• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 11
  • 1
  • Tagged with
  • 22
  • 22
  • 10
  • 10
  • 8
  • 8
  • 8
  • 8
  • 8
  • 8
  • 8
  • 8
  • 8
  • 8
  • 8
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Exploring barriers to Mobile e-ID adoption : A government perspective on Republic of Moldova Mobile e-ID

Rosca, Victoria January 2017 (has links)
As more and more governments have embarked on the e-government path, providing digital interaction with its citizens has boosted the demand for trusted electronic identity solutions that can ensure an official match between an online identity and a physical one. Along with this trend, the affordability and diffusion of mobile devices has translated into a strong push for governments to diversify e-ID channels by developing digital identification on mobile devices also known as Mobile e-ID. Mobile e-ID offers citizens legally binding identification, authentication and qualified electronic signatures and it has been already successfully implemented by some countries at a nation-wide scale. Extant research has investigated mobile e-ID from a technical oriented perspective focusing on potential deployment models, however little is known about the challenges a country is facing in making mID adopted by a wider number of users/ citizens. Addressing this, I run a case study on Republic of Moldova’s nationwide mobile e-ID solution to investigate the barriers to Mobile e-ID. Accordingly, I identify 18 barriers which are organised into 5 categories.
22

Utvärdering av nätverkssäkerheten på J Bil AB / Evaluation of the network security at J Bil AB

Ahmed, Olfet, Saman, Nawar January 2013 (has links)
Detta examensarbete är en utvärdering av nätverkssäkerheten hos J BiL AB, både på social och teknisk nivå. Företaget är beroende av säkra Internet-anslutningar för att nå externa tjänster och interna servrar lokaliserade på olika geografiska platser. Företaget har ingen IT-ansvarig som aktivt underhåller och övervakar nätverket, utan konsulterar ett externt dataföretag. Syftet med examensarbetet är att utvärdera säkerheten, upptäcka brister, ge förbättringsförslag och till viss del implementera lösningar. För att undersöka säkerheten har observationer och intervjuer med personalen gjorts och ett flertal attacker mot nätverket har utförts. Utifrån den data som samlats in kunde slutsatsen dras att företaget har brister vad gäller IT-säkerheten. Framförallt den sociala säkerheten visade sig ha stora luckor vilket till stor del beror på att de anställda varken har blivit utbildade eller fått någon information om hur de ska hantera lösenord, datorer och IT-frågor i allmänt. Förbättringsförslag har getts och viss implementation har genomförts för att eliminera bristerna. De anställda har även med hjälp av en IT-policy och föreläsning blivit utbildade i hur de ska agera och tänka kring IT-relaterade säkerhetsfrågor. / The aim of this project is to evaluate the network security at J Bil AB. The focus will be on both social and technical issues. For the employees to be able to con-nect to remote servers and external services and perform their daily work tasks, secure connections is needed. J Bil Ab has no IT manager who actively maintains and monitors the network; rather they consult a computer company when changes and implementations are required. The projects’ goal is to identify gaps, come up with suggestions for improvement and to some extent implement so-lutions. To do this, an observation of the employees hav been made, an inter-view have been held, and several attacks on the network have been performed. Based on the data collected, it was concluded that the company has shortcom-ings in IT security. Above all, the social security appeared to have major gaps in it and that is mainly because the lack of knowledge among the employees and they have never been informed of how to manage their passwords, computers and IT issues in general. Suggestions for improvement have been given and some implementations have been performed to eliminate the deficiencies.

Page generated in 0.0243 seconds