Sökresultat:
1873 Uppsatser om Online payment security - Sida 17 av 125
Illusionen av det perfekta jaget : En hermeneutisk studie om nätdejting
AbstractThe purpose of the present study was to clarify and describe what image men and women present and communicate in their profiles on an online dating site. Further has been investigated if traditional gender roles and stereotypes are as pronounced on this online platform or if it offers a space to go beyond traditional formations. The theoretical framework of this study consisted of a social psychological idea and understanding of identity as well as a gender theoretical perspective. The methodological points of departure were hermeneutic and the data consisted of ten male and ten female member profiles on match.com. The results of the study was divided into three themes, the emphasis on positive qualities, the attractive body and project manager to one?s own life.
Kappa Control with Online Analyzer Using Samples from the Digester's Mid-phase
In the pulp industry, digesters are used to disolve lignin in wood chips. The concentration of lignin is measured and is called the Kappa number. In this thesis, the question of whether an online Kappa sensor, taking samples from the mid-phase of the digester, is useful or not is analyzed. For the samples to be useful, there has to be a relationship between the measured Kappa at the mid- phase and the measured Kappa in the blowpipe at the bottom of the digester. An ARX model of the lower part of the digester has been estimated.
Julia och eliterna : En studie av hur näthatsdebatten utvecklades till en medial lavin
English title: Julia and the elite. A study of how the Internet hatred developed into a media avalanche.Introduction: During February 2013 Swedish media flooded with news of online hate directed towards women after an episode of Uppdrag Granskning on SVT (2013). Female media profiles were given the opportunity to tell the entire Swedish population about the hate and threats they had been exposed to online. In this thesis we want to investigate what topics end up on the media´s agenda, how a piece of news is developed and framed.Questions: How does a piece of news considered highly newsworthy develop from when it first appears in the media until it gradually disappears? How and why did Internet hatred end up on the media´s agenda? How does the media framed the Internet hatred?Theory: To be able to answer the questions formulated in this thesis, the following theories have been used: Agenda-Setting theory, framing theory, news valuation and media logic. Method: Quantitative content analysis of news broadcasts and debate shows from TV, radio and newspapers.
Hotet från de kriminella MC-gängen - en normativ studie av värdekonflikten mellan den personliga integriteten och statens säkerhet
The aim of this essay is to illustrate a fundamental question; what is a democracy allowed to do to protect itself from enemies? I´ve chosen to analyze the conflict between the two values; individual integrity and state´s security. The individual integrity refers to every person's right to have a protected sphere, and the stat´s security refers to its right to protect itself, and these two positions are often time incompatible. This conflict of value is shown in a normative analysis, where depending on which perspective or normative logic is seen as primate, it gives different conclusions to what a democracy should do to defend itself.To demonstrate how severe the threats are against the society, I choose to examine a specific part of the organized crime, the outlaw motorcycle gangs. They have a special position in affecting the legal system because they have an explicit aim to influence the judicial system with scaremongering and threats.
Anbudskalkyl mer användbar i byggprocessen
This report is written for a consultant networking company with the purpose to review the development ofthe company's remote connections from a user friendly and security perspective.This includes an investigation of the possibilities to consolidate existing authentication methods foraccessing customers. The problem lies in the amount of methods being used. Through case study wefound that smart cards, SMS-service, software and hardware tokens exist.The only method feasible from a security perspective is smart cards. Since the method is not commonlyused by the company's customers a standardization of it would be counterproductive.Also, the purpose of this report is to investigate how the ongoing internal development of the remoteconnection will affect the company's clients. Within this framework we have also verified a designsuggestion.We interpret, after the completion of the case study, that the internal development of the remoteconnection is marginally affected by legal perspectives.
Återuppbyggnad av en kollapsad stat - En fallstudie av återuppbyggnaden av staten Afghanistan
The purpose of this thesis is to explore and analyze the processes and efforts involved in rebuilding the war-torn state of Afghanistan. The examined period span from the fall of the Taliban regime in 2001, to the elections in 2005. This period, commonly known as the Bonn-process, sets out the initial time for the reconstruction of the state.A theoretical framework, which considers the necessary mechanisms for successful state-building, will be used to analyze Afghanistan's re-building process. The mechanisms include the prerequisite of a stable security environment, emerging from a cease-fire, together with the development of a well-functioning economy, re-introduction of rule of law and rejuvenating civil society.The failure to establish a secure environment has had a devastating impact on all analyzed aspects of the re-building process. It is therefore crucial that the international society continuing to assists the Afghan government in its efforts to strengthen its capacity, in order to improve the security situation.
Kontextfaktorbaserade ljudeffekter i hasardroulette online. : Påverkan på utövare.
Denna studie presenterar en ny synvinkel inom ämnet att göra hasardspel online mer realistiska. Fjorton personer spelade i tjugo minuter två versioner av ett välkänt franskt roulettespel där utvalda variabler loggades. Den ena versionen fungerade precis som i ett skarpt läge medan den andra innehöll en implementation av kontextfaktorbaserade ljudeffekter. Utifrån loggningen av variabler, samt en kompletterande enkätundersökning, räknades det sedan ut om det förekom någon skillnad mellan versionerna och, i förlängning, spellupplevelsen.Resultatet jag fick fram redovisade förändringar i några av de variabler som hade valts ut och enkätundersökningen indikerade på att det kan ha varit ljudeffekterna som skapat denna förändring..
Vederlagsgrundande mätning med skördare
This study was performed in collaboration with Moelven Skog AB, Örebro district. The purpose of the study was to review existing literature in order to describe the current status of harvester based measurement technology as the way to provide information for calculating payment to the forest owners. In addition to this, a short survey was conducted to find out how a switch to harvester based measurement would affect the administrative workload on timber purchasers working for the district.
The literature study shows that the harvester measurement technology is ready to use if it is combined with well-established routines for control of the harvesters, methods for automatic quality indexing of the timber and ways of creating pricelists specially adapted for harvester measurement. Pricing each stem seems to be the most promising method. Stem pricing has several benefits.
Förändrad syn på svensk militär alliansfrihet? : En studie om svensk neutralitetspolitik mellan 1990-2008
Abstract: The purpose of this study is to examine how the Swedish policy of neutrality has changed between the years 1990-2008. The research method used for this essay has been comparative case study, which strives to answer four research questions. Two of these questions are: Which specific occurrences have been fundamental in changing the Swedish policy of neutrality? How have the Swedish policy of neutrality and the policy of non-alignment changed between the years 1990-2008? The theoretical frame work of this study consists of Europeanization as a comprehensive theoretical perspective. In order to explain the Swedish act regarding the policy of neutrality, Logic of Consequences and Logic of appropriateness are used.
E-handel med Kläder : en marknadsundersökning
ABSTRACT Purpose: The purpose of the thesis is to examine and explain which consumers who choose to, or not choose to, shop for clothes via Internet. This will give businesses, and the reader, a better understanding on the views, of customers, on E-business with clothes. Procedure: A quantitative market research has been performed through a survey. Also the gathering of the material and the analysis is done with quantitative methods. The primary sources dominate the thesis.
På tal om cannabis : Skolans insatser gällande preventivt arbete och åtgärder vid misstanke och upptäckt
This paper is based on a quantitative survey. The study aims to answer the questionwhich media young people rather use to take part of the news. The results showthat young people today in Kalmar preferably and often read newspapers on theInternet and mobile phone.The questions asked was about which media they usually use, the level ofconfidence they had in various media, how interest was in different newscategories, willingness to pay for online news and background issues relatedsubjects. The survey was aimed at high school students in Kalmar and weredistributed and collected on-site at the schools. What was remarkable among theresponses was that young people largely had access to a morning newspaper athome and said that they would consider subscribing to one in the future.
Med Säkerhetsrådets resolution 1325 (2000) som utgångspunkt : En komparativ studie av två handlingsplaner
Security Council resolution 1325 (2000) is about women, peace and security. Since the resolution was adopted several countries has made their own National Action Plan for implementation of the resolution.Sweden and Denmark are two of these countries. Resolution 1325 is one of the documents that each countries armed force has to relate to in international work.These countries can get to work together in international operations within the framework of the Nordic Defense Cooperation, NORDEFCO. This study is done by looking at similarities and differences in the action plans and whether they can be an obstacle for the countries to cooperate in an international operation.In this paper a comparative analysis of Sweden and Denmark's plans for the Security Council resolution 1325 will be done. The comparison is made based on the clauses of the resolution relating to the member states actions.In this paper, a qualitative text analysis to be carried out with sections of Resolution 1325 as a model for the comparison..
MyMusic ? e-shop för musik i Flash
This is the end report of my final exam at Medieteknik. It covers the planning,
work process and review of a Flash based web application that I set out to do.
The goal was to create a user friendly, interactive e-shop with embedded
functionality for playing music, displaying rich media content and researching
possible payment solutions, to enable buying music files online. The project
involved creating the user interface, the programmatic functionality of a Flash
client (an SWF file). Also, setting up an Apache HTTP Server and establishing a
working ?bridge? between the Flash client and the web server with Flash
Remoting components and AMFPHP.
Dominerande affärsmodeller inom området informationssäkerhet
Computers together with Internet have been growing enormously, during the last
decade and the area of information technology has been growing in the same
speed. As long as the surrounding environment evolves, the business models must
within the IT-area, keep the same pace. So, how do business corporations handle
this change to attract customers? How do the dominant business models look
like? In many cases, they are apparently much the same. But what differences
can we see and what areas can be improved?
We have showed that the IT area isn?t just one, it consist of several segments.
Säkerhetsmedvetenhet hos hemanvändare
IT utgör en stor del av majoriteten av folks vardagliga liv. Smartphones och surfplattor har om möjligt ytterligare ökat vår användning av tekniska enheter och prylar på en daglig basis. Arbetet tas med hem i en större grad med hjälp av laptops, VPN och molnmöjligheter. Mail kan tas emot i princip var och närsomhelst på dygnet. Men hur bra är säkerheten? På arbetsplatsen hanteras mycket av IT-säkerheten och ansvaret för den ofta av erfarna och dedikerade anställda, men hur ser det ut hemma där användaren själv har ansvaret för sin IT-säkerhet?I denna studie analyseras och identifieras risker och problem vid hantering av olika aktiviteter relaterade till IT-säkerhet i hemmet.