Sök:

Sökresultat:

2133 Uppsatser om Computer security - Sida 19 av 143

Att skapa grunden tillkassasystemsapplikationer för Android : Undersökande arbete samtimplementation

This paper was made together withTechPay AB, by their request.The dissertation has been divided into two separate parts; one of which is fully theoretical, with the focus on the security requirements of a digital cash register, and how to meet these requirements.The second part covers the implementation of anAndroid-oriented Java-library,created with help from the security requirements found in the first part. The purpose of this library is to make it easier to develop a cash register that uses payment terminals from TechPay.This paper also covers different communication protocols, encryption techniques and recommendations from authorities, banks and Android. This paper also contains a small review of how users are validated in applications on the current market that handles money transactions..

Historien om en svensk säkerhetspolitisk agenda - Förklaring av processen, politiken, policyn och entreprenören för Sveriges militära insats i Tchad

The aim of this study is to analyze the process of an agenda setting and see how a specific issue came to materialize on the security policy agenda. The empirical goal of the study is to see why Sweden chose to participate in the EU-led operation to Chad, and how that process came to be? The analysis is based upon Kingdon's multiple streams theory (2003) where he distinguishes the process into three streams. Central for his theory is the coupling of these streams and the importance of a policy entrepreneur. I complement Kingdon's theory of policy entrepreneurs by taking inspiration from Hinnfors (1995), Gustavsson (1999) and especially Eriksson (2000) and their analysis of policy change and agenda setting.

GPS-­baserad virtuell geografisk inhägnad för mobil enhet

The aim of this paper is to find an algorithm to establish and maintain a virtual enclosure around a mobile unit. The area may take any form and should be scalable up to and including national borders. The enclosure is managed on the mobile unit. The target system is Android. Smartphones, tablets and more recently, cameras is examples of mobile units.

Datorn i bildundervisning : En studie på tre elevgrupper med fokus på samarbetet

The purpose of this paper was to carry out and evaluate a pedagogic ICT-project, where the computer was implemented in art class. Focus was on the consequences of collaboration and also on the students? understanding of their own performance, compared to techniques in traditional art class.The study was qualitative and began with studies in literature. The contents of the literature are the foundation of the discussion, especially theories concerning the learning process, IT and computer-based learning. In the project, three different groups of students from upper secondary school attended and they where given tasks to solve in the image editing program Paint Shop Pro.

Att Visualisera Oron : Hotet, subjektet och terrorattentatet i Stockholm 2010

This study examines which socially constructed threats and subjects of security existed during the aftermath of the terrorist attacks in Stockholm 2010. With ideas of identity and difference as a starting point the theoretical framework is then developed with ideas from the new critical security studies including key subjects such as attributes, risk, imaging and visualisation. The study will be executed with the use of a discourse analysis approach using newspaper articles and chronicles as the principal empirical material. The analysis will then follow two separate themes. Firstly, the different threats and subjects of security will be deduced, and also, how these social constructions inevitably create each other and require each other to continue existing.

Webbgra?nssnitt pa? pekska?rmsdatorer : En anva?ndarstudie av webbplatser pa? Ipad

Nowadays, the establishment of new touch screen technology has changed significantly the way we navigate on the Internet. The requirement to design websites that adapt to various artifacts such as touch screen computers are increasingly a need to consider. The purpose of this study is to discover - What are the specific usability requirements should be addressed in designing of websites for touch screen computers? - In order to examine the essay?s question, it presents a study where five people visiting three different websites on the touch screen computer Ipad. The study was conducted using a participant and structured interview observation in form of a think-aloud method.

E-handel i småföretag

E-commerce is a conception who many are taking about nowadays. E-commerce is associate with computer based business and it?s a new way to do business on. Users and system connect up to each other for effective mediate and transfer information. Within e-commerce there?s a lot of ways to do business on and it can for example be between a business and a another business (B2B) or between business and consumer (B2C).In this degree report have I reached if small business will invest on e-commerce and if they will, how.

Försäkringskassan- effektiv och/eller rättssäker?

The public administration and its officials have a number of values which they have to relate to in their work. The values are a set of democratic and economic values.This study?s purpose is to examine how the officials at the National Insurance Office in Sweden give priority to these values. The study is performed by interviews with officials at two insurance offices.The study shows that the officials in a high degree value the democratic values legal security and public ethics. In turn they experience that productivity, which is an economic value, is being promoted in a high degree from the management.

Tillämpning av Unified Process och Design Patterns vid integrering av system

The computer consultant company Create in Lund AB wishes to facilitate their invoice routines, as it at present is required that the administration finds and compares information from two different systems.The purpose of this thesis is to develop an invoice management system that simplifies the invoice management process for the administration at Create. During the development of the system, I have chosen to follow the software development process Unified Process and also tried to find design patterns that can be applied to the integration.The result of my project is a self-contained application developed using the Java programming language that communicates with the databases of the other two systems and presents relevant information to the user as a set of invoices. Of the 23 design patterns I studied, I used four of them in the invoice management system. However I couldn?t find any connection between any design pattern and the integration of systems.

Datoranvändning : En diskursanalys av medias attityder till dator och surfplatta

The essay is a discourse analysis of the media's attitudes toward computing. The aim is to compare what the media is really saying about the usage of tablets, computers and compare it to what the research is saying. In addition, it examines what the media says about socialization. We analyze the newspapers Dagens Nyheter and Expressen and will first compare these two together and see what attitudes that emerge, and then seek similarities and differences with the previous research and theories including socialization learning, attitudes and consumption. Conclusions we can draw is that Expressen has a more negative attitude towards the use of computers while the Dagens Nyheter has a more positive attitude, but is also more objective to what they write about.

Den svenska neutralitetsdebatten 1988-1992

Starting at the end of the Cold War, this publication assesses the impact of the upheavals in Eastern Europe and the atrophic Soviet Union on the Swedish doctrine of neutrality with its 200 year old tradition. Since the end of world war two the proximity of the Soviet Union had constituted the major impetus for upholding a position of neutrality and as this vanished a pressure for change was created. This essay works with a theoretical framework delineated by Kjell Goldmann and under this disposition, the Swedish tradition of neutrality, governmental positions, opposition and four major influential newspapers are studied. The standings of each variable are canvassed in an attempt to explain the development of Swedish security policy during the crucial years of 1988-1992..

Projekthanteringssystem

This document is a summary of my work to create a project management system for a small firm working with computer graphics. The intention is to manage customers, projects, images and invoices in the easiest possible way. To make the system as flexible as possible a web-interface was chosen which makes it possible to access the system from any computer, making it independent of any particular operating system. The only requirement on the user environment is that the computer must have a connection to the Internet to be able to access the system. The different techniques that have been used to develop the project management system is primarily Ruby on Rails and a MySQL database. Although Ruby on Rails was completely new to me, I decided to use this framework instead of PHP, which I already have a good knowledge of, because of the benefits Ruby on Rails provide.

Naturvetenskap och teknik i samspel med IKT i förskolan

The main purpose of this study is to, in the educator?s point of view, try to find out how pre-schools approach science and technology along with Information and Communication Technology (ICT). The survey was conducted based on qualitative interviews where two preschools participated, a total of seven teachers were interviewed. One of the preschools only has access to a computer, and the other preschool is able to use both computer and tablets in their preschool activities. The results of this show that the teacher?s thoughts about ICT are positive and that they consider it as an important part of their work and have many areas where it is useful.

The Capital Structure Puzzle of SME's - Evidence from the Swedish Security Industry

The purpose of this thesis is to ascertain the main determinable factors of Swedish SMEs capital structure decisions and to investigate whether existing capital structure theories are applicable on Swedish SME financing. We have used panel data to run regressions of various capital structure determinants on three measures of capital structure; short- term debt, long-term debt and total debt. We found that growth opportunities, profitability and age are the most important capitalstructures determinants for our sample. Firm size shows a small explanatory result but the effective tax rate and the asset tangibility do not seem to explain the capital structure at all. Thematurity matching principle is considered significant..

Att nyttja marken 30 meter från järnvägen : hur platser, syften och miljö vävs samman

The purpose of this work is to raise ideas and interest for land that is very much forgotten,unused and neglected in terms of maintenance and usability. Railroads are often seen as adirty and loud intrusion in the landscape and therefore cities turn their backs on them. Theland around railroads is not considered useful despite its often central location and scrublandis common in these areas.The starting point of this work is the restrictions and possibilities linked to the land withinthe security distance 30 meters from the railroad center. Within this security distance thereare numerous limitations and regulations due to the nature of railroad use. These limitationsare counted for in the initial chapter and lay the foundation for the rest of the work.

<- Föregående sida 19 Nästa sida ->