• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 414
  • 410
  • 261
  • 177
  • 155
  • 32
  • 27
  • 22
  • 17
  • 15
  • 13
  • 8
  • 8
  • 6
  • 6
  • Tagged with
  • 1671
  • 330
  • 287
  • 264
  • 241
  • 226
  • 178
  • 177
  • 146
  • 140
  • 135
  • 134
  • 113
  • 110
  • 109
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
561

Internet of Things i 5G : En systematisk litteraturstudie av säkerhetsrisker för privatpersoner med Internet of Things-enheter i 5G-nätverk / Internet of Things in 5G : A systematic literature review of security risks for individuals with Internet of Things-devices in 5G networks

Resell, Joakim January 2020 (has links)
De senaste åren har Internet of Things-enheter fått en explosionsartad tillväxt och möjligheterna är oändliga för hur tillverkare kan öka vår livskvalitet genom internetuppkopplade objekt. Således har Internet of Things-enheter i olika former hittat sin plats i många personers hem och liv. Ännu större blir utvecklingsmöjligheterna då 5G-nätverket kommer implementeras i vårt samhälle inom snar framtid. 5G förväntas bidra med, i jämförelse med 4G, väldigt snabba dataöverföringshastigheter och nya teknologier. Syftet med Internet of Things-enheter är att på något sätt öka användares livskvalitet, men då de även är enkla måltavlor för angrepp riskerar dem att snarare försämra den för privatpersoner. Faktum är att antalet malware-angrepp ständigt ökar,och då särskilt mot Internet of Things-enheter. Då 5G bidrar med nya teknologier som låter enheter ha en direkt sammankopplad kommunikation och uppkoppling till internet lyfter det frågan huruvida det har en påverkan på privatpersoners informationssäkerhet. Detta arbete innefattar en systematisk litteraturstudie kring säkerhetsrisker för privatpersoner med Internet of Things-enheter i 5G-nätverk. Studiens resultat tyder på att Internet of Things-enheter i 5G-nätverk tillsammans bildar en farlig miljö för privatpersoner ur ett informationssäkerhetsperspektiv. Studiens resultat bidrar med en översikt bestående av sex säkerhetsrisker med Internet of Things-enheter i 5G-nätverk, sjutton sårbarheter som säkerhetsriskerna innefattar, dess konsekvenser samt huruvida säkerhetsriskerna och sårbarheterna innebär riskfaktorer gentemot privatpersoners konfidentialitet, integritet eller tillgänglighet. / In recent years, Internet of Things-devices have experienced explosive growth, and the possibilities are endless for how manufacturers can increase our quality of life through Internet-connected objects. Thus, Internet of Things devices in various forms have found their place in the homes and lives of many people. Even greater will the the development opportunities be as the 5G network will be implemented in our society in the near future. 5G is expected to contribute, in comparison with 4G, very fast data transferspeeds and new technologies. The purpose of Internet of Things-devices is to somehow increase the quality of life of users, but as they are also simple targets for attacks, they risk rather deteriorating it for individuals. In fact, the number of malware attacks is constantly increasing, especially against Internet of Things-devices. As 5G contributes new technologies that allow devices to have a direct interconnected communication and connection to the Internet, it raises the question of whether it has an impact on individuals' information security.This study includes a systematic literature review on security risks for individuals with Internet of Things-devices in 5G networks. The study's findings suggest that Internet ofThings-devices in 5G networks together create a dangerous environment for individuals from an information security perspective. The study's findings provide an overview of six security risks with Internet of Things-devices in 5G networks, seventeen vulnerabilities that include security risks, their consequences and whether the security risks and vulnerabilities involve risk factors against individuals' confidentiality, integrityor accessibility.
562

Podpora školy žákům, kteří zažili ztrátu blízké osoby / School support for pupils suffering from the loss of relatives

Zemanová, Kateřina January 2020 (has links)
This diploma thesis is dealing with the methods teachers and school psychologist may use to approach their pupils who have been affected by the death of their relative, particularly a family member. The theoretical part of the thesis is focusing on the existing research in the area of mourning of school-age children and pays special attention to the risks connected with insensitive approach of teachers in this matter. The thesis tries to introduce some principles of the teacher's sensitive approach during the lessons, while paying extra attention to the personal and moral development of the individual in the area of their perception of surroundings, specifically during Civic Education and Health Education. The next topic in the theoretical part is the cognitive development of pupils and their view on the death itself in general, as it is a part of life that we have to somehow prepare for and thus need to have some kind of knowledge about the difficulties that come with death. The empirical part consists mainly of individual interviews with teachers and one school psychologist. As for the part of the interviews, analysis of study materials was included in which both their advantages and possible risks were considered. The aim of this thesis is mainly to formulate principles of the sensitive...
563

Negative affect, introversion and physiological markers of cardiovascular disease.

Martin, Luci A. 08 1900 (has links)
Cardiovascular risk factors have expanded to include personality and other psychological characteristics. Negative affect (NA) has a longstanding history in cardiovascular health, but the path by which NA leads to cardiovascular disease (CVD) is yet to be defined. The following study examined the relationship of high NA and low extroversion (EX) with physiological cardiovascular markers in a sample of non-medical, professional adults. Our results indicated that individuals high in NA and low in EX displayed a significantly lower platelet count and a significantly higher mean platelet volume. Individuals high in NA displayed a significantly lower cholesterol risk ratio, while individuals high in EX displayed significantly higher platelet counts. Personality was not significantly related to blood pressure, high or low density lipoproteins. Understanding the relationships among psychological variables and physiological markers will help clinical researchers design interventions that reduce the likelihood of CVD.
564

Analysis of Security Risks in Mobile Payments : A Case Study Using DNAT

Ba, Jing January 2013 (has links)
Technology development always makes the life easier and faster thus it also impacts the way we do business in our lives. As the widespread usage of mobile devices in recent years mobile technology has created an environment in which people around the world are getting closer. Recently the popularity of personal mobile devices like Ipad and Iphone leads to the appearance of opportunities to improve payments more fast and efficient. And for the past years various services and applications for mobile payment have been developed by the companies which are eager for the leader positions in the new market. With the development of mobile payment and the important relationship between payment and our lives, a lot of security risks associated with this field should be extensively studied. This thesis aims to analyze the security risks related to the mobile payment. This thesis uses an explorative method to research the stakeholders, critical assets and vulnerabilities within mobile payment by utilizing case studies of Square and Google Wallet. The information gathered from the case studies and security analysis is further analyzed by the dynamic network analysis tool (ORA) in order to discover the security risks. The results of this thesis indicate that accounts and business data are the most critical assets in mobile payment because accounts are the foundation to perform payment transactions. Further, the mobile payment service provider, merchant and consumer are the stakeholders affected most by the security risks. And this thesis concludes that all the stakeholders should be aware of the security risks within the mobile payment environment, and further if service and device providers want to keep continuous business they should make more effort to cooperate with each other to protect the users against these risks.
565

Material Supply Risks for the Energy Transition: A Quantitative Analysis of Resources, Production Concentration and Geopolitical Risks

Pozybill, Ria January 2022 (has links)
The Paris Agreement aims to limit the global temperature to below 2°C above the pre-industrial level. In order to achieve this target, almost 200 countries committed to Nationally Determined Contributions to reduce their greenhouse gas emissions. Diverse strategies are applied to achieve the necessary emissions reductions. One such strategy is large-scale renewable energy deployment. Certain key minerals are needed to produce green technologies such as electric vehicles and wind turbines. This thesis is concerned with the minerals cobalt, lithium and rare earths which are key components of lithium-ion batteries and/or permanent magnets used in many green technology applications. The academic community is aware that these critical materials are largely found in fragile and undemocratic states. The question is how the energy transition may be impacted by the fragile state of critical mineral producing countries. Therefore, this thesis aimed to investigate the supply and geopolitical risks on the critical materials market in the short- and medium-term. An analysis of the markets and a projection of their future development were conducted through maximum depletion rate modelling, the calculation Herfindahl-Hirschman indexes and risk-weighting country index scores. The results showed that the mineral markets are projected to remain highly concentrated which points to a continued vulnerability to risks emanating from individual production countries. The study found that the kinds of risk categories impacting a market depend on the distribution of market shares among countries. As production constraints arise in individual countries, the risk portfolio of the market changes. The study also concluded that countries like China that invest in mining projects abroad can contribute to the risks of a mineral that they are not producing themselves.
566

Manufacturing in Europe Vs. North America : A case study of a global manufacturer / Manufacturing in Sweden Vs. the U.S : A case study of a global manufacturer

Högklint, Oskar, Bergstrand, Oscar January 2022 (has links)
Abstract  Purpose – The purpose of this study is to investigate if it is more efficient and effective to manufacture in North America or supply from Europe. This will be calculated with the help of a tool created by the two authors. The tool created in this study will be the basis for future strategy and manufacturing decisions in Sweden or locally in the U.S. The study will thereby answer the following research questions to fulfill its purpose:  RQ1: What costs influence the transportation between Sweden and the U.S?  RQ2: What risks influence the transportation between Sweden and the U.S?  RQ3: What is an efficient and effective strategy to implement for a supplier in order to improve costs and decrease risks?  Method – A case study was carried out by the authors at a global manufacturer plant located in Fountain Inn, South Carolina, USA. The results have been found using methods including documentation studies and semi-structured interviews collecting both qualitative and quantitative data. An analysis of the empirical data combined with the literature theories was conducted thereafter.  Findings – It was found that the freight cost and the packaging cost were the most influential costs when calculating the total cost for the whole transportation between Sweden and the U.S. Moreover, was the risk of interruption of the transport during the freight overseas seen as the most influential risk that could influence the cost of the transportation. The developed tool and the simulated scenarios indicated that it would be more efficient to manufacture in North America than transport the goods from Europe. The developed tool can be used for future strategy and manufacturing decisions in Sweden or locally in the U.S.  Implications – Depending on which scenario due to the user's input, the study’s implications can differ. However, when comparing the two alternatives, the most common outcome was consistent being to manufacture in the U.S. This would, in most scenarios, be seen as cheaper than manufacturing the articles in Sweden and then shipping all these to the U.S by freight.   Limitations – Considering the purpose of this study is to investigate if it is more efficient and effective to transport the goods from Europe or manufacture in North America. Therefore, this thesis will not consider costs related to the assembly line and manufacturing. Neither will costs associated with the environment, such as carbon dioxide emission and air pollution. This also applies to the quality cost incurred because of scarcity and other factors related to quality control. These areas are not believed to affect the tool and its calculation, as the requirements for quality and the environment are high at the case company. The focus of this study will be on sea freight by cargo ship and road by truck.  Keywords – Supply chain, Logistics, ABC-calculations, Transportation calculations, risks
567

Information Security Guidelines for Organizations Intending to Adopt Cloudsourcing

Annamalai, Neelambari January 2012 (has links)
Change is constant and computing paradigm is no exception. It has witnessed major shifts right from centralized client server systems to widely distributed systems. This time the locus of change in the computing paradigm is moving towards virtualization, paving way to cloud computing. Cloud computing aims at providing computing services to its users as an utility. It allows its authenticated users to access a wide range of highly scalable computing capabilities and services via the internet on a pay-per-usage basis. Organisations not only view these benefits as cost-saving strategies, but also aim at improving the competitive advantages using cloud computing. Hence, this has given rise to a new horizon in IT/IS outsourcing. With a collaboration of cloud computing and outsourcing emerged a new concept called cloudsourcing. Cloudsourcing can be termed as the next generation outsourcing and the next phase of cloud computing promising benefits from both the areas. Cloudsourcing is outsourcing traditional business via the cloud infrastructure. Though there is pompous popularity surrounding this new technology, there is much hesitation in adopting it due to the inherent security issues. This paper discusses in detail the security issues and possible solution to the same. As this is a new concept, not much work is identified to be done in providing a set of guidelines to adopt cloudsourcing that are very specific to information security. This work intends to fill this aperture by building a set of well-defined information security guidelines, which can be termed as a novel. For this purpose, design science research method proposed by Hevner et al is used so as to accomplish this goal. Initially, a literature study is done after which an exploratory study comprising of interviews is done to gather qualitative data. The results of the exploratory interview is tested for correctness and evaluated based on an evaluation study comprising a survey based questionnaire. The analysis of the evaluation study results provides the final results. In such an attempt, the identified countermeasures to risks are classified into three groups namely, organisational, technical and regulatory and compliance guidelines. Hence the end results constituting the set of information security guidelines are classified into the above mentioned groups. This work is assumed to contribute to our understanding of information security in cloudsourcing and in supporting IT decision makers, IT project managers and security executives of organisations for a smooth and secure transition towards cloudsourcing their business.
568

WATER RESOURCES IN NAKAMTENGA, BURKINA FASO : QUALITY, QUANTITY AND RISKS

Isaksson, Gustav, Andersson, Niklas January 2014 (has links)
Nakamtenga is situated in Burkina Faso, one of the poorest countries in the world suffering from lack of potable water and food security, leading to starvation and illnesses such as diarrhea. The purpose and goal of the field study was consequently to analyze the water situation in Nakamtenga so that the results and conclusions drawn from it could help to improve the water situation. It was done by investigating the water quality, quantity, risks of contamination and how the water is handled. At the time of observation Nakamtenga had seven functioning wells; two open dug wells and five closed pumps. The water quality analyses indicate that the quality is generally good, with exception of the open wells, of which the water has significant amounts of coliforms. The phosphate levels are above 0.6 mg/l in six of the wells, which indicate that the water may be affected by human activities. The most significant threat to the water quality is the handling of the water, which is inappropriate in many ways. Placing of funnels in spill water from the wells, not covering the containers used to store water and placing fetching materials in the dirt are examples of improper handling. Other risks of contamination are lacks in the construction of the wells, latrines placed near the wells and use of pesticides/herbicides. Another major problem is that the pumps break too often; there is water but the inhabitants cannot reach it. It is important to take in consideration that the mapping was made during the dry season. Since conditions are very different during the rainy season it is recommended to do further studies during this period, or at least, being attentive to indications of changes in water quality and supply. To improve the water situation several measures can be taken. Education concerning the handling of the water (hygiene and sanitation) is one of the most important. Actions should also be taken to improve the water quality in the open wells. Reducing contamination risks is possible at all wells since deficiencies and flaws occur everywhere. Moreover the documentation and organization of water related issues is insufficient. Improving this work could significantly improve the water situation in the village.
569

Risker med smarta hem : En kvantitativ studie om individens riskmedvetenhet

Arnegärd, Lovisa, Sjödahl, Gisela January 2019 (has links)
Smart homes are a growing digital phenomenon worldwide. It is widely used in everyday lifeby many people and the number of users increases significantly the more the area develops. Thesmart home contributes to many advantages both from an environmental perspective and froma comfort perspective, but as with most digital solutions, smart homes also have a backside, inthe form of security problems. There are many risks associated with using a smart home, andthe purpose of the study is to find out to what extent the individuals are aware of the risksassociated with smart homes, and to find out which risks affect the individuals the most, basedon their own point of view. The questions underlying the study are as follows: "To what extentis the individual aware of the risks associated with smart homes?" and "What risks have thegreatest impact on the individual?". In order to answer these questions, the study has beencarried out through a quantitative method in which a questionnaire was designed, the surveypresented, among other things, the risks that were chosen from the theory where we asked therespondents how conscious they are about these risks. The result shows that the majority ofrespondents are aware that there are risks with smart homes. The study shows that the greatestknowledge existed about the risks of eavesdropping and traffic analysis, even for those whowere not users of smart homes and regardless of age group. As for the other risks, it is users ofsmart homes who have the greatest knowledge about the risks and also individuals aged 30-39.Eavesdropping is the risk that the individuals consider to be the most and least serious risk.Future research in the field can be to find out how the users protect themselves against the risksand to carry out a similar study with a qualitative method to get more nuanced answers.
570

SOCIALSEKRETERARES PÅ EKONOMISKT BISTÅND UPPLEVELSE AV ATT UTREDA SPELMISSBRUK

Bårdby, Christian January 2019 (has links)
This study focuses on how gambling disorder is a part of the investigation at the social office. Gambling disorder is a part of Socialtjänstlagen. This new law came into effect 1/1-2018. The purpose of this study is to examine how the economic aid, in the social office, works with gambling disorder. The study was made from a qualitative approach and was conducted through semi-structured interviews, the results of which were consequently analyzed by using a theory about social constructionism and social construction. The results indicated that there were some problems in how to ask questions about gaming disorder when meeting with the clients. The study also showed that the investigation are suppose to include the child perspective, but not to which extend this investigation should be made. This study shows the importance of knowledge and understanding in how to help clients with a gambling disorder. The study also shows that social workers might not have enough qualification to investigate gambling disorder among their clients.

Page generated in 0.0596 seconds