
Sökresultat:
2133 Uppsatser om Computer security - Sida 12 av 143
En jämförelse av krypteringsalgoritmer
Today the Internet is used more and more as a transportation for information. Much of the information is confidential and should not be read by those not privileged. To protect the information from unauthorized access cryptography can be applied. The cryptography algorithms in use today all have their pros and cons. They are therefore suited for different applications.
Användbar användarmedverkan : Är användarmedverkan positivt för systemutvecklingsprocessen?
Computer use at work has risen considerably over the past fifteen years and is currently a relatively common phenomenon when 76 percent of women and 72 percent of men using the computer in their daily work (SCB Arbetsmiljörapport 2009).According to Gulliksen and Göransson (2009), Sweden is one of the countries which are more advanced in the procurement of computer systems at work. He means that Sweden has unique opportunities and conditions for user participation in the development of computer systems, when the user has the right to influence their working environment through a law in the Work Environment Act. The paper examines the importance of user involvement in system development and the Swedish company's approach and experience of user involvement. To highlight and explore the importance of user involvement, there has been a case study in which users have been representative of the development process. The case study has been conducted on a case company where the system IST analys was in need of a new interface.
Säkerhet i öppna WiFi-nätverk. En studie om hur användares medvetenhet om säkerhetsrisker vid interaktion med öppna WiFi-nätverk kan ökas
Public WiFi networks is one of the dominant technologies for users to get public internet access. The problem is that the networks are designed for accessability rather than security ? a problem users seldom are aware of. Users who carelessly access WiFi networks may reveal sensitive information which, among other things, can lead to an identity theft. Previous research suggests that users must be educated and informed about the risks they incur, but not how this should be done.
NATO 1989-2015 : NATO:s säkerhetpolitiska arbetsprocessfrån 1989 till 2015 sett utifrån Berlinmurensfall och konflikten i Afghanistan
The main purpose with the essay is to look into NATO and annalise how the organisation haschanged it´s security policy work process today 2015, seen from two different world eventsduring the period 1989-2015, the collapse of the Berlin wall and war in Afghanistan. Purposeand issuses also apply based on two theories Anarchymodel and World society model. In orderto highlight two different ways to see NATO:s security policy work process over time untilthe present day.Issues:? How did the fall of Berlin wall in 1989 change NATO:s security policy work process?? How did the war in Afghanistan in 2001 change NATO:s security policy work process?The essay is a qualitative method literature review describing NATO as an organisation andworld events that had impact on NATO over time.The result show that NATO has shifled it´s borders further fast because ?new? membercountries from the former Soviet Union are party members. NATO has moved closer toRussia, and increased in momentum.
Säkerheten i trådlösa nätverk
The number of wireless networks has increased rapidly among both home users and companies in just a few years. That has brought a lot of good things with it, for example the possibility to connect wireless equipment to the network or Internet from an arbitrary position within range of the accesspoint. But since the transmissions take place through the air some new security risks appear. It?s difficult to restrict the signals to a specific space and thereby a lot easier for unauthorized to eavesdrop or disturb the signals compared to a traditional wired network.
USA:s officiella säkerhetsstrategi : Vad ligger bakom?
The purpose of this study is twofold: First, to inquire how the George W. Bush administration plans to keep America safe from external threats and second ? based on the assumption that neoconservatives have influenced the Bush administration ? examine how neoconservative ideas have influenced this strategy to protect America. The research questions are as follows:What is the content of the Bush administration?s security strategy?How are neoconservative ideas reflected in this security strategy?To answer the first question, the main points of two studied documents were summarized.
Ukraina: Realismens återkomst? : En kvalitativ textanalys om hur fred och säkerhet bör skapas i Europa utifrån teorierna realism och liberalism
Ukraine shares a long history with Russia. In the early 21th century, Ukrainians wanted a freer Ukraine. Therefore the orange revolution started in 2004 by the Ukrainians and had a positive outcome. The situation later became worse because of the economic crisis in 2008 and a corrupt president. The pro-western politician Petro Poroshenko was elected to become president in 2014.
Folkbibliotek och TV-spelande ungdomar en studie i bibliotekariers attityder och värderingar när det gäller ett nytt medium på biblioteket
The aim of this Masters thesis is to examine librarians attitudes and values when it comes to the question if a new media, video games, should be introduced at the library or not. Video games are here seen as media primarily for youths. In our study we also wanted to study the discussions of quality and purchase, when computer games were introduced at the library. In order to answer our questions we conducted nine interviews with librarians working with children and youths, in eight libraries. By analysing their statements, using Maj Klassons theory where she defines the librarians role in three different strategies, we could demonstrate how the librarians reason when it comes to video and computer games, youths, quality and purchase.
BSR Prestandaverktyg / BSR Performance tool : Prestandamätning via diagnosuttag över CAN / Performance measure via diagnostic socket over CAN
This abstract describes the bachelor degree thesis in computer technology at Växjö University. The company BSR in Växjö has requested an application that can measure a cars performance, with attributes like acceleration times and engine power estimation. The communication between car and computer is via the USB port on the computer and the OBD-II socket on the car with the network protocol CAN, controller area network. Cars from VAG have been the primary focus group and the application has been tested on a Volkswagen Passat CC from 2009. The system is developed in the programming language C# in the environment Visual Studio with the framework .NET.
Svenskt utrikespolitiskt beslutsfattande : Flernivåanalys av Sveriges beslut att bli en del av den europeiska säkerhets- och försvarspolitiken (ESFP).
In 1998 Sweden accepted the Treaty of Amsterdam which contained a development of the common foreign and security policy (CFSP) towards a European security and defense policy (ESDP). This thesis aims at studying the decision making process behind the Swedish foreign policy decision to further develop its security policy within the European Union. The purpose is to explain which factors and conditions that did affect and influence the Swedish foreign policy decision. The research applies foreign policy analysis, a theoretical perspective that analyzes both domestic and international conditions using different levels of analysis. The research methods being used has been qualitative as well as quantitative, complemented by interviews, since the research is a process tracing case study.The thesis conclusion is that the Swedish decision is explained by several factors.
"The Machine Made Me Do It!" : An Exploration of Ascribing Agency and Responsibility to Decision Support Systems
Are agency and responsibility solely ascribable to humans? The advent of artificial intelligence (AI), including the development of so-called ?affective computing,? appears to be chipping away at the traditional building blocks of moral agency and responsibility. Spurred by the realization that fully autonomous, self-aware, even rational and emotionally-intelligent computer systems may emerge in the future, professionals in engineering and computer science have historically been the most vocal to warn of the ways in which such systems may alter our understanding of computer ethics. Despite the increasing attention of many philosophers and ethicists to the development of AI, there continues to exist a fair amount of conceptual muddiness on the conditions for assigning agency and responsibility to such systems, from both an ethical and a legal perspective. Moral and legal philosophies may overlap to a high degree, but are neither interchangeable nor identical.
När verkligheten sätts ur spel : En kvalitativ studie om profesionella socialarbetares förhållningssätt till problematiskt datorspelande som ett beroende
This study examines how professional social workers relate to problematic computer and video gaming as an addiction. It is a qualitative interview study aimed to describe and analyze how professional social workers, who in some way work with problematic computer gaming, relate to the player?s problems in terms of a concept of dependency. The theoretical approach is based on social constructivist theories of discourses, normality, the definition of dependency and diagnoses. The study was conducted through five qualitative half structured definition interviews with professional social workers that work directly or comes in contact with problematic computer gaming.
Dokumentärfilm om Warcraftspelaren 4K FuRy
Warcraft är ett strategidataspel som massor av människor världen över ägnar sig
åt.
Sebastian Pesic (alias 4K FuRy) är en av världens bästa spelare och
dataspelandet har blivit hans jobb.
Dokumentärfilmen handlar om Sebastian Pesic och hans verklighet i Warcraftlaget
4Kings. Sebastian kommer att berätta om sina upplevelser och vi kommer att få
se honom i action. Filmen kommer att ge en inblick i dataspelsvärlden som många
inte ens vet om existerar. Ännu mindre att man kan tjäna stora pengar på att
spela.
Utomlands är uppmärksamheten för Warcraft större.
Datormedierad kommunikation upprätthåller kontakten : IT som stöd för internationella studenter och soldater i utlandstjänst vid geografisk distansering
It has become more popular to work abroad and companies have become more global than they used to. A big reason for this is due to globalization and the progress done within the field of technology. Because of this aloofness that occurs, a gap between the expatriates? personal life and his or her working life develops. The cases focused on in this paper includes people who are distanced from their private lives at least a few consecutive months but are all aiming to get back when they are done with their individual errands.
DDoS : -Vad är det och går det att skydda sig?
This paper will expose the serious phenonomen Distributed Denial of Service (DDoS). Businesses without a good security policy are easy targets for attackers. We will cover why its hard to protect yourself, present previous attacks and ways for individuals and businesses to secure themselves. We have based our paper on previous cases and done intervjues with companies who specialize in dealing with these kind of threats. Then come up with guidelines wich will be helpful for businesses when they want to strengthen there security against Distributed Denial of Service-attacks..