• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 48
  • 10
  • Tagged with
  • 58
  • 58
  • 58
  • 26
  • 17
  • 15
  • 11
  • 11
  • 9
  • 8
  • 4
  • 4
  • 3
  • 2
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Beskrivelse og verdivurdering av sosiale nettverkstjenester / Description and Valuation of Social Networking Services

Falck-Ytter, Martin January 2011 (has links)
Sosiale nettverkstjenester har i løpet av det siste tiåret opplevd en enorm økning i popularitet. I dag stammer en stor andel av total Internettrafikk fra disse tjenestene. Dette har ikke forblitt ubemerket blant forretningssektoren, som i de siste årene har økt fokuset mot dette nye markedet.Flere nettverkslover har blitt foreslått for å enten modellere brukeratferd eller nettverksverdi. Det er derimot usikkert hvor presise disse lovene er for sosiale nettverkstjenester, ettersom få empiriske undersøkelser har blitt utført. I dette studiet blir empiriske funn presentert for å undersøke brukeratferd i sosiale nettverk, samt gi mer presise verdiestimater på sosiale nettverkstjenester.Resultatene fra denne studien har vist at popularitet av Twitter-brukere ikke kan modelleres presist med Zipfs lov. Popularitet av Youtube-videor kunne i stor grad modelleres med Zipfs lov. Gjennomsnittlig innholdsproduksjon øker med nettverksstørrelsen for sosiale nettverk undersøkt. En potensfunksjon, avhengig av nettverksstørrelse og gjennomsnittlig innholdsproduksjon, var den beste funksjonen for å modellere verdien av sosiale nettverkstjenester. Denne modellen vokser, i asymptotiske termer, omtrent som Tilly-Odlyzkos lov.
2

Financial Aspects of the Online Gaming Service Industry

Larsen, Christer-Andre January 2011 (has links)
The goal of this thesis is to identify and analyze the dominant revenue models in the OGS industry, as well as the logic behind the choice of a specific model. Identification of the prevalent models and their characteristics would in conjunction with results from previous research in the field provide a complete overview of the financial aspects of OGS operation.The goals of this thesis was reached through an analysis of the business model of Microsoft’s Xbox LIVE (XBL) service, one of the leading console platform OGSs, in conjunction with a similar case study of Blizzard Entertainment’s Battle.net service presented in former work by the author. Both case studies include all aspects of the business model, according to the business model ontology defined by Alexander Osterwalder in his PhD dissertation.The five identified dominant revenue models are the subscription, advertisement, micro transaction, digital distribution and additional sales model. From the provided estimates, the subscription, micro transaction and digital retail model are the most profitable among the five as standalone models. However, the study has shown that most successful OGSs utilize several revenue models in conjunction in order to reduce the negative effects associated with each one individually. In addition, the use of several models improves price differentiation possibilities, which in many cases may lead to increased revenue. While the pricing strategies among the services are many, the specific implementations of the dominant models among the studied services imply that the willingness to pay among OGS users are low for features and content not personally valued by each individual user.The general cost structure of OGSs has also been updated with additional results uncovered through this research. For an OGS relying on micro transactions and digital distribution for revenue, this study has shown that the bandwidth and support costs increase substantially compared to a service without digital distribution, even outgrowing the hosting costs for the service itself. Thus, favorable partnerships and other means to reduce bandwidth costs may be seen as equally important cost saving initiatives as those outlined in former work.
3

Security Issues with Content Management Systems (CMSs) on the Cloud

Østdahl, Thomas January 2011 (has links)
Although cloud computing is the major hype nowadays, it is actually a relatively “old” concept which can be dated back to the 1950s. Then, AT&T was developing a centralized infrastructure and storage space, where their customers could connect to using advanced telephones. Cloud computing works in a similar fashion, where customers subscribe to centralized service models. The models are separated in three main categories; Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS) and Infrastructure-as-a-Service (IaaS). The cloud is a multi-tenant environment, i.e., several customers are able to use the same service simultaneously. More- over, the cloud is highly scalable, which means that resources can be allocated on demand. Cloud computing follows a pay-per-use payment model. Customers could reduce their operational and maintenance costs significantly, because they subscribe to a Cloud Service Provider (CSP) which is responsible for these tasks. Moreover, an organization is no longer dependent on costly upfront investments.Most of the industry-leading technology organizations (e.g., Amazon, Apple, Google, Microsoft) have their own cloud services. Thus, the barrier to adopt the cloud for customers has lowered. Organizations have hasted to move their services to the cloud, without questioning the cloud’s maturity. Even though cloud security has been a priority from the beginning, numerous attacks have been reported. The CSP’s data-centers provide both physical and infrastructure security. However, traditional security threats to IT systems, is still applicable to cloud applications. Furthermore, new cloud-specific security risks emerge. Confidentiality, integrity and availability of data are always of importance, however, becomes challenging in the cloud due to its dynamic environment. Ensuring integrity of data, with- out knowing the whole data set, is one of several challenges. Moreover, due to the increasing incidents of Denial-of-Service (DoS) attacks, availability of data has become problematic. Although the cloud is able to scale well with such attacks, disruptions of services still occur. The scalability of clouds could also potentially be a threat, if malicious users are able to create bot-nets of multiple clouds.The Internet is a hostile environment, likewise is the cloud. However, this does not stop people from rapidly adopting it. Organizations have hasted to offer their services on the cloud, to benefit from its advantages. Content Management Sys- tems (CMSs) are examples of such services. They are widely popular, and used to create professional websites without requiring technical skills. CMSs provides a user-friendly platform to manage the contents (e.g., text, pictures, music), then customize it with templates and extensions. Open source CMSs benefit from their communities of developers, which contribute to keep their systems up to date and safe, with the current technologies. Since many CMS have non-technical users, they tend to be attractive targets for adversaries. Especially, third-party exten- sions have been considered a major threat. The “core” of the systems are often secure. However, web application vulnerabilities apply to these systems.Joomla! is a widely popular open source CMS, due to its simplicity and remark- able community. The latest version (Joomla! 1.6) has made it suitable for both new unexperienced users, as well as professional users. Joomla! can be used as a PaaS, to benefit from the cloud’s advantages. Anyhow, Joomla! is an attractive target, due to its non-technical audience. It is considered secure by default. How- ever, with simple open source tools, it is possible to obtain valuable information about the system, e.g., server spesifications, OS, CMS version. Moreover, the se- curity of the back-end have potential for improvements. Since many customers use weak passwords, and the back-end is always located in the same folder, adversaries could brute-force their way through. Many CMSs have static files and resources, which finger-printers utilize to determine the system specifications. Furthermore, poorly coded extensions are gateways for attackers. If an exploit is found in a com- ponent, adversaries could automate attacks against websites with this vulnerable component installed. Hence, it is critical for users to always keep up to date.The emerging future would introduce numerous new ways of cloud usage. Many companies invest in enormous data-centers, which is the size of small villages. More and more services would move to the cloud, and software licenses would start to be excess. The threats to the cloud are not significantly increased in numbers, compared to traditional IT systems. However, the multi-tenancy could be exploited by malicious users. Moreover, distributed attacks originating from several clouds, could force CSPs to evolve cloud security.
4

Business Models for Future Networked 3D Services

Bøhler, Marianne January 2011 (has links)
3-Dimensional (3D) technology has seen an increasingly widespread use over the last years, although the concept of 3D has been around for many years. Large studio movies being released in 3D and the development of 3DTVs and 3D games are the major reasons for its increasing popularity. The purpose of this thesis is to specify future collaboration space services based on the use of autostereoscopic 3D technology and propose possible business models. The collaboration spaces are geographically separated and let participants collaborate in a near-natural way through the use of autostereoscopic 3D technology. The business model analysis use the framework of Alexander Osterwalder's business model ontology. Different business aspects are studied in detail, including identification of products, customers and partners. A thorough financial analysis of the services are conducted and the basis for the estimates of the revenue and cost items are found in today's market prices. The results show that the services have a market viability even for small-scale environments.
5

Campusguiden : En navigasjonstjeneste for innendørs bruk / The Campus Guide

Halvorsen, Christian January 2011 (has links)
Oppgaven har kartlagt nytte og betalingsvilje for CampusGuiden ved to ulike marked. Til dette ble en kvalitativ forskningsmetode benyttet. Det har blitt laget en forretningsmodell, som blant annet beskriver aktører, kostnader og inntekter. Nytten av tjenesten er tydligst der bygningsmassen og folketettheten er størst. Kostnadene ved implementering av tjenesten ved en ny lokasjon likeså. Investeringskostnader og årlige driftskostnader er proporsjonale med antall kvaratmeter gulvareal. Tilpassning av etasjeplaner til kartgrunnlag utgjør den største andelen. Stadig endring av etasjeplanene, som ved messeområder, medfører derfor vesentlige kostnader.Reklamefinansiering kan benyttes av kommersielle aktører, og kan gi betydelige årlige merinntekter. Retningslinjer og regelverk vanskeliggjør slik finansiering ved høgskoler og universiteter. Størst fortjeneste oppnås ved salg til kommersielle aktører som sjelden gjør endringer i etasjeplanene.
6

The Socioeconomic Impacts of Broadband Utilization in the Accommodation Sector in Norway

Stople, Steffen André January 2011 (has links)
Broadband technology has in recent years experienced a substantial growth, and is still rapidly evolving. Many new kinds of content-rich and bandwidth demanding broadband Internet applications have emerged, aiming to make day-to-day tasks easier and more efficient. A strong broadband connection provides the platform for an optimal broadband utilization, but equally important is the adapting and implementing of these Internet applications, or ”e-solutions”, so that broadband can lead to socioeconomic benefits for individuals, businesses and for a society as a whole.This thesis reviews some of the areas where enterprises can utilize broadband opportunities in order to achieve social- and economic development. A broadband utilization benchmark study is carried out on a selection of geographical areas in the accommodations sector in Norway. By analyzing the recieved data from this research, this paper identifies gaps and opportunities for the increased adaption of broadband-enabled services and further economic development for the businesses. Also, by performing a comparative analysis between the data collected in the Norwegian research population and equivalent data from the US, similarities and differences regarding the two countries’ utilization of the Internet are analyzed and discussed. Some important fields that are examined are broadband connectivity, barriers preventing the efficient use of broadband services, and the use of a selection of e-solutions.Also presented is an independent calculation of a broadband utilization index, constructed with the thought of providing a quick representation of a company’s use of the Internet and its applications. This calculation will be subject for analysis, so as to understand the construction and potential outcomes that are derived by changing the input data. Resulting in an output-utilization score, this calculation, the Stople-Index, is constructed to give companies and organizations an easy way to promote awarness and identify opportunities for them to utilize their broadband Internet properly.
7

Detecting MAC Spoofing Attacks in 802.11 Networks through Fingerprinting on the MAC Layer

Idland, Christer January 2011 (has links)
In order to provide hassle-free connection options many wireless local area network (WLAN) providers choose to have their networks completely open. In other words there is no password required in order to connect. Such open configurations do not provide any security features on the wireless medium, but are often implemented with other solutions as captive portals. A captive portal forces a Hypertext Transfer Protocol (HTTP) client to see a certain webpage, usually for authentication purposes. All other packets are blocked. Once authenticated, the client's medium access control (MAC) address is whitelisted and he will have access to the Internet.The MAC spoofing attack is easy to perform in open networks, see Appendix A. This attack can have severe consequences as the attacker masquerades as a legitimate client, potentially getting the victim caught for crime done by the attacker. The preferred way to handle these attacks has been through detection, as it can be done on the server side without complicating anything for the user. Effective and reliable detection techniques for plain and QoS enabled 802.11 networks exists [1,5]. However, no good solution exists to detect attacks when the legitimate client is no longer connected. The two main scenarios are the session hijacking attack, where the attacker forces the victim offline, and the wait-for-availability attack where the attacker waits until the legitimate client leaves the network.An algorithm based on MAC layer fingerprinting was developed to detect the class of attacks where attacker and victim are not connected simultaneously. A fingerprint is based on the behavior of a station (STA), and each STA's behavior varies due to implementation differences of the 802.11 protocol. Experiments in a real network was performed with 11 different STAs in order to determine the fingerprints. The results show that on average 2.82 of the 8 fingerprinting properties were different when comparing two fingerprints.The fingerprinting algorithm developed is capable of passively creating a fingerprint of wireless STAs without specialized equipment in realistic network conditions. Fingerprints from different STAs are unique with high probability, even when there are little data available. In addition, the technique used is accurate, fast, and requires no pre-computed databases. The algorithm used in combination with the IDS developed by Idland [1] is now able to detect all of the five different MAC spoofing attacks described in Section 2.6.2.
8

Engineering Responsive Mobile Applications for Android from Reusable Building Blocks

Sagberg, Geir January 2011 (has links)
This report describes the continued design and development of an instant voice communication application for Android, with specific focus on creating a highly responsive, stable application that is intuitive to use and integrates well with the Android environment. Existing building blocks have been redesigned with cleaner layouts and smaller state spaces, and new reusable blocks have been added. Techniques and principles for optimizing an application for responsiveness will be presented, along with specific measures for Android and Arctis. Another goal has been to create the first Arctis application to be released on the Android market.As a part of the design process, we have researched the development of Android services in Arctis. All service implementation variants have been examined, and the available patterns for communicating between a foreground activity and a background service have been analyzed and compared. The result is a general development methodology for creating a single Android application from two Arctis system models representing a background service and a foreground user interface, with the necessary Arctis modifications included.
9

Simulation of a Secure Ad Hoc Network Routing Protocol

Bowitz, Anne Gabrielle January 2011 (has links)
Secure wireless ad hoc networks possess many properties that are highly valuable in e.g. emergency situations and military applications. By using X.509 certificates, the ad hoc routing protocol B.A.T.M.A.N. has been modified in order to support identification and authentication of mobile nodes trying to access a restricted ad hoc network.The new protocol design needs to be evaluated by performing tests under various conditions and environments. However, this might be a challenging and expensive task to do in a real-world system, thus it is recommended to simulate the routing protocol using a network simulator.ns-3 is an open source discrete-event network simulator for Internet systems. The goal of this thesis is to extend ns-3 to support simulation of both the original and modified B.A.T.M.A.N. protocol such that protocol design, interactions, and large-scale performance issues can be investigated and compared.
10

Implementing a Secure Ad Hoc Network

Graarud, Espen Grannes January 2011 (has links)
In emergency situations such as natural disasters the emergency personell shouldbe able to establish communication fast and reliably. Depending on the nature ofthe disaster one cannot rely on existing communication infrastructure, or accessto centralized administration. Additionally the established communication needsauthentication in order to handle access control so only trusted parties canpartake. A suitable medium for such communication is wireless ad hoc networks,but their flat structure make authentication a very challenging task.In this thesis a system design for an ad hoc routing protocol combined withaccess control is proposed, and implemented extending a popular routing protocolcalled BATMAN. The proposed authentication scheme relies on special public keycertificates called proxy certificates, and combined with a neighbor trustmechanism both authentication and access control are managed in a secure manner.Tests using mobile nodes running this implementation shows that the performanceof the proposed design is comparable to the original routing protocol (BATMAN)used, and that the authentication process is manageable even for mobile ad hocnetworks.

Page generated in 0.1164 seconds