Sök:

Sökresultat:

805 Uppsatser om Mobile threats - Sida 7 av 54

Vägen mot säkerhet - får alla gå med? En kritisk, feministisk analys av det traditionella säkerhetsbegreppet.

In this essay I analyze the concepts security and security policy from a critical, feministic point of view. The traditional way of thinking security is state-centred and narrow with its military oriented threatening pictures and solutions.I advocate that the two concepts need a more feministic and holistic approach to be able to cope with the threats of our time and include the security for women explicitly.To suggest how this can be done I introduce a model; security-sphere, which should be seen as a way to constructively connect my objections to the existing research with a new approach to security problems. The security-sphere is based on two analytical parts; the private security sub-sphere and the public security sub-sphere, in order to make new images of security problems visible.It is a fact that most of the threats against women specifically, take place in the private sphere where no traditional analytical tools reach in - these threats have not been seen as 'real' security problems. My aim is therefore to integrate these issues into the agenda of security policy..

Mer värde i mobilen och mindre i plånboken - En fallstudie av mobila betalningslösningars genomslag i Sverige

This thesis presents the question of a possible breakthrough for mobile payment solutions in Sweden. The way payments are made and the way cash is being used in the society is changing. To be accepted as an alternative method, if cash isn't king anymore, the new technology will have to acquire user acceptance. In this thesis a case study of Swish, a mobile payment solution for P2P-payments, is presented. The focus of the study is customer value and technology acceptance of the service.

Applikationsutveckling baserad på mobilkameran

Mobile application demands a lot of attending to the program code. There are lots of different development platforms that can be used for development. Not only for the specific operating system there are also lots of different cross-platforms that should minimize the amount of program code. This report is comparing the way of creating an android application in the cross platform Xamarin versus in the platform Eclipse using the Android plugin. It contains a part about the architecture of Android and its functions.

Mobil kommunikation och högre tillgänglighet vid längre elavbrott : Exemplet stormen Dagmar och 4G-kommunikation inom smarta elnät

To be able to secure a safe and reliable power supply is becoming increasingly important since society depends on services and functions that need continuous power supply. The delivery rate in Swedish power supply is 99.98 % which insists on a high availability. During the past decade several storms has passed Sweden which resulted in large amount of tree felling leading to extended power outages. During these storms many socially critical activities, such as electric utility company Fortum, experienced disruption in mobile communication which affected the crisis management. This paper has investigated Swedish mobile operators? crisis management at Hi3G, Tele2 and TeliaSonera with a case study of the storm Dagmar that hit Sweden during December in 2011.

Hot och våld i arbetslivet : - En kvalitativ studie om socialsekreterares utsatthet

The purpose of this study was to investigate how social services workers describe, the risk of being exposed to threats and violence in their profession. Six social services workers were interviewed, four from the Welfare Office in a major city and two from the Child and Family Services in a minor city. Results showed that the majority of social services workers consider themselves exposed in their profession, meaning that they feel there's a risk of a violent or threatening situation occurring in their work situation. All interviewees had experiences from some sort of threat or violence in a work related context and they attested that non-personal assaults, such as threats made through telephone, email and answering machines are more common than verbal assaults made in personal meetings. Being prepared and listening to ones intuition is a way of dealing with exposure when meeting with a client.

Den mobila prefabriceringsfabriken : Ett nytt produktionskoncept

This is an investigation of a mobile prefabrication factory´s competitiveness and profitability which also will result in a suggestion for a design of the factory. The mobile prefabrication factory is an idea of a new concept for production which is meant to be used in the manufacture of slab. The main intention with this concept is that by using a fast established prefabrication factory to produce elements near the construction site, thus avoiding transport from the factory to the building site. This means not only an environmental and economic gain, but also that you can avoid risking damage the elements which often occur during transportation. The contractor is owner of the mobile prefabrication factory and can thus avoid long waiting times and cyclicality.

Enterprise Mobility: Effekter på den individuella arbetaren. En fallstudie av en mobil affärsapplikation hos ett teknikföretag i Västsverige

Using mobile technology to make ends meet is currently a reality for many people. More and more peopleare working while travelling or work from home. Most knowledge workers are equipped with laptopsand smart phones. To find out how individuals are affected by having the ability to stay continuouslyconnected and work with mobile business applications, we have conducted a case study and in closecooperation with a company have created a prototype of such a mobile business application. Fourindividuals have tested our application and were then interviewed.

Utvärdering av Near Field Communication och Certified Wireless USB : Säkerhet vid utveckling av applikationer

Today?s society is one where technological advances are made daily, which increases the need to stop and assess the risks against users? integrity when integrating new technology in contemporary systems all the greater. We have taken two technologies, Near Field Communication and Certified Wireless USB, whose envisioned area of use is to be integrated into mobile phones, and evaluated what security threats are revealed for the respective technologies. The threats against security have been identified through research of the standards and existing reports for each technology. Practical experiments have not been conducted on account of us not having access to any equipment to run such trials.

Livsmedelssäkerhet, konflikt och hållbar fred - en teoriutvecklande studie om matens makt

In our world, more than two billion people are living under insecure food conditions and more than eight hundred million people are estimated to be starving. The majority of these people live in developing counties which are poor and often subject of civil war. The past fifty years the main subject of security analysis has been the sovereign and rational state and the threats have been viewed in terms of military and weapons of mass destruction. This has come to change over the last decades and security as a concept has broadened, which better represents the reality of today. Within this broader conceptualization of security the main referent of security is the individual, rather than the state, and threats are not only analyzed from a military point of view, but also seen as threats against human rights and freedoms.

Utveckling av tjänster för ett mobilt medium

The mobile revolution is here to stay, and today most people have (at least) one cell phone at home. Some even a PDA (Personal Digital Assistant)as a complement for the simpler tasks at the office, e.g sending e-mail, word processing, browsing the Internet etc. Many business have also given the employees the opportunity to do some of the business tasks inbetweeen customer visits with the help from a cell phone or PDA.Despite all this, the so called Internet connected mobile revolution is often mentioned as a big failure. Maybe because the people in general tended not to use the new technology as much as the companies predicted. This could be because they still haven't learned how it works, or just don't seem to have the need for services provided.After a couple of failures in the development process, almost every cell phone has support for mobile Internet today.

Hot, våld och trakasserier mot lärare - en fenomenografiskt inspirerad studie vad gäller rektorers och lärares uppfattningar

The aim of this study is to describe what teachers and principals experience in schools regarding threats, violence and harassment towards teachers. A phenomenographical inspired approach has been used to describe and analyse the conceptions of five teachers and five principals. The findings of the study indicate that there is no impending risk for teachers to suffer from violence, threats or harassment. However, it does occasionally happen, and the findings of the study indicate that there are some factors that increase the risk. The major three factors are: fear, personality and inexperience.

Morgondagens marknadsföring

Purpose/Aim: The purpose of this study was to investigate future marketing channels from the perspective of professional marketers.Material/Method: The study is based upon interviews with six professional marketers.Main results: Traditional marketing is not being put aside but needs to be combined with new methods. There are several new and exciting ways to gain attention from the audience, all depending on the purpose of the campaign. Mobile technology is considered upcoming and target group defining is a key issue..

Användbarhetens roll i de mobila webbshopparna

This paper reports a study on the usability of e-commerce accessed through smartphones. There is much research in the usability of mobile interfaces and many sets of design patterns have been created but a few studies are available for specific domains, and in this report we focus on mobile e-commerce. In this study a framework is developed for how to design mobile e-commerce interfaces with a high degree of usability. Furthermore, the study also contributes a method to how other specific domain can develop a framework with general standards to work from when creating a web interface. By examining two sets of design principles and 14 design patterns, we evaluate which ones are critical in the design of a mobile e-commerce interface for achieving a high degree of usability.

Positionering i GSM-nätverk

Merparten av de kommersiella system för mobilkommunikation som finns och byggs i världen idag bygger fortfarande på GSM, antalet abbonnenter är över 2 miljarder. För att utöka funktionaliteten med mobila terminaler har det forskats på att införa positionering i GSM-nätverk. Tjänster som använder abbonnentens positionsinformation kallas Location Based Service och de ger möjlighet att utöka funktionaliteten och spara användaren av tjänsten arbete. Rapporten beskriver olika tekniker för positionering och slutsatsen att CGI-TA är den teknik som positioneringen ska byggas på. Denna teknik finns tillgänglig hos de svenska operatörerna idag och för att kommunicera med dem används Mobile Location Protocol 3.0.0.

Återanvändning - Sättet att ge hemelektronik ett andra liv

Increased consciousness about environmental and sustainable issues has led to consumers and companies who are more in favor of reuse and recycle. Even though this is a fact, people today are buying new things more often compared to before. For instance for a mobile phone the functionality lifecycle is eight years which can be related to the economic lifecycle today which is 1.5 years compared to 3 years in 1995. Only 1-2 percent of the mobile phones thrown away in Sweden today are handed in for recycling. The purpose of this study is to investigate whether an international company within the recycling and reuse of mobile phone industry has a market in Sweden.

<- Föregående sida 7 Nästa sida ->