Sök:

Sökresultat:

18114 Uppsatser om Information privacy concerns - Sida 5 av 1208

Privatisering av folkbibliotek skildrat i politiska dokument under 1990-talet

This masters thesis is a study of official political documents in order to discuss privatisation and the Swedish public libraries. In the 1990s public libraries became placed on contractors, and that was said to be one form of privatisation. The main issue for this study concerns driving forces and obstacles for privatisation of public libraries. Another issue concerns advantages and risks. We will also discuss how the future of public libraries will be in this context.

Hur organiserar forskare sitt material? : Personlig informationshantering i en vetenskaplig forskningsmiljö

The domain of this thesis is Personal Information Management (PIM) which is a sub-domain to human-computer interaction (HCI) that specifically concerns the interaction between human and information. The purpose of the study is to make an exploration of information management in a scientific research setting, to study which tools and strategies for information interaction that are used in the context and to suggest possible improvements of today's practices. Three in-depth interviews with scientific researchers have been conducted followed by a qualitative analysis of the results. The results show that there are great variations among the three respondents and that there can be distinguished as much as 15 different dimensions that when put together forms a unique PIM profile for each individual. The recommendation following this is that tools for PIM have to allow a high degree of individualisation.

Finansiella analytikers användning av redovisningsrapporter : En studie av möjliga konsekvenser med ett utökat informationsinnehåll

The accounting of today results in reports that are valued according to one kind of value.There are advocates who recommend that the accounting should be expanded by one orseveral columns, which would enable that other methods of valuation could be used. In thisessay we examine how the ?multi column reporting? can alter the outcome of a financialanalysts? valuation procedure.In this essay we used existing theories about the financial analysts? usage of information toreach the lack of information we found and which we aim to erase whit this essay. To do thiswe studied decision theories and theories regarding information processing, and by interviewswith three financial analysts. After we collected the information needed for the analyses, wethen also compared the results of the interviews with related theories.The theories about decision in this essay concern whether a decision is based on rationality,bounded rationality or irrationality.

Trafikinformation via SMS

Abstract The technology has made it possible for you as a train traveller to be available in other places than stations and on the train. You now have the possibility to communicate by the phone or through the Internet to get information about the train you want to take. Development in mobile technology gives us new possibilities to communication. We want to find out whatever SMS would be a suitable approach to inform passengers about delays. The problem formulation is ?If the technology is available to inform the passengers about delays in an more effective way than today, then why not use it? The ?Kustpilen? that operates in Blekinge and Skåne is the case for our study.

Barn möter information och media; En fallstudie om det pedagogiska arbetet på ett högstadium rörande kritiskt förhållningssätt och helhetsperspektiv gentemot information och media.

The purpose of this thesis is to draw a picture of pedagogical work at the senior level with a critical perspective of information and media. As a method for gathering material for the analysis, a case study was made with qualitative interviews together with documents that describe the case. Relevant literature for the subject has been used as an introduction and as a theoretical basis. The literature concerns subjects such as a childrens relation to media, the schools intructions, the role of the school library and some theories regarding learning. The conclusion is that the respondents focus on conversations and reflection regarding the sources of information and its use, and that the childrens adaption of the material is an important factor in teaching.

Framtidstankar hos unga kvinnor som skär sig

The number of young women who self-mutilate in different ways has increased dramatically in recent years. Self-mutilation is a way of trying to feel better for the moment. People who self-mutilate often have some other underlying illness such as borderline disease. Women are overrepresented in this group of people and their behaviour is often rooted in a history of childhood trauma, sexual abuse, and psychic maltreatment. The aim of this study is to reveal thoughts about the future among young women who self-mutilate.

Sociala fotspår på Internet: Jag vet vad du gjorde... just nu

Na?r sociala na?tverk blir en del av va?r vardag o?ppnas uppenbara mo?jligheter till interaktion och na?tverkande pa? Internet med va?nner, kollegor och bekanta. Samtligt som sociala na?tverk erbjuder anva?ndare intressanta redskap, med ma?nga fo?rdelar, fo?r att kunna interagera utsa?tts samtidigt anva?ndares personliga integritet fo?r risker och hot. Denna uppsats underso?ker vad som oroar anva?ndare mest pa? Internet, va?rdet av en skyddad privat sfa?r utan insyn, varfo?r vi delar med oss av privat information pa? sociala na?tverk, vad kan man ta reda pa? utifra?n den information som finns tillga?nglig samt hur kan vi ba?ra oss a?t fo?r att inte fo?rlora va?r integritet pa? Internet.

Informationssa?kerhetsanalysers verksamhetsnytta : Utva?rdering och fo?rba?ttringsfo?rslag

The importance of good information security and safety grows larger and larger for each day in the information society of today. This concerns citizens, companies and public authorities. At the Swedish Transport Administration, the operation of an information security and safety process has evolved over the years to guarantee that the public authority can be trusted by its citizens, cooperating companies and other public authorities. This responsibility has been assigned to the Information Security and Safety Department (Informationssa?kerhetsavdelningen, ITsa?).In this thesis the aim is to review to what extent ITsa? achieves any business benefits for the Swedish Transport Administration, and to analyze, streamline and come up with solutions to improve their workflow.

Mediadatabas med webbgränssnitt för hembygdsförening

Throughout the years the Swedish local history societies have collected a large quantity of material, consisting of photos, documents and items, among others. As the society has become more computerized, the need has increased for these collections to become digitalized. This is a way to make their media more easily accessible to the general public, but also to easily be able to archive and preserve for example photos and videos electronically.This thesis concerns itself with the work we have done for the local history society of Nyed in Molkom. The task set before us consisted of creating both a website for the society, and a reliable database from witch the website draws its information. This project allows anyone with administrator privileges to upload new files and any additional information.

Kunskapsteori och kunskapsorganisation: En diskursanalys

This Masters thesis concerns epistemology in Knowledge Organization KO, as a field of study in Library and Information Science LIS. Using a theoretical model by Birger Hjørland and foucauldian discourse analysis as springboards, this study analyses three epistemological discourses in the practice of KO. The aim of the study is to show how these discourses are constituted and demarcated in relation to KO, as well as to examine how they fit into Hjørlands model. A brief historical outline of some epistemological trends in LIS is sketched, as well as examples of how different epistemological schools influence different parts of KO, e.g. information retrieval, indexing- and classification theory.

Sveriges informationsutbytesavtal med Monaco och Liechtenstein : Leder avtalen till ökad insyn och effektivt informationsutbyte?

This thesis concerns agreements for the exchange of information relating to tax matters between Sweden and the previous tax havens Monaco and Liechtenstein. Monaco does not apply any tax on income or capital for individuals and Liechtenstein has strict bank secrecy, both aspects are supposed to be counteracted by similar agreements. The purpose is to investigate whether the entered agreements increases transparency and effective exchange of information in accordance with the OECD´s objectives in the area. Furthermore, is there any regulation in the agreements that can be seen as potentially loopholes to avoid the exchange of information and if so; may these loopholes be justified in any way?OECD believe that the tax havens favorable tax regulation is resulting in harmful tax competition and they identify lack of transparency and lack of effective exchange of information as the main reasons.

Företagsbibliotek i förvandling : företagsbibliotekens tjänster i informationsåldern

A company library can only exist if it contributes to a positive result for the company. As endusers are beginning to perform searches on the Internet and have access to databases and electronic documents via their desktops it becomes important for company librarians to thoroughly think through what services should be offered to the users so that the library still contributes to the company s profit. The aim of this dissertation was to try to define the services that the company library offers its users having in mind the changes that have taken place concerning the availability of information. I also wanted to explore whether the librarians had the necessary competence to perform the services offered. Six information specialists were interviewed to give their view on the services their libraries offered.

Ägandeskap av data i molnet - En studie om företags attityder och resonemang kring ägandeskap när de placerar sin data i molntjänster

Cloud computing has become a very publicized and popular concept in recent years, both in business literature and research, where data ownership is the security aspect which has usually been ranked the highest of the disadvantages that can be identified with cloud services. Today there is a lack of research on information ownership from an informatics perspective, as it is most often discussed from a legal perspective.In our study we interviewed six different companies that use cloud services, on which attitudes and reasoning they had on their information ownership. We compared these attitudes with the attitudes we identified in business literature and research on the subject. In business literature we found four recurring themes which were very clear about how a company should govern information ownership.Overall the results of our interviews showed that there is widespread ignorance at the companies on how information ownership in the cloud is regulated between the company and the cloud provider. All companies expressed that they had not experienced any change in ownership when they placed their data in the cloud, and they expressed no major concerns about how the ownership was handled.

"Snipp snap snut, nu tog tiden slut" : En analys av användares medvetenhet kring integritet på mobilapplikationer

This study focuses on the integrity of students at Uppsala University that has used the university?s network, UpUnet. We?ve studied their opinions with the use of questionnaires that cover questions related to privacy and awareness about logging of data traffic.The results showed that more students than our hypothesis suggested were unaware of the surveillance on the network, and the majority of these also had a negative opinion towards logging of data traffic. However, we found that there were several relations between how the students responded on our questionnaire, and we?ve presented these in the analysis chapter towards the end of the essay..

En jämförelse av krypteringsalgoritmer

Today the Internet is used more and more as a transportation for information. Much of the information is confidential and should not be read by those not privileged. To protect the information from unauthorized access cryptography can be applied. The cryptography algorithms in use today all have their pros and cons. They are therefore suited for different applications.

<- Föregående sida 5 Nästa sida ->