• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1254
  • 874
  • 312
  • 224
  • 76
  • 63
  • 55
  • 42
  • 42
  • 36
  • 31
  • 27
  • 27
  • 20
  • 11
  • Tagged with
  • 3320
  • 956
  • 587
  • 562
  • 547
  • 524
  • 385
  • 370
  • 341
  • 298
  • 297
  • 270
  • 246
  • 236
  • 223
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

A study and analysis of Public WiFi / A study and analysis of Public WiFi

Ullah, Irfan January 2012 (has links)
Wireless technologies for computer communications are today common. There are numerous wireless communication technologies with different properties and markets such as IEEE 802.11, 3G, and Long Term Evolution (LTE). When deciding on which technology to employ for Public Wi-Fi networks it is important to know about the specific properties of these technologies. This thesis investigates 3G, 4G, LTE and Wi-Fi IEEE 802.11 network standards in terms of their performance, security, and cost. Moreover, an analysis of the security and vulnerability of these technologies are provided. From the analysis it can be concluded that Wi-Fi is today an inexpensive technology with high bandwidth, low direct and associated costs, and low power consumption compared to 3G, 4G, LTE and WiMax. Wi-Fi (802.11 a/b/g/n) is – due to its cost-performance ratio – an appropriate wireless technology to provide Internet services to cafes, hotspots and public places.
2

IT-säkerhetspolicy : - en studie kring anställdas kunskap om två verksamheters IT-säkerhetspolicys

Bertilsson, Linus, Granvik, Jim January 2014 (has links)
IT-användandet bland Sveriges företag är mycket stort och utvecklingen går snabbt framåt. Samtidigt som teknologin skapar möjligheter så skapar den även hot mot företagen själva. Dessa hotbilder glöms ofta bort och konsekvenserna kan bli att känslig information hamnar i fel händer. Undersökningen handlar om anställdas kunskap om den egna verskamhetens IT-säkerhetspolicy. I undersökningen granskas och jämförs även IT-säkerhetspolicys från ett mindre företag och en större kommunal organisation. Som metod har enkäter och intervjuer använts. Resultatet visar att kunskapen hos de anställda kring den egna IT-säkerhetspolicyn är varierande och att de båda policyerna ser mycket olika ut. En IT-säkerhetspolicy bör inte anses som en problemlösare i sig, utan användandet kan även ge nackdelar. Den kan ge stöd och tydlighet i arbetet och kan underlätta i beslutsfattande situationer och öka säkerheten i företaget. Det räcker dock inte med att ha en detaljrik och heltäckande IT-säkerhetspolicy, om de anställda inte känner till att den finns eller inte vet vad den innehåller. En IT-säkerhetspolicy bör vara ett levande dokument som tas upp för gemensam diskussion och revideras med jämna mellanrum. Nyckelord: IT-strategi, IT-säkerhetspolicy, organisation, enkät, intervju.
3

Forensisk  analys av smartphones : - fokus på sociala medier

Barkstedt, Patrik, Bizzarri, Sandro January 2013 (has links)
I dagens samhälle är trenden att fler och fler människor införskaffar smartphones för att när som helst kunna vara uppkopplade mot internet. Detta gör att informationen en smartphone hanterar och sparar är viktigare och mer intressant för båda sidorna av lagen. Med denna ökning av smartphones har användandet av applikationer till sociala medier så som facebook ökat.I denna rapport utreds det vad en facebookapplikation lagrar för typ av information efter den har använts och hur pass noga det går att kartlägga vart applikationen har används. För att kunna göra detta krävs först en utredning på vilka sätt de går att hämta ut information ifrån en smartphone. I denna rapport har det alltså utretts huruvida de går att utvinna samma information med hjälp av flera metoder och om de går att uppnå samma resultat med hjälp av en utvinning med de olika metoderna. Vid analys av den utvunna datan visar det sig att applikationen lagrade den intressanta datan i databasfiler. Allt från meddelanden och statusuppdateringar till platsdata sparades i dessa databasfiler, vilket gjorde att enheten gick att kartlägga.
4

A strategic approach to developing information systems in the Kindom of Saudi Arabia

Al-Sudairi, Turki M. January 1994 (has links)
No description available.
5

Analysis of IT Related Financial Issues in Seven Companies of Sweden : Reasons Behind the Current Condition

Chowdhury, Soumitra January 2010 (has links)
One of the best ways to get expected results from information technology (IT) in a business organization is to have a close look at the financial issues related to it. Financial issues such as IT investment, IT costs, IT resources should be dealt with special care if any organization wants to get best result from its IT systems. The purpose of this research is to investigate the condition of IT financial issues such as IT investment, IT costs, IT resources, IT business value etc. in the selected seven organizations of Sweden and to have an understanding behind the condition. First of all, a survey has been conducted with nine IT managers from these seven organizations to get an overview of the condition of dealing with various IT financial issues. Then follow-up interviews have been conducted with four of those IT managers that took part in the survey to find out the reason behind the condition dealing with those IT financial issues. The results of the study show that most the seven companies do not have proper capital budgeting technique, benefit identification plan for IT investment. Most of them do not calculate all the IT related costs. Most of them have lack of knowledge about the business value of IT. Their knowledge of impact of IT resources is not clear. The study further shows why those seven companies are having that kind of condition regarding the IT related financial issues.
6

Benefits and risks of the influence of IT evolution in the relationship between companies and suppliers : The case of seven companies

Asawayoungyuenporn, Priya, Berenice Rivero Albidrez, Andrea January 2010 (has links)
No description available.
7

A penetration test of an Internet service provider : Computer Forensics and Information Security

Svenhard, Petter, Radaslic, Amir January 2012 (has links)
Computer security is of ever increasing importance in the modern corporate world due to the risk of disclosing sensitive assets. In a world where technology can be found in most organizations and businesses the importance of ensuring secure assets is not only a good habit but a necessity.This study concerned an Internet service provider in south western Sweden who saw an interest in ensuring the security of their computer systems. The Internet service provider wished to remain anonymous to protect its name and interests in casesensitive information were to be disclosed.The approach to test the service provider’s security was to perform an extensive penetration test of the ISP's relevant network and computer infrastructure. The aims of the penetration test were to map vulnerabilities and assess the risk that a possible flaw would pose if exploited.The results indicated that the systems of the ISP included several critical flaws that could lead to a denial of service condition and a complete compromise of the service provider’s office intranet. Furthermore the results indicated the possibility that the Internet service provider had in fact already been hacked by an unknown perpetrator.Finally the study was beneficial for the Internet service provider since they were provided with a deeper understanding of the security flaws in their computer system infrastructure. Moreover they were alerted to the presence of a possible crime scene on their property.
8

The role of information systems in configuring organisational power

Blosch, Marcus January 1999 (has links)
No description available.
9

Privacy and security in Internet-based information systems /

Jacobsson, Andreas, January 2008 (has links)
Diss. Karlskrona : Blekinge tekniska högskola, 2008.
10

Exploring privacy risks in information networks /

Jacobsson, Andreas, January 2004 (has links)
Lic.-avh. Ronneby : Blekinge tekniska högskola, 2004.

Page generated in 0.1097 seconds