Spelling suggestions: "subject:"informationsteknik""
91 |
Encryption in Delocalized Access SystemsAhlström, Henrik, Skoglund, Karl-Johan January 2008 (has links)
<p>The recent increase in performance of embedded processors has enabled the use of computationally heavy asymmetric cryptography in small and power efficient embedded systems. The goal of this thesis is to analyze whether it is possible to use this type of cryptography to enhance the security in access systems.</p><p>This report contains a literature study of the complications related to access systems and their functionality. Also a basic introduction to cryptography is included.</p><p>Several cryptographic algorithms were implemented using the public library LibTomCrypt and benchmarked on an ARM7-processor platform. The asymmetric coding schemes were ECC and RSA. The tested symmetric algorithms included AES, 3DES and Twofish among others. The benchmark considered both codesize and speed of the algorithms.</p><p>The two asymmetric algorithms, ECC and RSA, are possible to be used in an ARM7 based access system. Although, both technologies can be configured to finish the calculations within a reasonable time-frame of 10 Sec, ECC archives a higher security level for the same execution time. Therefore, an implementation of ECC would be preferable since it is faster and requires less resources. Some further suggestions of improvements to the implementation is discussed in the final chapters.</p>
|
92 |
Intrusion Detection and Prevention in IP Based Mobile NetworksTevemark, Jonas January 2008 (has links)
<p>Ericsson’s Packet Radio Access Network (PRAN) is a network solution for packet transport in mobile networks, which utilizes the Internet Protocol (IP). The IP protocol offers benefits in responsiveness and performance adaptation to data bursts when compared to Asynchronous Transfer Mode (ATM), which is still often used. There are many manufacturers / operators providing IP services, which reduce costs. The IP’s use on the Internet brings greater end-user knowledge, wider user community and more programs designed for use in IP environments. Because of this, the spectrum of possible attacks against PRAN broadens. This thesis provides information on what protection an Intrusion Prevention System (IPS) can add to the current PRAN solution.</p><p>A risk analysis is performed to identify assets in and threats against PRAN, and to discover attacks that can be mitigated by the use of an IPS. Information regarding placement of an IPS in the PRAN network is given and tests of a candidate system are performed. IPS features in hardware currently used by Ericsson as well as missing features are pinpointed . Finally, requirements for an IPS intended for use in PRAN are concluded.</p>
|
93 |
A Case Study on How Chinese Students Use Their Cell Phones in Sweden Compared to That in ChinaFang, Yuting January 2008 (has links)
<p>This study focuses on cell phone usage. By comparing how a group of students use their cell phones in Sweden with that in China, alterant cell phone usage behaviors will be concluded. The study includes a case study. In order to do the research, the author selects a specific group and holds interviews. Three theories are used in this thesis which are: 1) mobile context, 2) switching behavior of mobile users and 3) transaction utility and reference situation. After introducing these three theories, the author concludes six theoretical factors which are combined into one competent framework. Base on the new framework, the author analyzes the result from the case study. After presenting the interview and the results, the author finds that Chinese students use their cell phones less frequent in Sweden compared to that in China. In order to find out the reasons, the author creates goal, emotion, fee, location and habit as the five matching factors which result in those changes. The matching factors are the bridge between the theories and the case study. After generalizing how those factors affect people while using cell phones, future work is to raise up some thoughts of how cell phones will be like in the future which is relevant to how to adapt information technology to human lives.</p>
|
94 |
Designing Work Support Systems – For and With Skilled UsersOlsson, Eva January 2004 (has links)
Computer users often suffer from poorly designed support systems that hinder them from performing their work efficiently and with satisfaction. The evidence is found in observations of users at work, interviews, evaluations of systems, and numerous reports of systems with poor usability that fail from start. Those who use the systems are proficient in their work, and those who develop systems are proficient in software engineering. These two groups have often little knowledge and understanding of each other’s worlds and their vocabularies are quite different. In systems development projects, users are often confronted with representations of their work that they hardly recognize. Systems designers compose these representations in an attempt to reduce the complexity of the work practices in a way that is appropriate for systems development. It is very difficult for users to appreciate the consequences fully on their future work situation from such representations, since they are removed from the social setting and often describe work in a fragmentized way. The unfamiliar view of their work may make the users less inclined to participate in the forthcoming design process. This thesis presents research performed to increase the usability of systems in working life and to explore conditions that facilitate the design of systems that really support the users work. The research comprises field studies in different work contexts, e.g. health care, dentistry, public service, and transportation. Information on the essentials of work has been gathered and analyzed to learn how such findings can be translated into systems design. Another goal has been to explore how to make the most of users’ experiences and skills to assure systems that better fit their work. Along with a growing awareness of the importance of user involvement in design, a participatory design process including the analysis and design of work has evolved.
|
95 |
Design and Implementation of Multi-Device Services / Utveckling av tjänster med multipla användargränssnittNylander, Stina January 2007 (has links)
We present a method for developing multi-device services which allows for the creation of services that are adapted to a wide range of devices. Users have a wide selection of electronic services at their disposal such as shopping, banking, gaming, and messaging. They interact with these services using the computing devices they prefer or have access to, which can vary between situations. In some cases, the services that they want to use func-tions with the device they have access to, and sometimes it does not. Thus, in order for users to experience their full benefits, electronic services will need to become more flexible. They will need to be multi-device services, i.e. be accessible from different devices. We show that multi-device services are often used in different ways on different devices due to variations in device capabilities, purpose of use, context of use, and usability. This suggests that multi-device services not only need to be accessible from more than one device, they also need to be able to present functionality and user interfaces that suit various devices and situations of use. The key problem addressed in this work is that there are too many device-service combinations for developing a service version for each device. In-stead, there is a need for new methods for developing multi-device services which allows the creation of services that are adapted to various devices and situations. The challenge of designing and implementing multi-device services has been addressed in two ways in the present work: through the study of real-life use of multi-device services and through the creation of a development method for multi-device services. Studying use of multi-device services has gener-ated knowledge about how to design such services which give users the best worth. The work with development methods has resulted in a design model building on the separation of form and content, thus making it possible to create different presentations to the same content. In concrete terms, the work has resulted in design guidelines for multi-device services and a system prototype based on the principles of separation between form and content, and presentation control.
|
96 |
Spår av datoriseringens värden : Effekter av IT i äldreomsorgHedström, Karin January 2004 (has links)
Visioner om IT lovar många och positiva förändringar i samhället. Detta gäller inte minst inom svensk äldreomsorg där IT ses som ett verktyg för att utveckla och förbättra äldreomsorgen. Genom att datorisera äldreomsorgen finns förhoppningar om goda effekter som bättre tillgång till information i samband med möte med den äldre, förbättrad samverkan över organisationsgränser samt bättre uppföljning. Den här avhandlingen handlar om datorisering av äldreomsorg, de aktörer genom vars intressen och värden IT-system utvecklas, och de värden som IT-systemen skapar. Då värden styr handlande, prioriteringar, beslut samt hur vi värderar det vi upplever påverkar värden utveckling och utvärdering av IT-system. Därmed studeras effekter som spår av värden. Detta är en kvalitativ studie som illustrerar hur fyra administrativa och äldreomsorgsstödjande IT-system i tre svenska kommuner har utvecklats genom olika aktörsgruppers värden och vilka värden dessa IT-system uppfattas stödja. Avhandlingsarbetet har en stark empirisk bas som har utvecklats genom att jag har deltagit i upphandling samt utveckling av IT-system för äldreomsorg i Örebro samt Linköpings kommun. Dessutom har jag studerat upplevda effekter av att använda IT-system som stöd för arbete inom äldreomsorg i Göteborg stad och Linköpings kommun. Avhandlingens resultat visar att datorisering av äldreomsorg drivs av och värderas utifrån fyra värdeområden: förvaltningsvärden, integrationsvärden, omsorgsvärden och professionsvärden. Förutom ovanstående resultat presenteras datoriseringsprocessernas aktörs-grupper och deras värden samt en jämförelse av värden som drivkrafter eller konsekvenser. Sju sammanfattande resultat avslutar beskrivningen av avhandlingens kunskapsbidrag.
|
97 |
Beyond IT and productivity : effects of digitized information flows in the logging industry /Kollberg, Maria, January 2005 (has links)
Lic.-avh. Linköping : Linköpings universitet, 2005. / På titelsidan felaktiga serieuppgifter.
|
98 |
Technology, human capital and labor demand /Savvidou, Eleni, January 2006 (has links) (PDF)
Diss. Uppsala : Uppsala universitet, 2006.
|
99 |
Den traditionella resebyråns betydelse : En studie utifrån researrangörers perspektivKjellberg, Marie, Milata, Veronika January 2010 (has links)
<p>Researrangörer har under en lång tid distribuerat sina produkter genom resebyråer eftersom det innan internets uppkomst var det bästa alternativet. Frågan är dock om resebyråns tjänster räcker till för att researrangörer i dagens priskänsliga och konkurrenskraftiga samhälle finner det lönsamt att distribuera sina produkter genom traditionella resebyråer när siffror tydligt visar på att tillväxten och framtiden finns på internet. Uppsatsens syfte är att ur researrangörers synvinkel undersöka betydelsen av att distribuera sina produkter genom traditionella resebyråer då trenden går mot ett virtuellt samhälle. Den teoretiska ramen hämtas från litteratur, vetenskapliga artiklar och rapporter rörande turismens produktionssystem (TPS), nätverkssamhälle och turismdistribution. Kvalitativa intervjuer med ett antal branschaktörer har sedan fått ligga som grund till uppsatsens empiri tillsammans med en kvantitativ undersökning bland researrangörer. Resultatet visar på en relativt stor spridning bland researrangörers ställningstagande gällande den traditionella resebyråns betydelse. Beroendet av fysisk försäljning tenderar att bero på reseproduktens komplexitet. Varje researrangör måste se till sin egen situation och göra en bedömning av vilka distributionskanaler som är mest gynnsamma. Åsikterna kring disintermediering blir därför svåra att generalisera. Vad majoriteten dock tycks vara överens om är att den traditionella resebyråns betydelse kommer att fortsätta minska och att användandet av internet och sociala medier som distributionskanal av turismprodukter ytterligare kommer att öka i framtiden.</p>
|
100 |
Sjuksköterskans IT-kompetensAlf, Jeanette January 2005 (has links)
<p>Sjuksköterskornas omvårdnadsdokumentation skall fungera som stöd, arbetsverktyg och arbetsunderlag i vårdarbetet. Utvecklingen av informationsteknologi (IT) i vården har inneburit en möjliggörande faktor som har medfört nya arbetssätt, organisationsformer och arbetsprocesser. Utvecklingen och användningen av informationssystem (IS) i vården är det mest centrala informations- och kommunikationsverktyget för sjuksköterskorna i den dagliga patientbehandlingen. Det är viktigt att sjuksköterskor skaffar sig en utbildning inom IT, vilket innebär kunskap och skicklighet och stödjer dem i deras praktik, administration och forskning. Betydelsen av att sjuksköterskorna innehar en IT-kompetens i vården idag kan inte nog understrykas. Syftet med undersökningen var att hitta olika tillvägagångssätt som gör att sjuksköterskans IT-kompetens kan höjas. Intervjuer och observationer genomfördes för att undersöka problemområdet. Resultatet visade att det är av stor vikt att organisationerna för de olika verksamheterna inom Hälso- och Sjukvården utvecklar en strategi angående sjuksköterskans IT-kompetens för att precisera vilka IT-kunskaper som krävs för att kunna hantera den stora mängden av informationsflöde i vården</p>
|
Page generated in 0.1003 seconds