Sökresultat:
1873 Uppsatser om Online payment security - Sida 11 av 125
Implementering av ett kortbetalningssystem
I ett kortbetalningssystem såsom Visa International Service Association (Visa) finns det fem stycken tongivande parter: kortinlösaren; kortutgivaren; kortinnehavaren; säljföretaget och Payment Service Provider (PSP). Ett säljföretag som låter sina kunder betala för varor och tjänster på sin webbplats skickar kundernas kortnummer krypterat till en PSP som vidarebefodrar dessa till VisaNet som är dataknutpunkten i Visa. VisaNet söker med hjälp utav kortnumret upp den bank som har utgivit kortet och efterfrågar samma bank om en transaktion får ske från kortet. VisaNet får ett svar som vidarebefordras vidare tillbaka till säljföretaget som sedermera även får sina pengar överförda till sitt konto från kundens konto.Uppdragsgivaren till detta examensarbete skall utveckla ett helt eget system och bli sin egen PSP utifall uppdragsgivaren beräknar att mer än 1,3 miljoner stycken kortbetalningar kommer att ske genom uppdragsgivarens kortbetalningssystem per år. När detta examensarbete utfördes uppskattades antalet kortbetalningar per år inte till denna siffra och rapportförfattaren utvecklade därför ett korbetalningssystem med hjälp utav en befintlig PSP.Kortbetalningssystemets kärna är ett API som andra systemutvecklare hos uppdragsgivaren kan anropa.
IT-säkerhet i små organisationer
IT- och informationssäkerhet är ett ständigt aktuellt ämnesområde. ITsäkerhetsarbetei små organisationer framstår som ett underforskat område. Föratt göra en kartläggning av hur arbete med risk, hot och säkerhet kan se ut i småorganisationer har vi genomfört en explorativ intervjustudie med representanterför små organisationer om deras arbete med IT- och informationssäkerhet. Vihar dessutom genomfört intervjuer med experter på området för att få ettbredare perspektiv. Tolkningen och analysen av intervjusvaren har utförtsgenom att först tolka svaren utifrån Security Controls och därefter analyserasvaren utifrån fem temaområden som vi funnit i materialet.
Native Advertising - En Ulv i Fårakläder
Along with the increasing trend of online advertising comes an increasing avoidance behaviour from the observers. The marketing communication now requires a valuable content, which leads to the creation of new online advertising forms; including content marketing, advertorials, online ads and the latest rising star - Native Advertising. The last-mentioned also constitutes the basis and object of study for this paper. The purpose of this study is to shed light into this relatively unexplored topic and concretize the true effects. There are many examples of how Native Advertising is framed and implemented, but little hard facts and real figures.
ELCERTIFIKAT - En diskussion kring de svenska elcertifikatens rättsliga natur, ekonomiska värde samt möjlighet att ta i anspråk vid en utmätning -
1st of may 2003, a new energy system based on electricity certificates, was initiated in Sweden. The purpose with this system, is to stimulate an enlargement of energy production from renewable sources. The electricity system, ist built on that the producers of energy from renewable sources confer a electricity certificate from the government for every produced MW energy from renewable sources. The electricity certificate is supposed to be turned over and with that generate reciepts to the producers. Furthermore there is an obligation for the energyusers und energysuppliers, that means that the users and the suppliers every year the 1st of april got to have electricity certificates in proportion to their energy consumption during previous year.
Flipp eller flopp?: En kvantitativ studie om bloggens potential som marknadsföringsmedium
The blog has become a widely discussed subject, but while marketers do invest in blogs, there is little evidence on the how the blog works as a marketing tool. Therefore, we thought it would be interesting to create a greater understanding of the blog's potential communication effects. To demonstrate the potential of the blog in comparison with more traditional media, we decided to compare the communication effects achieved by a blog with those achieved by an online magazine. We pursued an experiment where we exposed an identical text about a brand to respondents in seven blogs and in seven online papers and measured the resulting communication effects in terms of attitudes and intentions towards the exposed brand. The quantitative study showed that the blog in some basic aspects works as a more traditional media; when the consumer forms positive attitudes toward a text in a blog, the attitude spills over to the attitude toward the brand, with higher buying and w-o-m intentions as a consequence.
Finns kvinnor i säkerhetspolitik? : En undersökning av den svenska säkerhetiseringsprocessen avseende svenskt deltagande i den militära insatsen Minusma i Mali utifrån ett feministiskt perspektiv
Scientists argue that gender affects foreign policy and security policy, that ideas of gender are inconstant and that there is a lack of feminist perspectives in International Relations. The changes seen in the global security context may have challenged the way politicians and scientists understand war and its impacts, and led to increased gender awareness.Using securitization theory and feminist international relations theory, the aim is to examine how women and men are being spoken of in the Swedish foreign policy discourse regarding participation in the UN-led stabilization mission Minusma in Mali. By applying a feminist perspective on the securitization process, the intention is to increase the knowledge of whether there is gender awareness in this context.The result shows that there is limited gender awareness. There is minor consideration for the conflict?s different implications on the situation for women and men.
Människan och lärarprofessionen : En livsberättelse
The aim of this essay is to get a deeper understanding of a teachers' profession and to get knowledge of how earlier experiences can influence you as a teacher. I have interviewed a female teacher, Pia to get this understanding. As a tool to get the teacher's whole story I used the life story method. In her profession she is influenced by her own importance of security as a child.Her own needs of security has given her an deeper understanding for pupils like herself during the childhood; insecure and afraid. Her understanding for all kinds of behavior among the children has increased by her own experiences.The story shows that Pia is frustrated by the fact that she can't control her own working time.
Ett steg framåt eller ett steg bakåt? : En studie om hur konsumenter prioriterar säkerhet och enkelhet vid val av moderna eller traditionella betalningsmedel
Syfte: Identifiera de olika betalningsmedlen för att finna samband mellan upplevelserna av deras säkerhet, enkelhet och hur dessa aspekter påverkar valet av betalningsmedel.Metod: Kvantitativ metodTeori: Litteratur, vetenskapliga artiklar och empiriska rapporterEmpiri: En enkätundersökning gjordes för datainsamlingSlutsats: Undersökningen bekräftar att både upplevelsen av säkerhet och enkelhet påverkar konsumenterna i valet av betalningsmedel. Vår undersökning visar att enkelhet ör den vanli-gaste och viktigaste orsaken för en konsument i valet av betalningsmedel. Undersökningen visar även att i olika ålderskategorier skiljer sig användandet av de olika betalningsmedlen åt och den visar även på olika värderingsgrunder vad gäller säkerhet och enkelhet mellan ålders-kategorierna för valet av betalningsmedel..
Rumslig vägledning Tandvårdscentralen, Luleå
ABSTRACTMy degree project has resulted in the improvement of the guidance in the dental center?s entrance. The patients will now find it easier to understand and find the environment?s various functions, which is the reception, registration, payment, and waiting rooms. Norrbottens läns landsting has a concept ?hälsofrämjande väntrum? that provides guidelines for how they want their patients to experience their waiting rooms.
Koncern som tillväxtinkubator för småföretag : ? En fallstudie i ett shared service centers möjligheter attstödja entreprenöriella småföretag
???Information Technology is an essential part of the society today, not least in large ???organisations dealing with sensitive information. An example of such an organisation is the Swedish Armed Forces which indeed is in the need of ways to ensure information security in their Information Technology systems. The means which is used is an authorisation and accreditation process.All Information Technology systems go through a life cycle which includes realisation, usage, development and liquidation. In the Swedish Armed Forces the lifecycle is an authorisation process.
Veto: En motivanalys av FN:s säkerhetsråds fem permanenta medlemmars agerande i konflikten i Syrien.
Aim: The aim of this study is to analyse the possible motives behind the actions of the five permanent members of the UN Security Council in relation to the conflict in Syria. The background of this aim is the Arab Spring and the protests and violence that have followed the uprising. While, in Libya, the UN Security Council adopted resolutions that allowed sanctions against the Libyan government, no such resolutions have been adopted yet in Syria.Theory: The principal theory of the analysis is Stephen D. Krasner´s theory on sovereignty.Method: I have researched various resolutions and statements done in the Security Council, together with official statements from the actors, through Hadenius´ motive analysis methodology and Gilje & Grimen and Ödmans theories on hermeneutics.Conclusion: The conclusion of the analysis is that there, in the case of Syria and Libya, are two different parties in the Security Council. One that stands for sovereignty and one that stands for intervention.
Skriva lätt och förklara rätt : Om att anpassa webbtexter för nyanlända invandrare med måttliga kunskaper i svenska
In this degree project I have studied how an anti-discrimination bureau can adapttheir online information to the target group ? immigrants who only have modestunderstanding of the Swedish language. This group is often subject of discriminationmatters, and therefore it?s important that they can take part of the information.To find answers to my questions I have studied different relevant theories, performeda readability analysis on the online information and have had qualitativeinterviews with representatives from the target group. I have also tested my rewrittentexts on both representatives and other readers.The result from my studies has shown that it is words that are the most difficult inthe current online information, while length and structure of the sentences are alsoof importance when it comes to the readability.
E-handel : En studie kring betallösningar, säkerhetslösningar och certifieringar för små e-handelsföretag
Syftet har varit att på uppdrag av Periallo identifiera vad kunder tycker är viktigast ur ett säkerhetsperspektiv. Detta har skett genom att besvara frågorna vad som är viktigt för konsumenterna ur ett säkerhetsperspek-tiv när de handlar av små e-handelsföretag och vilka säkerhetslösningar samt betallösningar som är relevanta för små e-handelsföretag. Vi har även undersökt om det är värt för ett litet e-handelsföretag att investera i en certifiering. Arbetet har kartlagt betallösningar, säkerhetslösningar och certifieringar med hjälp av en kritisk litteraturstudie och med en enkät, det vill säga en kvantitativ metod. Resultatet av undersökningen har visat att de flesta kunderna känner sig trygga när de handlar på Internet.
Utvärdering av Near Field Communication och Certified Wireless USB: Säkerhet vid utveckling av applikationer
Today?s society is one where technological advances are made daily, which
increases the need to stop and assess the risks against users? integrity when
integrating new technology in contemporary systems all the greater. We have
taken two technologies, Near Field Communication and Certified Wireless USB,
whose envisioned area of use is to be integrated into mobile phones, and
evaluated what security threats are revealed for the respective technologies.
The threats against security have been identified through research of the
standards and existing reports for each technology. Practical experiments have
not been conducted on account of us not having access to any equipment to run
such trials.
Att tyda tecknen -En alternativ syn på förändringarna av Japans säkerhetspolitik
Japan's foreign and security policy has seen some substantial changes as a result of events like the first Gulf war and 9/11th. This has been taken as proof, by some, that Japan is abandoning its antimilitaristic stance and pursuing a more traditional hard power role through military means. This essay aims to explore if these shifts have coincided with any substantial shifts away from antimilitarism, which has had a strong influence on the country's security policy since the end of WW2.To do this I use constructivist theory, specifically regarding the impact of norms and identities on states security policy and briefly look into the problem of actor designation. The thematic focus is on security policy, from a narrow perspective, and thus I examine areas like the input and output to the Japanese military and the actual applications of this force. State identity is used to explore the prevalence of nationalistic sentiments and support for anti militarism in the public opinion and the political elite.The result of this study points to the further relevance of constructivist theory and especially the application of norms and identity.