Sökresultat:
1873 Uppsatser om Online payment security - Sida 14 av 125
Säkerhetshot och lösningar för privatpersoner med bredband
As more and more people gain access to broadband in their properties, the security threats get bigger. A lot more people also have computers that they carry home from work where they store important information concerning the company. The information stored on theese computers can be very easy to retrieve if you have the will and the skill to do it. Very few people have any knowledge how to protect themselves from theese threats..
?Nätdejting för olika åldrar? : En studie om Internet och dejting
Title: Nätdejting för olika åldrar (Netdating for different ages)Author: Henri NekmouchePurpose: The purpose of this study is to investigate what influence the medium Internethas had on building up relationships between people who have dated online, and tocompare two different age groups.Method/Material: In this study the author has conducted personal interviews with sixpeople who all have experienced Internet dating, and had their first contact with agirlfriend/boyfriend online. The questions asked were designed to help answering thepurpose of the study.Main results: This study shows that in general there is a positive view of Internet datingamong both groups. They appreciate the opportunities it provides, as they get to knowthe other persons personality first. Even so, it should be noted that they still tend to be abit ashamed to talk about Internet dating, and some don?t want to be associated with it.The communication pattern tend to be pretty much the same among both groups.
Att betala utan pengar : En studie om Sveriges största bankkoncerners produktutvecklingsprocesser av betalningslösningar och hur dessa kan effektiviseras genom ökad kundinvolvering
New innovation and technology have influenced the development of product development processes and the four largest banks in Sweden have more or less been forced to adapt their products and services along new customer requirements. It may therefore be considered appropriate to involve customers in this process. This by collecting customer information and allow customers to influence the process to a greater extent. The payment solutions of Sweden?s largest banks' continue to evolve and to pay with electronic money has come to change banks' product development processes of payment solutions.
Privilegierad mobilitet? : Flygplatser, resande och säkerhet
Never before have so many moved so frequently as now. Mobility lies at the centre for the concern ofstates, business and technological development. Some even claim that we are witnessing a mobility turn inthe social sciences. However, as the capacity to move has increased so too has the control and surveillanceof mobility become more extensive. Since September 11, 2001 security has been the defining paradigm fora variety for actors.
Som att hälla vatten på en gås! : En kvalitativ studie om att vara religiös på sociala medier
Denna studies huvudsakliga syfte har varit att undersöka och kartlägga hur unga vuxna frånkristna minoritetsförsamlingar i Västerbotten och Norrbotten upplever religiösa kränkningarpå sociala medier. Som bakgrund till denna studie ligger forskning kring sociala medier ochinternets nya status, web 2.0. Metoden för studien har varit kvalitativa forskningsintervjuer,en enskild intervju och två fokusgruppsintervjuer. Till hjälp under intervjuerna har memesanvänds som material. Resultatet av intervjuerna har framställts med ett fenomenologisktteoriperspektiv och visar på att dessa unga kristna upplever religiösa kränkningar online, mensällan gör något åt det.
En jämförelse av krypteringsalgoritmer
Today the Internet is used more and more as a transportation for information. Much of the information is confidential and should not be read by those not privileged. To protect the information from unauthorized access cryptography can be applied. The cryptography algorithms in use today all have their pros and cons. They are therefore suited for different applications.
Säkerhet i öppna WiFi-nätverk. En studie om hur användares medvetenhet om säkerhetsrisker vid interaktion med öppna WiFi-nätverk kan ökas
Public WiFi networks is one of the dominant technologies for users to get public internet access. The problem is that the networks are designed for accessability rather than security ? a problem users seldom are aware of. Users who carelessly access WiFi networks may reveal sensitive information which, among other things, can lead to an identity theft. Previous research suggests that users must be educated and informed about the risks they incur, but not how this should be done.
NATO 1989-2015 : NATO:s säkerhetpolitiska arbetsprocessfrån 1989 till 2015 sett utifrån Berlinmurensfall och konflikten i Afghanistan
The main purpose with the essay is to look into NATO and annalise how the organisation haschanged it´s security policy work process today 2015, seen from two different world eventsduring the period 1989-2015, the collapse of the Berlin wall and war in Afghanistan. Purposeand issuses also apply based on two theories Anarchymodel and World society model. In orderto highlight two different ways to see NATO:s security policy work process over time untilthe present day.Issues:? How did the fall of Berlin wall in 1989 change NATO:s security policy work process?? How did the war in Afghanistan in 2001 change NATO:s security policy work process?The essay is a qualitative method literature review describing NATO as an organisation andworld events that had impact on NATO over time.The result show that NATO has shifled it´s borders further fast because ?new? membercountries from the former Soviet Union are party members. NATO has moved closer toRussia, and increased in momentum.
Förtroende för socialtjänsten
The purpose of this essay is to examine trust, or lack of trust, in the social services. Previous research considering this topic is limited, which, in our point of view, implies the need of further studies. A quantative method was used, consisting of an online questionnaire containing statements about the social services. The statements were designed using a five level Likert-scale which required the respondent to rate their level of agreement. The questionnaire was published on five webcommunities directed to parents.
Säkerheten i trådlösa nätverk
The number of wireless networks has increased rapidly among both home users and companies in just a few years. That has brought a lot of good things with it, for example the possibility to connect wireless equipment to the network or Internet from an arbitrary position within range of the accesspoint. But since the transmissions take place through the air some new security risks appear. It?s difficult to restrict the signals to a specific space and thereby a lot easier for unauthorized to eavesdrop or disturb the signals compared to a traditional wired network.
Hur fungerar egentligen ko?pbeslutsprocessen inom e-handel? : En kvalitativ studie om konsumenternas beteende vid konsumtion pa? Internet.
Title: How does the buying decision process really function within e-commerce? - A qualitative study of consumer behavior when they consume on Internet.Institution: School of Economics, Linnaeus University, Va?xjo?.Course code: 2FE16E.Authors: Sara Hja?rne, Mathilda Perem, Ewelina Wallin.Tutor: Dan Halvarsson.Examiner: A?sa Devine.Key words: Buying decision process, purchase decision process need recognition, information search, evaluation, purchase decision, postpurchase behavior, consumer decision making, E-commerce, E- commerce channels, online shopping, online purchase, e-retail, internet shopping, electronic shopping, consumer behavior, online appereal shopping, social media, decision making, online retailing, website design, customer satisfaction, webshopping, perceived risk, convinience, price, online consumption behavior.Background: Buying decision process is a model that marketers use to get a better understanding of their customers and their behavior when purchasing a product. This process consists of five different steps; need recognition, information search, evaluation of alternatives, purchase decision and evaluation. Buying decision process has for a long time been an accepted model but scientists argue that the introduction of Internet as a channel for consumption has changed this process. The Internet has also led to a change of power in which customers today have greater influence, which greatly affects the buying decision process in e-commercePurpose: The purpose is to explore how consumers perceive their behavior when they consume through e-commerce.Research questions:How do consumers perceive the buying decision process they experience when they consume through e-commerce?How do consumers perceive different factors that are important to them when they consume through e-commerce?Methodology: Qualitative study, cross-sectional design, semi-structured interviews.Conclusion: This thesis shows that the traditional model of the buying decision process is not consistent with consumers' perception of how they are undergoing the process when applied to an e-commerce context.
USA:s officiella säkerhetsstrategi : Vad ligger bakom?
The purpose of this study is twofold: First, to inquire how the George W. Bush administration plans to keep America safe from external threats and second ? based on the assumption that neoconservatives have influenced the Bush administration ? examine how neoconservative ideas have influenced this strategy to protect America. The research questions are as follows:What is the content of the Bush administration?s security strategy?How are neoconservative ideas reflected in this security strategy?To answer the first question, the main points of two studied documents were summarized.
Ukraina: Realismens återkomst? : En kvalitativ textanalys om hur fred och säkerhet bör skapas i Europa utifrån teorierna realism och liberalism
Ukraine shares a long history with Russia. In the early 21th century, Ukrainians wanted a freer Ukraine. Therefore the orange revolution started in 2004 by the Ukrainians and had a positive outcome. The situation later became worse because of the economic crisis in 2008 and a corrupt president. The pro-western politician Petro Poroshenko was elected to become president in 2014.
Svenskt utrikespolitiskt beslutsfattande : Flernivåanalys av Sveriges beslut att bli en del av den europeiska säkerhets- och försvarspolitiken (ESFP).
In 1998 Sweden accepted the Treaty of Amsterdam which contained a development of the common foreign and security policy (CFSP) towards a European security and defense policy (ESDP). This thesis aims at studying the decision making process behind the Swedish foreign policy decision to further develop its security policy within the European Union. The purpose is to explain which factors and conditions that did affect and influence the Swedish foreign policy decision. The research applies foreign policy analysis, a theoretical perspective that analyzes both domestic and international conditions using different levels of analysis. The research methods being used has been qualitative as well as quantitative, complemented by interviews, since the research is a process tracing case study.The thesis conclusion is that the Swedish decision is explained by several factors.
Konsumenternas köpvanor inom olika försäljningskanaler : Skillnader mellan konsumenter som handlar i fysiska butiker, onlinebutiker samt inom brick and click
In Sweden today, the consumers have the opportunity to use the different sales channels; physical store, online store and brick and click, a combination of both. For the past decade, the use of ecommerce has spread tremendously and the fashion industry is one of the top three industries in this category. This, together with the growth of technology, have created new opportunities for consumers during their online shopping. The purpose of this study is to examine the differences between consumers who use physical store, online store or both. This study aims to look into consumers' shopping habits within these sales channels and factors that are affecting them.