
Sökresultat:
2133 Uppsatser om Computer security - Sida 21 av 143
Medicinering inom hemtjänsten
This work has been done by three development engineers and one computer engineer and in some cooperation with the company Phoniro. This report is written for computer science and is mainly oriented on the programming part in the project. The goal has been to develop a program that ensures the quality of the care that the home care organization delivers. The program is developed for cellphones and is supposed to be used in every visit. Several functions have been developed for the reason of reducing mistakes in patient visits, where the focus was on safe medication.
Analys av fingeravtryck
This report describes a system for verification of fingerprints against a previous created template. It describes how and why a fingerprint image must be processed before it can be used to either identify or verify a person. The method is based on special features of a fingerprint, called minutiae points. The whole process from image to matching is described, every step in the process with image enhancement, binarization, thinning and how to find the minutiae points. Also what false minutiae points are, how they arise, why they deteriorate the result, and how to handle them, is discussed.
Jag ser att du har ont : Validering från partner till patienter med kronisk smärtproblematik; Effekt på emotioner
The purpose of this essay is to investigate what kind of motives where behind the long term decisions for the Swedish military defense in 2000 and 2004. This leads to the questions that the essay is meant to answer; 1. Were the motives behind the two decisions for the Swedish military defense of economic character or an adjustment of security and defense policy? 2. Was the parliament united in the two decisions and if they were not, why? 3.
Framtagning av en förebyggande åtgärd mot kriminalitet vid lastbilstransporter
Boberg at Scania CV AB. The purpose was to investigate the technical and customer oriented possibilities for the development of a transport security measure against cargo crime, which is a growing problem in Europe. The main goal was to develop a concept that is possible to implement in the Scania CV AB Fleet Management System. Another goal was to develop a security model that will be used as a tool during Scania CV AB?s future development projects of transport security concepts.The work was divided into three main parts: a background study, handling cargo crime, transport security Scania CV AB trucks and market analysis, a stakeholder investigation including a questionnaire and interviews, and a concept development session.
Change Lab - Att arbeta med lärande förändring
In order to be able to change, to maintain competitiveness as a company in a
world where rapid changes is part of the daily life, it is crucial to have
knowledge and methods in how to change. One method, originally developed in
Finland, is the Change Laboratory. This method is said to be efficient, not
only concerning change aspects but also learning, since change and learning in
this method is intertwined.
This Master Thesis (20p.) tells about the process of conducting a Change
Laboratory with a Swedish high-tech company and analyses factors in the process
that makes change possible..
Sömnvanor och hälsa. En kvantitativ studie om ungdomars sömnvanor och användande av dator, mobiltelefon och internet.
Introduction: Sleep disorders are an increasingly growing public health problem. InSweden, the last decade's increase in sleep problems was greatest among younger agegroups. Studies show association between the use of communication media and sleepinghabits. Objective: The aim is to map sleep habits and use of communication mediumamong adolescents and to study associations between them. Method: The study isbased on a previously collected survey data among high school students (18-21 years)from a coastal town in southern Sweden.
Försäkringsbedrägerier : En studie av sambandet mellan självrisk och oberättigade ersättningskrav
The purpose of this essay is to investigate what kind of motives where behind the long term decisions for the Swedish military defense in 2000 and 2004. This leads to the questions that the essay is meant to answer; 1. Were the motives behind the two decisions for the Swedish military defense of economic character or an adjustment of security and defense policy? 2. Was the parliament united in the two decisions and if they were not, why? 3.
Programmering till webben : Vad du ska utveckla din webbplats i för programmeringsspråk och varför?
This work is done to try to solve a scientific computer problem and its basis derived from the web, as there are a variety of ways to program to it. The most common languages used by developers, both private and corporate are PHP, .NET and Ruby. But why do companies or a private developer choose a specific programming language? Is it because it is better and has more features than the others, or because they are forced? This essay uses a questionnaire and through tests sees which is best and which one is the most popular/used. To illustrate the problem, a survey is conducted and sent to several companies and asked them to answer the questions regarding the issue.
MSBs respons p? cyberhot: En empirisk underso?kning av MSB:s framst?llning av ?kad cyberhotniv? efter invasionen i Ukraina.
This thesis aims to study how cybersecurity is managed and framed in the context of the
growing threat landscape as a result of the Ukraine Invasion. The war in Ukraine is one of the
first conflicts involving extensive cyber operations, furthermore this study is interested in
how Sweden, more specifically MSB, considers global security challenges and if they can
learn from the conflict in Ukraine. Through a qualitative text analysis, focusing on two
reports published by MSB, the study, using securitization and framing as theoretical
frameworks, seeks to answer the research question ?How has MSB changed its representation
of the threat and adapted its security strategy to address the increasing threat to cybersecurity
following the invasion of Ukraine??. The analysis is based on five operationalization
questions to clarify whether there are indications of securitization and framing in the reports.
The study also aims to identify if there is a more clear threat formulated to cybersecurity.
Säkerhetsstandard för ett mjukvarubaserat säkerhetselement
Researchers today anticipate that in the near future, the majority of the owners of a smartphone will use it as a wallet, i.e. for contactless payment. The technology that enables contactless payment today is ?Near Field Communication? (NFC), which is increasingly embedded in smartphones. Applications like mobile payment between a phone and a terminal use NFC.
Efter Energiutmaningen : Vad hände med undervisningen i fysik?
The purpose of this thesis is to try to find out what effect subject oriented projects like Energiutmaningen has on the teachers, with a focus on teachers? physics education. What was the experience for the teachers who participated and what effects did the project have on them. Four teachers were interviewed through qualitative interviews. From the result it showed that the most experienced teachers, who have been teaching physics for many years, gained a new perspective of their teaching, through their participation a development showed in their education.
Minecraft i klassrummet : En kvalitativ studie om elevers och lärares upplevelser av Minecraft i undervisningen
The purpose of this study was to investigate pupils' and teachers' experiences of using the simulator computer game Minecraft in connection with the Swedish school competition Future City. The study examines how students (ages 14-15) and teachers have experienced the use of Minecraft, what the students have learned in relation to everyday education and the different forms of education during Future City and also examine which patterns that exists in the experiences of the students, with personal interest of and knowledge of Minecraft as a benchmark. The study was conducted through individual semi-structured interviews with both students and teachers. The analysis of the results is based upon a theoretical perspective that includes a socio-cultural view of learning, as well as the lines of reasoning in previous research about computer games and learning. As a general approach towards the study, and in a way, a justification of the chosen research method, a hermeneutic approach was used.
Pamiro
This report describes the work with creating a CMS (Content Manager System). A
CMS is a
web tool so you easy can publish materials on your web page. With a CM Scan you
can
without any knowledge of programming web pages create and maintain a web page.
This
will result in that you and your organisation save time and money. You can also
split the responsibility
for the webpage in different roles, but still keep the control.
We have chosen to create our CMS in a script language called php4 and with the
database
server MySQL, we have also used JavaScript a lot.
Digital kompetens - Äldreomsorgspersonals upplevelser av en digitaliserad arbetsplats
This study highlights the importance of computer technology and its impact on
elder care staff's skills development in the public sector. The government
presents the digital agenda within which information and communication
technology today is considered to have a potential for sustainability, growth
and development. According to the EU Commission, there are several important
elements that should be improved to digitize the workplace. Among these are
digital literacy, collaboration between agencies and increased investments in
research, education and innovation. New technology can be understood in
different ways by individuals, some see the computer as something positive and
exciting, while others may find it hard to see the opportunities for learning
and development.
Användarinvolvering i ett systemutvecklingsprojekt -Är det effektivt?
In most software engineering project, users are only involved in the beginning
of the project as a help to design the requirements specification but users can
be involved after this phase too, but is it effective to do so?
With this report we would like to investigate how effective it is to involve
users after the requirements specification has been written and approved.
To find out how effective it is to involve the users we try some fast and
simple involvement techniques on a quite far gone project. These techniques
include ethnographic studies, prototypes and surveys. We also interviewed a
couple of people who work with usability and finally delivered a report with
our results to them to find out if they found our result relevant. By also
documenting how much time we spent involving users we will show to which degree
user involvement is effective.
We found out that a couple of fast techniques could get very much result in the
form of usability enhancing suggestions to the developers.