Sök:

Sökresultat:

6493 Uppsatser om Computer science - electronic security - Sida 9 av 433

Smarta Hus: Nya behov och lösningar med participativ design

In this Bachelor Thesis (20 p.), we present the history and development of "Intelligent Houses", and most important- explore some of the future possibilities in this area. The project has been carried out through an interdisciplinary cooperation between three different educations at the Blekinge Institute of Technology. By conducting a dialogue with various actors with different professions, we have been trying to identify needs within the concept of "Intelligent Houses", were the end user is not only the tenant or homeowner. Through Participatory Design methods, such as a Future Workshop, we have brought the users together to discuss their own and each others needs and hindrances in their respective work practice, and how intelligent house technology could improve their work conditions. We have also been testing a highly sophisticated CO/CO2/Moisture/Temperature/Enthalpy multi-sensor & controller, originally developed for regulating indoor climate systems. Based on the needs we have found in our fieldwork, we have been looking at possibilities to make multi user solutions with the sensor..

FN - i mäktiga staters tjänst En studie av hur FN påverkas av mäktiga stater

The United Nations is an important organization when it comes to international peace and security. Recent events in international politics, however, have brought about a widespread concern about the abilities of the organization. Powerful states have shosen to act outside of the organization to achieve their goals. They have furthermore a disproportionate influence on the decision-making body, the Security Council.The aim of this essay is to examine wheather UN can function productively as keeper of the international peace and security in the political climate of today, and to find out to what extent the powerful states harm the organization. I use a theoretical article, concerning states relations to international organisations, to analyse the acts of powerful states in UN.

Datasäkerhet : Hur man skyddar sig mot interna hot

As the companies of today are good at protecting themselves against external threats, but are having problems with internal threats, we focused on how information can be protected from ending up in the wrong hands. First and foremost to protect information from employees who might steal it and sell it to another company. Since the security investments needed are connected to the financial costs of implementing them we have tried to create a balance between the investments needed and the cost of implementing them. The different kinds of protection needed are first and foremost protection to make data less accessable, passwords and traceability. While it is hard for us to estimate the amount of money a company lose by the hour when the production stands still, we have not been able to use any of the excising models to calculate the profit of installing countermeasures.

Elektroniska vetenskapliga utgåvor av skönlitteratur på webben en studie av hypertextualitet, interaktivitet och hypermedialitet.

The objective of this thesis is to examine which form value-adding qualities specific for the Web take and to what extent they exist in a selection of electronic scholarly editions of literary works. The examination was concentrated on the qualities hypertextuality, interactivity and hypermediality. Besides extent and form, the research questions focused on whether or not the form of the editions correspond to theories and guidelines about how electronic scholarly editions should be designed to generate an added value from a scholarly point of view. The empirical approach was qualitative and the selection consisted of 31 editions. They were examined according to theories about the value-adding features of the qualities.

Säkerhetsstyrning inom den Finansiella Sektorn : En Studie på Best Practice hos Tre Svenska Banker

For organizations that handle sensitive information, IT governance and information security are necessities in order to maintain credibility and to conduct its business efficiently. There are several known processes to increase security governance ? which is a fusion of information security and IT governance.This master thesis examines if organizations use recognized processes and if it in that case would lead to higher security. The study is qualitative and conducted in the financial sector and based on Best Practice frameworks of the security governance in Swedish banks. Data collection was done through interviews and surveys that were triangulated to get a gathered picture of the quality of the security governance activities.

Human Security in Serbia: A Case Study of the Economic and Personal Security of Internally Displaced Persons

The aim of this study was twofold; firstly it sought to describe the human security situation of Roma IDPs and IDPs living in collective centers, secondly it tried to create an understanding for how the human security situation can affect IDPs capabilities to develop. The findings of the study were mainly based on a field study conducted in Belgrade, Serbia for two months. The results of the study were that IDPs in collective centers have a poor human security situation regarding basic income, employment, adequate housing and experienced personal security. Roma IDPs suffer from the same insecurities, but in addition also has poor human security in basic education and personal safety. Their stagnant human security situation proved to be the result of the inability to help IDPs by the actors involved in the relief work.

Säkerhet i det trådlösa hemnätverket ? En analys av de vanligaste säkerhetslösningarna

The security solutions used in wireless home networks are examined in this report. Thegrowing number of wireless units have increased the need for reliable security solutions.This report aims to enlighten the reader about the fundamental technology used inwireless security solutions and inform about the existing flaws. A recommendationabout how to achieve a high level of security in the home network is also given to thereader.Several flaws in the security solutions in use have been reported. Of these the mostsevere has been examined in a test network using highly accessible tools to get aperception of how vulnerable the user is.The tests showed that several attacks were efficient and easily carried out. We have alsoseen that several of the home networks in our sample are susceptible to these attacks.Our survey revealed that the Internet service provider's technical support in many caseslacked the knowledge necessary to inform the user about reliable security solutions..

Digitala signaturer - ett verktyg för säkerhet?

Statliga myndigheter använder i allt större utsträckning öppna system, så som Internet, i sin kommunikation med medborgare, företag och andra myndigheter, därmed ställs allt högre krav på säkerhet och tillit. I takt med den ökade användningen av elektronisk kommunikation uppstår nya problem. Några av dessa är att vi inte med säkerhet vet vem vi kommunicerar med, vem som beställer tjänster och att vi inte kan vara säkra på att information kommer till rätt person eller har ändrats på vägen. Verktyg som finns för att lösa dessa problem och öka säkerheten är digitala signaturer och elektronisk identifiering. Med detta som bakgrund ställde vi oss följande frågor, vilken teknik ska statliga myndigheter använda för elektronisk identifiering och signering? Vilken teknik ska användas för att uppfylla kraven på säker elektronisk överföring? Kan statliga myndigheter ersätta traditionella namnunderskrifter med kvalificerade elektroniska signaturer? Syftet med vår uppsats blir därför att i första hand redogöra för hur statliga myndigheter avser att ersätta traditionella namnunderskrifter med kvalificerade elektroniska signaturer. Genom litteraturstudierna skaffade vi oss kunskaper om både teknik och användningsområden för digitala signaturer och genom att beskriva dessa tekniker får läsarna en introduktion i ämnet.

Säkerhetsansvarigas syn på supportrars beteende och dess inverkan på ishockeyevenemang : En kvalitativ studie om hur säkerhetsansvariga ser på supportrars beteende och dess inverkan på ishockeyevenemang

Are icehockey supporters a big problem in todays society? Is security required during icehockey events, and how is it implemented? This study was aimed to investigate the people at security positions and their view on fan behavior and it?s impact on icehockey events. It was a qualitative study were six interviews were made with people in charge of the security at different hockey clubs. The results showed that security managers overall saw a good fan culture, and that it created a wonderful atmosphere. Security managers worked a lot with dialogue with the supporters and they thought it had a good effect.

Är vi artiga mot virtuella agenter?

The CASA-paradigm, Computers Are Social Actors, was introduced in the book "TheMedia Equation" by Reeves and Nass. One of their experiments concluded that we tend to be polite to computers in the same way as we are to people. In this study I have replicated Reeves and Nass experiment but instead of a text-based interface I have used a virtual agentin order to find out if we are polite to the agents, or still to the computer. Two experimental setups was conducted. The two setups had a common first part that was carried out on onecomputer with one agent.

Tv-spel som kultur? : En kvantitativ studie över tv-spelens kulturella plats på folkbiblioteket.

This study examines the cultural place and status of video and computer games in the Swedish public library. Using works on popular culture and the theories of Pierre Bourdieu, this study employs quantitative methods, as well as textual analysis, to analyze the results of an online questionnaire with 19 questions focusing on selection criteria, shelf placement, perceived competence, as well as reasoning for having or not having these games in the library. 286 out of the 440 libraries contacted is participating in the study, and the libraries consist exclusively of public libraries in Sweden that are found in the database of the Royal Library.The results of this study show that a larger number of libraries than previously indicated have started to provide electronic games to their patrons. At the same time, patterns in the data and comments suggests that these games in many cases still do not enjoy the same level of cultural recognition as other media. Indicative of this is the way most libraries seem to focus on the medium being exclusively for their young patrons, with seem-ingly very little in the way of investment for adults.

C, C++, Java och Python - En prestandajämförelse mellan fyra programmeringsspråk

In today?s society computers are getting a much more important role. To get a computer to work as intended it has to be programmed. A computer program is written with programming languages. There is an abundance of programming languages available today and there are many differences and similarities between them. The different languages have their advantages and their disadvantages where some of them are intended for fast performance, some to be cheap on memory usage, and some are developed to be easy to program on. In our thesis we have chosen to compare four of todays most common languages, C, C++, Java and Python.

En känsla av trygghet : Patienters perspektiv inom palliativ vård

Background: Every year 56 million people die around the world and it is estimated that 60% of these people are in need of palliative care. It has been shown that patients in the palliative care experienced their situation as uncertain. When life no longer was certain, the patients tried to live their life day by day and make the best of it. Problem: When patients were diagnosed with an incurable disease the future became unsure, because their life would come to an end. Therefore patients with a palliative diagnosis could be in need of experiencing feelings of security.

IT-säkerhetspolicy ? efterlevs den av anställda?

ABSTRACT The main purpose of IT security policies is to protect companies against intrusion and unwanted spread of information. Statistics show that IT related crimes tend to increase and because of that it is important, from the company?s side of view, to be well prepared. The IT security policy is an important part of that preparation. A lot of the crimes related to IT can be deduced indirectly to employees at the companies where the crime takes place.

Elektronisk publicering: vetenskapliga dokument med åtkomst via webben

The aim of this master thesis is to study electronic publishing, and our main purpose is to examine different strategies of publishing such as: markup languages and page description formats. We examine in what context these strategies are used for publishing, when it comes to scholarly documents produced by Swedish universities and university colleges during the spring of 2002. We apply a sociological perspective as the theoretical framework for to identify the main purposes for scientists to publish their work. We also discuss properties belonging to the different formats: XML, HTML, PDF and PostScript. By doing a content based survey of the websites at Borås University College and at Gothenburg University, we have found that the most common form of electronic publishing, regarding scholarly documents, are lists with bibliographical information on publications and presentations of current research.

<- Föregående sida 9 Nästa sida ->