
Sökresultat:
2133 Uppsatser om Computer security - Sida 8 av 143
??Auktorisation och ackreditering inom Försvarsmakten : En studie i nyttan av en standardiserad process för att hantera informationssäkerhet
???Information Technology is an essential part of the society today, not least in large ???organisations dealing with sensitive information. An example of such an organisation is the Swedish Armed Forces which indeed is in the need of ways to ensure information security in their Information Technology systems. The means which is used is an authorisation and accreditation process.All Information Technology systems go through a life cycle which includes realisation, usage, development and liquidation. In the Swedish Armed Forces the lifecycle is an authorisation process.
Datorspel - en lek eller sport? : En studie om hur tre svenska dagstidningar framställer e-sport och datorspel 2000-2013
This essay examines how three big Swedish newspapers depicts e-sports and computer gaming and how the depiction change during 2000-2013. The study will also examine whether e-sports is being portrayed as competitive sport. The purpose is to investigate which attitudes that can be identified towards computer gaming and its culture in major newspapers such as Aftonbladet, Dagens Nyheter and Svenska Dagbladet and how these attitudes eventually changed over time. The sources that will be used in both the quantitative and qualitative analysis are based on web articles, mainly because the paper editions does not provide much, if any, information about computer gaming and e-sports and also because of the convenience of being able to quickly find articles to study. Results indicate that computer gaming is being depicted in a clear negative fashion during 2000-2006, and that the depiction of e-sports is somewhat positive but not as glorifying as for the years 2007-2013. During this period, there is a apparent tendency of e-sports being introduced to readers who are unfamiliar with the gaming culture. As for the attitudes towards computer gaming, the depiction is still somewhat negative, mainly because the debate about computer games and violence was revived because of several acts of violence in shape of school massacres and mass murder.
De autistiska barnens dataprogram - hur bör de vara?
This report presents a study of the basic criteria for computer programmes that may be consideredadequate for aiding children with autism in their education and upbringing. I have based thisstudy on descriptions, opinions and proposals from people who deal with treatment and/orother issues concerning children with autism, as well as relevant literature.The study has been carried out in a major Swedish metropolitan municipality. The intervieweeswere civil servants from this municipality and representing different institutional endeavourson the issue of autism.I used a combination of both quantitative and qualitative techniques, as there was need for bothstandardization and qualitative variation. The main aim of the study was to seek suggestionson how computer programmes should be. That is, if they are to be considered appropriate föraiding children with autism develop their personality.The general conclusion of this study is that computer programmes, that may be consideredappropriate for the above mentioned purpose, should have certain characteristics of whichpedagogic usefulness and user suitability are of primary importance..
Den gemensamma utrikes och säkerhetspolitiken- Ett neo-funktionalistiskt perspektiv
This essay aims to explore the development of the common foreign and security policy within the European Union as well as the recent addition of the post of High representative in the field of the common foreign and security policy. This essay will attempt to achieve this trough exploring the questions; how have the aim of the European foreign policy developed, how the forms of cooperation has within this field developed and finally what impact will the recent addition of a high representative for the common foreign and security have. My aim is to answer these questions with the help of neo-functionalism.The results that came out of this essay point to the direction that the neo- functionalist premise about spill over effects and the notion about increased supranational influence turn out to have some validity in them. The study has shown that during the time the cooperation within the field of foreign and security policy have developed it is possible to see that supranational institutions will gain influence when the scope of integration within a policy area widens and deepens..
FN - i mäktiga staters tjänst En studie av hur FN påverkas av mäktiga stater
The United Nations is an important organization when it comes to international peace and security. Recent events in international politics, however, have brought about a widespread concern about the abilities of the organization. Powerful states have shosen to act outside of the organization to achieve their goals. They have furthermore a disproportionate influence on the decision-making body, the Security Council.The aim of this essay is to examine wheather UN can function productively as keeper of the international peace and security in the political climate of today, and to find out to what extent the powerful states harm the organization. I use a theoretical article, concerning states relations to international organisations, to analyse the acts of powerful states in UN.
Utvärdering av Falköpings kommuns Informations säkerhet
A student at the Technical University in Jönköping was given an assignment from Falköping municipality. The assignment was to evaluate their IT systems 'users' awareness of information security and even present suggestions for IT-Users to improve their information security within Falköping municipality.Falköping municipality consists today of seven administrations. The target groups for the study of the information security are a pilot group consisting of 30 IT Users and four different managers from various administrations within Falköping Municipality.The purpose of this work is mainly to indicate an understanding of the importance of the information security knowledge among IT Users in Falkopings municipality, mainly those who use their smartphones and tablets for work-related activities.This work aims to answer the following questions:? How wide is the awareness of information security among municipality's IT users?? How can information security improve among the municipality's IT users?Theories that work consists of are mainly what information security is, how it is handled and the threats and risks that may create problems for the municipality, basically when IT Users use their smart phones and tablets.The Work Implementation started with sending surveys to a pilot group of IT- system users and the student even interviewed four general managers working in Falköpings municipality. Both the questionnaires results and interviews results are presented in diagram and text.The result from both surveys and interviews was very positive and it shows that the municipality investigated IT-Users are very aware and have knowledge about information security, when they use their smart phones and tablets.
Pensionären och paddan : En studie av pensionärers upplevelser av läsplattor
Portable IT devices such as laptops, smart phones and computer tablets are becoming ever more ubiquitous. At the same time, the population of the Western world is growing older, with aging bringing about changes with regards to individuals' physical and mental capabilities. These facts raises important questions about how well suited these devices are for use by elderly people. This study focuses on the cognitive aspects of the devices' usability, using the concept of mental models to analyze the users' understanding of a computer tablet. It also draws upon theory of graphical user interfaces in its analyses.
Analys, design och implementering av Orbit ones dokumenthanteringssystem
This report describes the development of a system for controlling documents.
The report
starts with a problem description which the company wants an intranet-based
solution
for. The report then continues to describe the development phase for the
different parts
of the system which results in a complete system.
The company that wanted this system is called Orbit One and is located in
Ronneby,
Sweden. They have had a problem with old documents circulating in different
versions
and in different binders. Now thanks to their new system they can access their
documents easy and on demand through their intranet..
Är vi artiga mot virtuella agenter?
The CASA-paradigm, Computers Are Social Actors, was introduced in the book "TheMedia Equation" by Reeves and Nass. One of their experiments concluded that we tend to be polite to computers in the same way as we are to people. In this study I have replicated Reeves and Nass experiment but instead of a text-based interface I have used a virtual agentin order to find out if we are polite to the agents, or still to the computer. Two experimental setups was conducted. The two setups had a common first part that was carried out on onecomputer with one agent.
Riskanalys inom intrångsäkerhet på webbplatser
Attacker och intrång på webbservrar är idag vanligt förekommande. Webben gör
det lätt för hackare, knäckare och andra inkräktare att hitta sårbara servrar,
och det finns gott om tips att hämta för den som vill lära sig hur man gör
intrång. Det finns ett flertal olika intrångsmetoder som utnyttjar olika typer
av svagheter i datorsystemen. Denna uppsats inriktar sig på svagheter i
webbplatsernas serverskriptsystem, dess skriptkod och konfiguration. Syftet är
att undersöka huruvida intrång kan göras med endast en webbläsare via
webbplatsens offentliga webbsidor.
Genom att kombinera tre olika metoder - litteraturundersökning, en enkät och
ett experiment - undersöker uppsatsen hur serverskriptintrång fungerar.
Facebook och ansikte mot ansikte-kommunikation : En undersökning bland 100 ungdomar i Karlstads kommun om deras kommunikativa vanor
This essay deals with the subject of communication through Facebook. In this survey we studied 100 youths from Karlstad and their communication habits and behavior patterns on Facebook. The social network site Facebook has since its start in 2004 made a mark in modern communication. Today in 2010 the site has more than 500 million users. This paper wants to study what happens to other types of communication.
Sensorsystem till hinderhanterande robot
The projects goal is to construct and program a robot that is controlled from a computer but also have an obstacle handling function that allows the robot to navigate around the object by itself.The robot is a simple construction and the number of components and functions is kept at a minimum. A tricycle construction was chosen because it?s the simplest. Communication between the robot and the computer also kept as simple as possible..
Utvärdering av Near Field Communication och Certified Wireless USB : Säkerhet vid utveckling av applikationer
Today?s society is one where technological advances are made daily, which increases the need to stop and assess the risks against users? integrity when integrating new technology in contemporary systems all the greater. We have taken two technologies, Near Field Communication and Certified Wireless USB, whose envisioned area of use is to be integrated into mobile phones, and evaluated what security threats are revealed for the respective technologies. The threats against security have been identified through research of the standards and existing reports for each technology. Practical experiments have not been conducted on account of us not having access to any equipment to run such trials.
Betydelsen av ett fritidsintresse : Fotboll som prevention och identitetsskapande för unga
This essay deals with the subject of communication through Facebook. In this survey we studied 100 youths from Karlstad and their communication habits and behavior patterns on Facebook. The social network site Facebook has since its start in 2004 made a mark in modern communication. Today in 2010 the site has more than 500 million users. This paper wants to study what happens to other types of communication.
Prestanda och precision pa? en enkortsdator i ett system med realtidskrav
The report aims to investigate how well a certain type of affordable embedded single board computer can hold up against today's more expensive computers in a computer system by doing various tests on a system with the specified requirements. The system has a Raspberry Pi as the single board computer which task is to control a camera based on coordinates obtained from a server as well as capture and stream a video signal on a network.The researches were conducted to check how much network traffic a single-chip computer sent in different video formats and how much CPU utilization was required. Studies were also made to ensure the accuracy of the camera control. The researches have been experimental, where several tests have been performed and analyzed.The results show that a sufficiently good accuracy can be obtained from the camera steering unit, in which two different servos have been investigated. When the video format MJPEG and H.264 are used, the single-chip computer is able to transmit a video signal up to 1280x720 at 15 fps.