutvecklare.
Ibland kan det förkomma problem mellan utvecklare och kund/användare då de tar
fram kraven till ett nytt system. En anledning till detta kan vara att
utvecklingsgruppen och användargruppen inte har samma kunskaper och
erfarenheter och talar då inte "samma språk". En lösning till detta problem kan
vara att ta hjälp av en mockup. En mockup är en fysisk och/eller interaktiv
modell av ett gränssnitt. I detta arbete har vi, med hjälp av intervjuer och
observationer, undersökt om detta hjälpmedel underlättar kommunikationen i
verkligheten..
Utvärdering av datoranvändning i primärvården med särskilt fokus på remisshantering
The aim of the thesis is to present a study of what works well and what does not work so well in today?s use of computers in primary care with a special focus on the use of computers in the management of referrals for consultation. In May 2009 a module for electronic consultation referrals was introduced in the computer system Cosmic at the University Hospital in Uppsala. Previously, the primary care units had to use two different systems for management of referrals. Referrals sent internally within primary care have been sent electronically while referrals to the University Hospital or other external units were sent on paper.
Inblick i fenomenet webbskrapning
Föreliggande kandidatarbete har till syfte att undersöka fenomenet Webskrapning.
Webbskrapnings-program (också kända som Web Wanderers, Crawlers, Spiders eller
skrapare) är program som söker igenom webben automatiskt för att extrahera
information från webbsidor.
Ett exempel på web skrapning är när ett företag samlar in data om
prissättningar på en vara eller en tjänst och sen använder informationen för
att producera billigare erbjudanden. Detta ger företaget en fördel så att de
kan fokusera mera på att marknadsföra sin sida/tjänster. Utöver detta så blir
de utsatta företagens servrar också hårt belastade med trafik (skrapning) från
?icke kunder?.
Efter att ha genomsökt både akademiska och allmänna källor via
informationsinsamling, av denna information så dras slutsatsen att man inte
fullt ut kan hindra skrapning av hemsidor. Detta på samma sätt som man inte
fullt ut kan hindra någon IT-attack, det finns inga 100 % vattentäta system.
Tolv böcker i datorn ? bättre än en i handen?
This thesis studies how readers of the electronic book (the e-book) use and perceive the electronic medium as a carrier of fiction. In this study it is assumed that fiction is mostly read in printed format. Therefore it is interesting to ask why some readers choose to read on screen. As there are all too few studies conducted on how readers perceive and use the e-book as a medium, this study aims to enrich an undeveloped research area. The study is based upon a qualitative questionnaire.
Virtuella skrivbord i kommunal verksamhet
Today it?s common that companies and organizations are facing several challenges and problems when it comes to making their IT-environment more efficient. Some of these are the management of user?s computers and file security. Comput-er users are often tied to their personal computer due to personal programs and files.