Sök:

Sökresultat:

1873 Uppsatser om Online payment security - Sida 16 av 125

Bluetooth and security

Detta arbete behandlar hur Bluetooth fungerar samt säkerheten kring Bluetooth och några allmänt tillgängliga attack verktyg. Syftet med uppsatsen är att försöka fastställa hur säkert Bluetooth är i dagens läge. Bluetooth har länge varit tillgängligt för att utbyta data över korta avstånd. Därför har man valt att implementera det i kommunikationsenheter som mobiltelefoner och laptops med mera. Det har funnits en debatt om hur säkert Bluetooth är. För att kunna genomföra denna undersökning så har vi satt oss in i hur Bluetooth fungerar, vilka allmänt tillgängliga attacker och implementationer av dessa, som finns.

GIS-stöd för tunga rundvirkestransporter på väg

För att framföra en timmerlastbil med 74 tons bruttovikt i svensk trafik,krävs ett tillstånd från Trafikverket. Tillståndet består av ett dokument somvisar vilka vägar och broar fordonet får trafikera och vilka regler som gällernär man kör lastbilen.Skogsbolaget Sveaskog startade ett examensarbete med syfte att skapamöjlighet att i realtid presentera för lastbilsföraren vilka vägar och broarsom är en del av transportdispensen. Detta skulle ske genom att utveckla ettkartstöd för lastbilens fordonsdator med anslutning till GPS för attvisualisera dispensdokumentet med de angivna vägsträckorna och broarna.Resultatet av examensarbetet är ett kartstöd som använder tjänster frånArcGIS Online för att presentera geografisk information för användaren.Bakgrundskartan består av en grundkarta från ArcGIS Online. Övergrundkartan ligger ett GIS-skikt med vägar och ett annat skikt med broar.Information om huruvida fordonet för närvarande färdas på en väg somingår i tillståndet eller inte, samt information om regler som gäller för broarpå vägavsnittet, presenteras för föraren i realtid. Denna informationuppdateras vid varje uppdatering av GPS-positionen..

Säkerhetshot och lösningar för privatpersoner med bredband

As more and more people gain access to broadband in their properties, the security threats get bigger. A lot more people also have computers that they carry home from work where they store important information concerning the company. The information stored on theese computers can be very easy to retrieve if you have the will and the skill to do it. Very few people have any knowledge how to protect themselves from theese threats..

Rysslands politiska utveckling : En fallstudie över svensk säkerhetspolitik

The Swedish security policy has changed from stressing neutrality to embrace co-operation within the EU and other organisations. New threats like terrorism, boarder-crossing criminality and natural disasters require new ways to deal with this type of problems to protect the society. Since the beginning of 21st century the high Russian economic growth has made it possible for the country to play an increasingly role as a superpower on the international political stage. In the same time the democratic development has been replaced by an autocratic rule which has obstructed the Russian- European relations. From a Swedish security policy view the Russian political development is of importance and the picture of Russian as a threat has changed from 1996 to 2008/09.

Hur används vetenskap och forskning i den politiska debatten? : Idéanalys av debatten kring försäkringsmedicinskt beslutsstöd

How is research and science being used in political debate? An idea analysis of the debate about försäkringsmedicinskt beslutsstöd (decision tool in healthcare security)This is a case study on different types of research use (utilization) The aim of this paper is to examine how the politicians make use of expertise and research in the parliamentary debate surrounding the decision tool in healthcare security (försäkringsmedicinskt beslutsstöd). The aim is also to find out to what extent different types of research use are present in this debate. In this case study the qualitative method of idea analysis is being used on the empirical material. The tool of analysis is based upon the theories of research use by Amara et al.

På nätet får man tåla en del: En kvalitativ uppsats om ungdomars attityd till nätbrott

Internet och sociala medier har möjliggjort möten och kommunikation mellan människor på ett helt nytt sätt än tidigare. Dock är cybervärlden samtidigt en otrygg och problematisk plats. Brott förekommer både offline och online. Uppsatsen grundar sig i denna problematik och syftar till att få en inblick i problematiken som finns rörande ungdomar och nätbrott utifrån ungdomarnas synvinkel. Mer specifikt gäller det kränkningar, olaga hot och sexualbrott.

Upprustning av miljonprogram : En undersökning om kommunala bostadsbolag

Immersion is a construct that measures how deeply engrossed a user is with any mediated situation. In the field of game design, immersion is a significant aspect of what makes a game enticing, and as such it is of pivotal importance to create and maintain it to keep the player's mind off the real world while inside the confines of a game framework. According to the GameFlow theory, it is one of seven key tenets of evaluating and implementing a successful game design. Yet, certain multiplayer online games are designed in a fashion that in some cases seem to break immersion, where the player is frequently put out of action, sometimes for minutes on end. In this study, using online questionnaires, we discover that players, despite claims otherwise, seem to be in several ways affected negatively by this breaking of immersion.

Budgetens roll innan och efter finanskrisen

Immersion is a construct that measures how deeply engrossed a user is with any mediated situation. In the field of game design, immersion is a significant aspect of what makes a game enticing, and as such it is of pivotal importance to create and maintain it to keep the player's mind off the real world while inside the confines of a game framework. According to the GameFlow theory, it is one of seven key tenets of evaluating and implementing a successful game design. Yet, certain multiplayer online games are designed in a fashion that in some cases seem to break immersion, where the player is frequently put out of action, sometimes for minutes on end. In this study, using online questionnaires, we discover that players, despite claims otherwise, seem to be in several ways affected negatively by this breaking of immersion.

MyMusic ? e-shop för musik i Flash

This is the end report of my final exam at Medieteknik. It covers the planning, work process and review of a Flash based web application that I set out to do. The goal was to create a user friendly, interactive e-shop with embedded functionality for playing music, displaying rich media content and researching possible payment solutions, to enable buying music files online. The project involved creating the user interface, the programmatic functionality of a Flash client (an SWF file). Also, setting up an Apache HTTP Server and establishing a working ?bridge? between the Flash client and the web server with Flash Remoting components and AMFPHP.

Dominerande affärsmodeller inom området informationssäkerhet

Computers together with Internet have been growing enormously, during the last decade and the area of information technology has been growing in the same speed. As long as the surrounding environment evolves, the business models must within the IT-area, keep the same pace. So, how do business corporations handle this change to attract customers? How do the dominant business models look like? In many cases, they are apparently much the same. But what differences can we see and what areas can be improved? We have showed that the IT area isn?t just one, it consist of several segments.

Strategier och kanaler vid marknadsföring för fysiska researrangörer och traditionella resebyråer

The tourism industry in Sweden has expanded in recent years and the increasing industry has meant that customers are in need of a reseller for their trips abroad. Today there are three types of retailers available. These are : Traditional travel agencies , tour operators and online travel agencies.Online Travel agencies are the most modern online option for customers. Their existence has made it easier for the customer and reservation can be made anytime and anywhere. The competition has intensified between the three retailers and the traditional alternatives must find new ways to survive.

Förstudie till införandet av centralt loggsystem hos Försvarsmakten

Modern IT systems tend to become more and more complex, while the number of active systems in companies increases. Furthermore, the number of security-related incidents is at an all-time high. These new conditions impose new demands on organizations. For example, it is no longer possible to manually collect and examine the systems log messages.The purpose of this thesis has been to make a comprehensive study of solutions for automated collecting and managing of log messages, analyze the Swedish Armed Forces specification for solutions for central log collection and management, and evaluating exis- ting solutions. The work consisted primarily of literature studies and evaluations of two of the Swedish Armed Forces of selected products: NetIQ Security Manager and Splunk.

Ett anpassat ledningssystem för informationssäkerhet : - Hur gör en liten organisation med hög personalomsättning?

This paper aims to find out how to implement an information security management (ISMS) system that is based on ISO/IEC 27001-standard into a small organization with high employee turnover. The standard employs the PDCA-method as a course of action for implementing the standard. The reason for implementing such a system is to introduce information security to the organization and to maintain it despite the changes in management. The paper based it?s survey on a case study of a student nation in Uppsala, Sweden.

Att hitta fram till tillit : En studie av kartapplikationen i iPhone och användares tillit till denna

Trust is a concept used throughout our daily lives. We give trust to friends, colleagues and strangers. We also give trust to the technical artifacts we use in our everyday lives. We must also rely on the services we use to work the way we expect them to. There is plenty of research on trust in e-commerce and online banking on website based platforms.

Finansiering av företag under rekonstruktion

In this study, company reconstructions and the financing of current accounts hereof are analysed from a perspective of insolvency law. The purpose with a company reconstruction is to maintain the operations of the company despite the insolvency of the mandator. In contrast to bankruptcy proceedings the person liable for payment stays in charge of the operations. However, this person is not allowed to sign for new loans, issue pledges of security for these loans or in any other way enter new obligations without the approval from the temporary company reconstructor. Besides providing for a successful reconstruction the reconstructor also has to consider the interests of creditors, especially to maintain the preferential order of the creditor's claims, keeping them unchanged in case of a formal bankruptcy.

<- Föregående sida 16 Nästa sida ->