Sök:

Sökresultat:

2133 Uppsatser om Computer security - Sida 31 av 143

Sufism inom den somaliska diasporan i Göteborg

The aim with this study is to explore if and how linguistic learning takes places when four pairs ofstudents in grade one writes on the computer. Observations of eight students took place duringtwelve lessons to investigate what happened during their writing processes. This study isimportant because students? computer writing is a relatively new phenomenon in the Swedishprimary school.It is clear that the peer collaboration creates a complex interaction that becomes the platform, andalso the prerequisite, for successful language training. The method can clearly give students profitsin their linguistic development.

Filter = censur? En enkätundersökning om bibliotekariers rätt att begränsa information med hjälp av datorfilter.

The main purpose of this paper is to examine librarian's opinion of computer filters, to bring order in the debate on these filters and also to encourage future debate on this subject. The main problem is whether librarians themselves think they have the right to limit the public access to information on the Internet by using computer filters. We will also see how many public libraries are using filters, why they have chosen to use or not to use them, what is the librarians' opinion of filters, what rules exist regarding the use of the Internet, and finally if it is legal to use filter programs in public libraries. We have also included a short report on what filters are and how they work. This paper deals only with Swedish conditions on a number of public libraries.

Affärssystem för Gamersneed Sweden

This degree project deals with the creation of a business system for Gamersneed Sweden. The system is divided into two parts, one windows appliction and one websolution..

Datorspel för lekfull och interaktiv teckeninlärning: utvärdering och vidareutveckling av en prototyp

The aim was to evaluate and suggest improvements for the prototype TIVOLI (sign-learning via computer-based playful interaction). The game purposed to give children who need signing as augmentative and alternative communication enhanced signing skills. Three children in need of signs played TIVOLI at home during 4-5 weeks. Data contained parental interviews, Talking Mats interviews, assessment of signing competence before and after the evaluation period and game protocols. One game interaction per child was filmed.

Bakhjulsupphängning, fyrhjuling

Highland Group AB was helping a customer of theirs to create an All-Terrain Vehicle (ATV), a project Highland has never been involved with before. For the wishbone arms of the wheel suspension, traditional manufacturing methods and tubes with cylindrical or square shaped cross section was preferred. We performed a simulation where the ATV was driving on a bumpy road too see the forces involved. With the results we proceeded to calculate the strength of the concepts to find out which is best suited for the tough environment in which the ATV is used. The concept that turned out to be the best was a wishbone made of circular cross section, which had good structural strength and did fulfill the demands that we required for the construction.

Gruppdynamik : en social gemenskap

The purpose of this work is to create more knowledge about the teacher's perceptions of group dynamics and its impact on school activities. How do teachers opportunities and obstacles in order to influence group dynamics among students. The questions I have answered is how the teachers see the importance of a functioning group dynamics in school, how teachers work with group dynamics and how teachers describe the opportunities and obstacles for effective group dynamics. The method I am using at work is a qualitative research method that involves obtaining the teachers' own thoughts, feelings and experiences around the right questions. I have interviewed three teachers in primary schools in the county of Stockholm to find out their particular approach.

Betongarbeten under vintertid : Fokusering på platsgjuten betong

This report is on concrete work during the winter and is implemented on Peab?s behalf. The assignment was to describe the differences between a summer- and a winter casting. While it shows the complications that exists, it also show what aids are available, both electronic via computer and physical aids.The information that I have developed is originally from theory in books, information on the internet as well as practical experience from knowledgeable people that works in construction output. Other theories are those I have learned throughout the education to become a construction engineer, including all oral sources over the years.The results I have come up with, I hope will be able to help future construction projects in the planning phase of a winter casting.

Informationsteknik och högskolan ? policy och verklighet

The main objective of this thesis is to examine the situation concerning information technology, computers and information resources for university students at a selection of universities, and their libraries, in Sweden. Another objective is to compare this situation to what is stated in policy documents on the subject, and if the size of the university matters regarding resources. The thesis starts with a discussion of several authors, Frank Webster, Paul F. Burton and Lars Qvortrup among others, and their views on the information society. These range from whether we are living in it, are in a transition period or are still in the Industrial Society.

En Kommunikations Illustration : Interaktionen mellan deltagare i ledarlösa samarbeten

Purpose: The objective of this study is to illustrate how participants in leaderless based projects communicate with each other. Several studies have focused on technology-supported projects, such as open source projects, with an established project manager and goal. There is a lack, to the best of our knowledge, in studies that deal with the communication pattern in a leaderless computer supported collaborative project.Method: We have chosen to use a quantitative method where we systematically group several messages according to their content. This method was used in a similar study to illustrate the communication between participants involved in an open source project. We have taken the same Kripendorff based method and adapted it to our study by adding more descriptive variables.Theoretical perspectives: Manuel Castell discusses the aspects of a new communication power that is rooted in the individual as part of a larger creative audience.

Förbättringsarbete på monteringsbana

In this project we have used the theory of analytical mechanics to derive equations of motion for complex mechanical systems in order to study their behaviour over time. Even if the theory provides powerful tools to tackle tough problems which would be very hard to solve by methods of Newtonian mechanics, you are still relatively limited without running any computer simulations. One realises that in a faster rate it will be an incredibly difficult task to find an analytical solution when the degrees of freedom increases. Even if one would succeed to derive the equations, one still has to solve them to get the information of the systems behavior. Of experience one knows that the equations in general are nonlinear and hence must be integrated numericaly.

Utvärdering av lösningar för hårddiskkryptering

Information stored on unprotected computers that gets lost or stolen, and falls intothe wrong hands, can easily be accessed by moving the hard disk to a controlledcomputer, or by booting the computer from a removable medium, in order to getaround the operating system login. This is something that largely affects companieswhere customer information, trade secrets and other sensitive information can becompromised. A classic solution to the problem is encryption of individual files, but ithas some drawbacks as it puts a great responsibility on the users and unencryptedinformation can be left by mistake. A better solution to the problem is transparentencryption of the entire hard disk, i.e. that encryption and decryption of informationis performed automatically and without the user being affected.

Peer-to-peer som företagslösning

Problemområde: Idag är användandet av peer-to-peer (P2P) - applikationer såsom KaZaa, ICQ och Seti@home utbrett bland privatpersoner. Användningen inom företag är dock ännu i sin linda. Vi kommer därför i den här uppsatsen utreda om ett eventuellt införande av P2P- teknik i ett företagsnätverk ger några fördelar jämfört med en klassisk Client/Server-lösning. Hypotes: Arbetet bygger på hypotesen: ?En P2P-lösning ger fördelar för företaget jämfört med en Client/Server-lösning? Genomförande: För jämförelsen mellan P2P och Client/Server definierades och jämfördes fem områden: Säkerhet, Användbarhet, Tillgänglighet, Bandbredd samt Utrustningskrav. Slutsats: Inom områdena Användbarhet och Tillgänglighet ger en P2P-lösning klara fördelar, däremot inom områdena Säkerhet och Bandbredd visar Client/Server- lösningen istället klara fördelar. Området Utrustningskrav är oavgjort då det inte finns någon märkbar skillnad på lösningarna. Säkerhetsproblemen är P2P-teknologins akilleshäl och det problem som är mest troligt att stoppa stora investeringar i framtiden om det inte löses. Slutsatsen av vår jämförelse blir sålunda: För ett företag som redan har ett existerande Client/Server-nätverk är det inte någon idé att helt byta system, däremot kan det vara av intresse att introducera en applikation som möjliggör skapandet av så kallade Virtuella Nätverk. För ett helt nytt företag kan skapandet av ett P2P-nätverk vara ett väl så intressant alternativ till Client/Server.

Samverkan eller motverkan? En studie om myndighetssamverkans konsekvenser för rättssäkerheten och barnperspektivet

Children that are taken care of for institutional care by the social services are unprivileged as a group. When society takes over the parenting role, it forces local governments and other accountable authorities to guarantee these children satisfactory support and good care according to each child's needs. The aim of this thesis is to analyze and discuss problems with implementation in policy processes when authorities incorporate. From the normative standpoint of legal security and the United Nations Children's Convention, this thesis investigates the consequences of interaction between two Swedish supervisory authorities for the social services: Socialstyrelsen and länsstyrelserna. To fulfill the aim I will investigate the approach taken by the authorities and the work division between Socialstyrelsen and länsstyrelserna.

"Storebror" kommer till stan? En diskursanalytisk studie av debatten kring kameraövervakning av "Stråket" i Malmö

Social control in different forms has existed in all known societies. This control has taken different shapes and expressions. In older smaller communities there was a collective control among the citizens. In modern societies the state is trying to control the lives of the citizens. These control mechanisms can be seen as both freedom-reducing and freedom inducing depending on which concept of freedom one upholds.

XML som informationsbärare för EDI

Information handling has been a key issue for different companies for a long time. Electronic Data Interchange (EDI) is used to transfer different business documents from one company to another. This is done in such way that the information itself is separated from how this information is stored and handled in the companies internal systems. As different companies have different systems there is a need for a standardised format for this exchange. There is a big difference between EDI-systems based on what kind of EDI-standard is used. The most common standard in Europe is EDIFACT, but with increased interest of using the Internet for business communication there is a need for a standard that is adjusted for use over the Internet.

<- Föregående sida 31 Nästa sida ->