• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 18
  • 7
  • 3
  • 2
  • 2
  • 1
  • Tagged with
  • 39
  • 39
  • 14
  • 11
  • 10
  • 9
  • 7
  • 6
  • 6
  • 5
  • 5
  • 5
  • 5
  • 5
  • 5
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Future-Proofing Accessibility in UX: Swedish Perspectives on the European Accessibility Act

Söderholm, Elin January 2024 (has links)
As digital interactions become increasingly integral to our daily routines, ensuring web accessibility for all users is crucial. User experience designers play a big role in creating online environments that are not only usable, but also informative and enjoyable. The European Accessibility Act is a new directive from the European Union, stating that certain products and services must be accessible by 2025, benefiting an estimated 87 million Europeans who have disabilities or temporary impairments. Previous research on Swedish websites has found that requirements are often not fulfilled when it comes to accessibility. This thesis investigated current accessibility practices among Swedish user experience (UX) designers and evaluated their preparedness for compliance with the European Accessibility Act. The results of the interviews show that the Act provides several motivating factors for improving accessibility measures in organizations. Through expert evaluations of the design practices, a set of guidelines is presented, aimed at providing guidance for companies and designers in creating an inclusive design culture while complying with the Act.
22

Lösenordspolicy: En Balans Mellan Säkerhet och Användarvänlighet : Användarcentrerad utveckling av lösenordspolicyer för enklare hantering av lösenord / Password Policy: A Balance Between Security and Usability

Persson, Rasmus, Sylvan, Jonathan, Waenerlund, Edvin January 2024 (has links)
Lösenord är en av de vanligaste autentiseringsmetoderna idag men vid användning av lösenord så uppkommer det även utmaningar med hantering av lösenord. Till exempel när lösenordspolicyn kräver långa och komplexa lösenord har användare ofta svårt att komma ihåg sina lösenord och använder strategier för att memorera sina lösenord. Syftet med studien är att studera hur användarvänligheten kan förbättras i lösenordpolicyer. Studien beskriver utmaningar som användare upplever vid hantering av lösenord och lösenordspolicyn samt ansvarigas syn på en användarcentrerad utveckling av lösenordspolicyer. Detta har utförts genom semi-strukturerade intervjuer av anställda utan koppling till informationssäkerhetsarbetet samt ansvariga för informationssäkerhetspolicyn på svenska företag och organisationer. Studiens resultat visar att många anställda upplever utmaningar när det kommer till lösenordspolicyer. Den främsta utmaningen anställda upplever är återkommande lösenordsbyten som leder till att användare upplever att det blir svårare att komma ihåg sina lösenord. En del respondenter använder sig därför av riskfyllda strategier för att memorera sina lösenord. Merparten av ansvariga har en positiv syn till att involvera användare i utveckling av lösenordspolicyn eftersom det kan leda till förbättrad förståelse för policyn. Studiens slutsats visar att det finns förbättringspotential i lösenordspolicyer och bidrar med praktiska rekommendationer hur lösenordspolicyer kan förbättras ur en användarvänlighetssynpunkt som framställare kan använda vid utveckling av lösenordspolicyer. Andra användarvänliga rekommendationer föreslås i studiens slutsats för att underlätta hanteringen av lösenord för användare. Studien begränsar sitt omfång med att endast komma med praktiska rekommendationer kring hur lösenordspolicyer kan förbättras och inte hur en lösenordspolicy ska utformas i sin helhet. / Passwords are one the most common authentication methods today, but when using passwords, challenges also arise in password management. For example, when password policies require long and complex passwords, users often struggle to remember their passwords and resort to risky strategies to memorize them. The purpose of the study is to explore how usability can be improved in password policies. The study describes challenges that users face in password management and password policies, as well as the views of policy creators on user-centered development of password policies. The study has been conducted through semi-structured interviews with employees and the ones responsible for the password policy in Swedish companies and organizations. The results of the study show that many employees experience challenges with password policies. The primary challenge employees face is frequent password changes, which makes it harder for users to remember their passwords. Some respondents therefore use strategies to memorize their passwords. The majority of people responsible for the password policy have a positive view of involving users in the development of password policies because it can lead to improved understanding of the policy. The study concludes that there is room for improvement in password policies and provides practical recommendations on how password policies can be improved from a usability perspective that developers of password policies can use when developing password policies. Other usability recommendations are proposed in the study's conclusion to facilitate password management for users. The study limits its scope by only providing practical recommendations on how password policies can be improved, rather than how a password policy should be formulated in its entirety.
23

Från ax till limpa : Verksamhetsprocessen vid framtagande av applikationer till handdatorer på Fazer Bageri AB / <em>From ear to loaf </em> : <em>The organizational development process for application development for handheld computers at Fazer Bageri AB </em>

Lindquist, Jennie, Mikaela, Andersson January 2009 (has links)
<p>Human Computer Interaction (HCI) is a broad discipline that studies different concerns regarding interactive systems’ development. One of the major interest points within the discipline is the reasoning behind building specific functionality into computers and the long-term effects that usage of systems will have on humans.</p><p>Within Human Computer Interaction there are theories and frameworks how to involve a user in the process of developing new systems. In this paper focus is applied to the development process within developing applications for Enterprice Digital Assistants (EDA) and to what extent the end-users are involved in the process. Fazer Bageri AB has been choosen to represent a business corporation that uses handheld computers in their everyday tasks.</p><p>The method used to gather information for this study has been by performing interviews and observations with key stakeholders at Fazer Bageri AB and MobiOne AB. Fazer Bageri AB is the purchaser, customer and user of the handheld computer applications that MobiOne AB developed.</p><p>The result shows that the end-users were only involved in the end of the developing process. We found that one of the main reasons for this is that there are not any resources for supporting involvement of the end-users. Within user-centric design there are many aspects to consider, but one of the most prominently is to establish a mutual understanding by all persons involved in the project, from developers to end-users about the importance of involving users throughout the development. We also found that there is no routine established for securing that the information about different updates in the handheld computers reaches the end-users.</p><p>The development process demonstrates that Fazer Bageri AB uses a traditional system development philosophy rather than a user-centric system development philosophy.</p> / <p>Inom ämnet människa datorinteraktion handlar många metoder om hur man involverar användaren i framtagandet av nya system. I denna undersökning ville författarna ta reda på hur verksamhetsprocessen vid framtagande av systemapplikationer för handdatorer kan gå till och om användarna involveras i processen. Verksamhetsprocessen jämfördes sedan mot teorier inom området. Valet föll på att undersöka verksamhetsprocessen hos Fazer Bageri AB då vetskap fanns om att de har 350 chaufförer som använder handdatorer i sitt dagliga arbete. När man utvecklar för så många användare är det viktigt att ta med användaren tidigt i processen.</p><p>Metoderna som använts i undersökningen har varit strukturerade intervjuer och observationer. Respondenterna har varit nyckelpersoner inom Fazer Bageri AB och MobiOne AB. Fazer Bageri AB är beställare, kund och användare av de mobila applikationerna för handdatorer som MobiOne AB tillhandahåller och är experter på.</p><p>Resultatet visar att användarna i denna undersökning var involverade endast i slutet av processen, en orsak till detta tycks vara att det saknas resurser för att ersätta ytterligare involvering av användare. Med att ersätta menas i detta fall ekonomisk kompensation till chaufförerna för den extra arbetstid det skulle innebära att involveras i processen. En viktig aspekt inom användarcentrerad design är att säkerställa att samtliga involverade har samma uppfattning om det som skall göras eller vad som åstadkommits. Viktigt är därför att informationsflödet inom företagen fungerar för att samtliga skall ha möjlighet att ta del av arbetet. Informationsflödet mellan handdatoransvarig och slutanvändare hos Fazer Bageri AB kan verka tveksamt då det innefattar flera olika informationsled.</p><p>Verksamhetsprocessens olika faser som kartlagts skiljer sig delvis ifrån de teorier inom människa datorinteraktion som tagits del av inför denna undersökning. Detta beror till stor del på att Fazer Bageri AB har en traditionell systemutvecklingsfilosofi snarare än en användarcentrerad designfilosofi.</p>
24

Speech Translation into Pakistan Sign Language / Speech Translation into Pakistan Sign Language

Haseeb, Ahmed Abdul, Ilyas, Asim January 2012 (has links)
ABSTRACT Context: Communication is a primary human need and language is the medium for this. Most people have the ability to listen and speak and they use different languages like Swedish, Urdu and English etc. to communicate. Hearing impaired people use signs to communicate. Pakistan Sign Language (PSL) is the preferred language of the deaf in Pakistan. Currently, human PSL interpreters are required to facilitate communication between the deaf and hearing; they are not always available, which means that communication among the deaf and other people may be impaired or nonexistent. In this situation, a system with voice recognition as an input and PSL as an output will be highly helpful. Objectives: As part of this thesis, we explore challenges faced by deaf people in everyday life while interacting with unimpaired. We investigate state of art work done in this area. This study explores speech recognition and Machine translation techniques to devise a generic and automated system that converts English speech to PSL. A prototype of the proposed solution is developed and validated. Methods: Three step investigation is done as part of thesis work. First, to understand problem itself, interviews were conducted with the domain experts. Secondly, from literature review, it is investigated whether any similar or related work has already been done, state of the art technologies like Machine translation, speech recognition engines and Natural language processing etc. have been analyzed. Thirdly, prototype is developed whose validation data is obtained from domain experts and is validated by ourselves as well as from domain experts. Results: It is found that there is a big communication gap between deaf and unimpaired in Pakistan. This is mainly due to the lack of an automated system that can convert Audio speech to PSL and vice versa. After investigating state of the art work including solutions in other countries specific to their languages, it is found that no system exists that is generic and automated. We found that there is already work started for PSL to English Speech conversion but not the other way around. As part of this thesis, we discovered that a generic and automated system can be devised using speech recognition and Machine translation techniques. Conclusion: Deaf people in Pakistan lack a lot of opportunities mainly due to communication gap between deaf and unimpaired. We establish that there should be a generic and automated system that can convert English speech to PSL and vice versa. As part of this, we worked for such a system that can convert English speech to PSL. Moreover, Speech recognition, Machine translation and Natural language processing techniques can be core ingredients for such a generic and automated system. Using user centric approach, the prototype of the system is validated iteratively from domain experts. / This research has investigated a computer based solution to facilitate communication among deaf people and unimpaired. Investigation was performed using literature review and visits to institutes to gain a deeper knowledge about sign language and specifically how is it used in Pakistan context. Secondly, challenges faced by deaf people to interact with unimpaired are analyzed by interviews with domain experts (instructors of deaf institutes) and by directly observing deaf in everyday life situations. We conclude that deaf people rely on sign language for communication with unimpaired people. Deaf people in Pakistan use PSL for communication, English is taught as secondary language all over Pakistan in all educational institutes, deaf people are taught by instructors that not only need to know the domain expertise of the area that they are teaching like Math, History and Science etc. but they also need to know PSL very well in order to teach the deaf. It becomes very difficult for deaf institutes to get instructors that know both. Whenever deaf people need to communicate with unimpaired people in any situation, they either need to hire a translator or request the unimpaired people to write everything for them. Translators are very difficult to get all the time and they are very expensive as well. Moreover, using writing by unimpaired becomes very slow process and not all unimpaired people want to do this. We observed this phenomena ourselves as instructors of the institutes provided us the opportunity to work with deaf people to understand their feelings and challenges in everyday life. In this way, we used to go with deaf people in shopping malls, banks, post offices etc. and with their permission, we observed their interaction. We have concluded that sometimes their interaction with normal people becomes very slow and embarrassing. Based on above findings, we concluded that there is definitely a need for an automated system that can facilitate communication between deaf and unimpaired people. These factors lead to the subsequent objective of this research. The main objective of this thesis is to identify a generic and an automated system without any human intervention that converts English speech into PSL as a solution to bridge the communication gap between deaf and unimpaired. It is identified that existing work done related to this problem area doesn’t fulfill our objective. Current solutions are either very specific to a domain, e.g. post office or need human intervention i.e. not automatic. It is identified that none of the existing systems can be extended towards our desired solution. We explored state of the art techniques like Machine translation, Speech recognition and NLP. We have utilized these in our proposed solution. Prototype of the proposed solution is developed whose functional and non functional validation is performed. Since none of existing work exactly matches to our problem statement, therefore, we have not compared the validation of our prototype to any existing system. We have validated prototype with respect to our problem domain. Moreover, this is validated iteratively from the domain experts, i.e. experts of PSL and the English to PSL human translators. We found this user centric approach very useful to help better understand the problem at the ground level, keeping our work user focused and then realization of user satisfaction level throughout the process. This work has opened a new world of opportunities where deaf can communicate with others who do not have PSL knowledge. Having this system, if it is further developed from a prototype to a functioning system; deaf institutes will have wider scope of choosing best instructors for a given domain that may not have PSL expertise. Deaf people will have more opportunities to interact with other members of the society at every level as communication is the basic pillar for this. The automatic speech to sign language is an attractive prospect; the impending applications are exhilarating and worthwhile. In the field of Human Computer Interface (HCI) we hope that our thesis will be an important addition to the ongoing research. / Ahmed Abdul Haseeb & Asim ilyas, Contact no. 00923215126749 House No. 310, Street No. 4 Rawal town Islamabad, Pakistan Postal Code 44000
25

Från ax till limpa : Verksamhetsprocessen vid framtagande av applikationer till handdatorer på Fazer Bageri AB / From ear to loaf : The organizational development process for application development for handheld computers at Fazer Bageri AB

Lindquist, Jennie, Mikaela, Andersson January 2009 (has links)
Human Computer Interaction (HCI) is a broad discipline that studies different concerns regarding interactive systems’ development. One of the major interest points within the discipline is the reasoning behind building specific functionality into computers and the long-term effects that usage of systems will have on humans. Within Human Computer Interaction there are theories and frameworks how to involve a user in the process of developing new systems. In this paper focus is applied to the development process within developing applications for Enterprice Digital Assistants (EDA) and to what extent the end-users are involved in the process. Fazer Bageri AB has been choosen to represent a business corporation that uses handheld computers in their everyday tasks. The method used to gather information for this study has been by performing interviews and observations with key stakeholders at Fazer Bageri AB and MobiOne AB. Fazer Bageri AB is the purchaser, customer and user of the handheld computer applications that MobiOne AB developed. The result shows that the end-users were only involved in the end of the developing process. We found that one of the main reasons for this is that there are not any resources for supporting involvement of the end-users. Within user-centric design there are many aspects to consider, but one of the most prominently is to establish a mutual understanding by all persons involved in the project, from developers to end-users about the importance of involving users throughout the development. We also found that there is no routine established for securing that the information about different updates in the handheld computers reaches the end-users. The development process demonstrates that Fazer Bageri AB uses a traditional system development philosophy rather than a user-centric system development philosophy. / Inom ämnet människa datorinteraktion handlar många metoder om hur man involverar användaren i framtagandet av nya system. I denna undersökning ville författarna ta reda på hur verksamhetsprocessen vid framtagande av systemapplikationer för handdatorer kan gå till och om användarna involveras i processen. Verksamhetsprocessen jämfördes sedan mot teorier inom området. Valet föll på att undersöka verksamhetsprocessen hos Fazer Bageri AB då vetskap fanns om att de har 350 chaufförer som använder handdatorer i sitt dagliga arbete. När man utvecklar för så många användare är det viktigt att ta med användaren tidigt i processen. Metoderna som använts i undersökningen har varit strukturerade intervjuer och observationer. Respondenterna har varit nyckelpersoner inom Fazer Bageri AB och MobiOne AB. Fazer Bageri AB är beställare, kund och användare av de mobila applikationerna för handdatorer som MobiOne AB tillhandahåller och är experter på. Resultatet visar att användarna i denna undersökning var involverade endast i slutet av processen, en orsak till detta tycks vara att det saknas resurser för att ersätta ytterligare involvering av användare. Med att ersätta menas i detta fall ekonomisk kompensation till chaufförerna för den extra arbetstid det skulle innebära att involveras i processen. En viktig aspekt inom användarcentrerad design är att säkerställa att samtliga involverade har samma uppfattning om det som skall göras eller vad som åstadkommits. Viktigt är därför att informationsflödet inom företagen fungerar för att samtliga skall ha möjlighet att ta del av arbetet. Informationsflödet mellan handdatoransvarig och slutanvändare hos Fazer Bageri AB kan verka tveksamt då det innefattar flera olika informationsled. Verksamhetsprocessens olika faser som kartlagts skiljer sig delvis ifrån de teorier inom människa datorinteraktion som tagits del av inför denna undersökning. Detta beror till stor del på att Fazer Bageri AB har en traditionell systemutvecklingsfilosofi snarare än en användarcentrerad designfilosofi.
26

Plateforme ouverte, évolutive, sécurisée et orientée utilisateur pour l'e-commerce / Open, scalable, secure and user-centric platform for e-commerce

Delettre, Christian 12 December 2014 (has links)
De nos jours, l’e-commerce est devenu un écosystème complexe où de multiples solutions (en termes de plateforme) sont possibles et réalisables pour un e-commerçant. En parallèle, un nouveau paradigme a fait son apparition, celui du Cloud Computing. Malgré les avantages certains qu’il apporte, peu des plateformes existantes sont pensées pour fonctionner sur une architecture Cloud. De plus, face à la complexité d’obtenir une plateforme d’e-commerce (PE) sécurisée, flexible et évolutive s’appuyant sur des applications et services hétérogènes existants et répondant aux besoins des e-commerçants, il est légitime de se demander si une PE basée sur le Cloud permettrait de réellement simplifier les difficultés rencontrées par les e-commerçants. Cette thèse propose de valider la pertinence de l’utilisation du Cloud dans un contexte d’e-commerce avant de proposer les principes architecturaux d’une PE ouverte, évolutive et sécurisée basée sur une architecture de Cloud. De plus, la mise en œuvre d’une PE par un e-commerçant, n’est pas orientée utilisateur. Face à ceci, nous proposons un mécanisme orienté utilisateur simplifiant la mise en œuvre d’une PE tout en assurant un haut degré de sécurité au sein de celle-ci. Enfin, nous nous sommes également intéressés à répondre à la question suivante dans un contexte d’e-commerce : Comment assurer qu’aucune inférence d’activités sur une taille constatée d’une BD ne puisse être réalisée par des entités non autorisées ? Pour y répondre, nous proposons une solution de sécurité de dissimulation de données orientée utilisateur permettant de résoudre la propriété de confidentialité forte des données au sein des SGBDR. / Nowadays, e-commerce has become a complex ecosystem where multiple solutions (in terms of platforms) are possible and feasible for e-merchant. Concurrently, a new paradigm called Cloud Computing has emerged. Despite some advantages it brings, few of these platforms have been designed to operate on a Cloud architecture. Thus, because of the complexity to design a flexible and scalable e-commerce platform (EP), based on existing heterogeneous applications/services and fulfilling the needs of e-merchants, it is legitimate to ask ourself if a PE based on the Cloud would really simplify the difficulties faced by e-merchants. This thesis aims to validate the relevance of using the Cloud Computing in the e-commerce context and propose the architectural principles of an open, scalable and secure EP based on a Cloud architecture. In addition, the EP used by e-merchants are not user-centric EP. As a consequence, we propose a user-centric mechanism simplifying the design and implementation of an EP while ensuring a high security level. Finally, we tried to answer the following question: How to ensure that no activity inference on a database size, in an e-commerce context, can be achieved by unauthorized entities? As a response, we propose a user-centric security solution of data concealment to resolve the property of strong data confidentiality within relational database management system (RDBMS).
27

A head-in-hand metaphor for user-centric direct camera control in virtual reality

Günther, Tobias, Querner, Erich, Groh, Rainer 17 May 2021 (has links)
The explorative examination of constructed 3D models in immersive environments requires suitable user-centric interaction methods. Especially novel concepts for virtual camera control can offer advantages, e.g. for the analysis of model details. We extend the known concept of the camera-in-hand metaphor and implement a multidimensional viewport control technique that can be used with common head-mounted displays and VR-controllers. With our head-in-hand view the user is able to control the virtual camera directly by hand without losing the flexibility of head movements. To ensure convenient operation, the method restricts special rotation parameters and smoothes jerky gestures of the user hand. Inaddition, we discuss implications and improvement potential of the proposed concept as well as adverse effects on the user, such as motion sickness.
28

Sécurité pour les réseaux du futur : gestion sécurisée des identités / Security for future networks : secure identity management

Aissaoui Mehrez, Hassane 10 July 2015 (has links)
Aujourd'hui, l'Internet change radicalement nos habitudes, avec l'arrivée massive du nomadisme, l'internet des objets, l'utilisation croissante de l'informatique en grille, les services Web, les réseaux sociaux et l'émergence de nouvelles approches dans ces dernières années. La virtualisation des infrastructures informatiques et le Cloud Computing ont particulièrement, permis de définir des nouveaux paradigmes, appelés X as a Service (XaaS), introduisant ainsi une rupture assez franche avec les modèles traditionnels, qui sont perçus comme une étape préparatoire vers l'Internet du Futur. En effet, la mise en œuvre de ces paradigmes, permet de mutualiser et de réorganiser le système informatique de manière différente, de dématérialiser les infrastructures physiques, de déporter les systèmes ou les applications sur des conteneurs virtuels distants. Par conséquent, l'architecture globale de l'Internet doit évoluer, en s'appuyant fortement sur ces nouvelles approches, en particulier, le Cloud Computing et la virtualisation. Malheureusement, comme toute technologie nouvelle, elle crée de nouveaux risques, qui viennent se greffer aux problèmes traditionnels : la séparation des privilèges, la gestion des accès, la gestion de l'identité, les failles des logiciels de virtualisation, l'isolation des machines virtuelles (VM), la protection des données personnelles, la vie privée, la réversibilité pendant l'externalisation (Outsourcing), etc. Les services basés sur les Clouds requièrent des fonctions de collaboration inter-fonctionnelles sécurisées ainsi que des systèmes de protection contre l'utilisation abusive des ressources. Ces systèmes doivent être équilibrés de façon raisonnable avec les besoins de confidentialité, d’intégrité, de protection de la vie privée des utilisateurs. Ils doivent permettre l’authentification des utilisateurs sans révéler des informations sur leur identité. Ainsi, une offre de services personnalisés aux clients dans un environnement virtuel et/ou transorganisationnel, en utilisant des mécanismes de sécurité adaptés à des infrastructures traditionnelles, peut prendre une dimension très complexe dans le modèle Cloud Computing, et peut constituer des défis à soulever pour les fournisseurs de ces services. Parmi ces défis à résoudre, la gestion d’identités des ressources, qui constitue un élément crucial pour authentifier les services à consommer, minimiser le risque d’accès frauduleux à des données personnelles, qui peut conduire à des conséquences désastreuses pour une entreprise ou un client. Les solutions existantes sont insuffisantes pour répondre aux défis soulevés par ces nouvelles approches. La mise en œuvre de ces modèles et ces outils posent des défis sécuritaires à la fois d’ordre organisationnel, architectural et protocolaire, pour garantir à chaque client des niveaux de sécurité. Ces niveaux doivent être identifiés pour guider les choix architecturaux et techniques à prendre, pour répondre en particulier aux exigences (LoA : Level of Assurance) et (LoT : Level of Trust), qu’un fournisseur de Cloud doit mettre en place pour garantir et protéger ses ressources. En effet, ces verrous et ces défis sécuritaires vont être relevés dans ce travail de recherche qui se situe dans le cadre du projet sécurité pour les réseaux du futur (SecFuNet : Security for Future Networks). C’est un projet collaboratif entre l’Europe et le Brésil, qui implique neuf partenaires européens répartis sur (la France, la Pologne, l'Allemagne et le Portugal) et 7 partenaires académiques brésiliens. Ce projet a pour ambition de proposer une nouvelle infrastructure de sécurité générale pour la communication des informations des utilisateurs sur Internet. L’objectif principal est de concevoir et développer une nouvelle architecture de sécurité cohérente pour les réseaux virtuels. / Today, the Internet is changing radically our habits, especially with the massive influx of the nomadic techniques, the Internet of objects, the growing use of grid computing, wireless networks and the emergence of new approaches in recent years. In particular, the virtualization of the computing infrastructures, which allowed defining a new model called Cloud Computing, introducing an enough frank breakdown with the traditional models, can be perceived as a preparatory stage towards the Internet of future.The implementation of these approaches allows, in a different way : mutualization and organization of the computer system. It allows to dematerialize the physical infrastructures and to deport applications on distant containers. Therefore, the global architecture of Internet should be evolved. It will rely strongly on these new approaches and in particular, Cloud Computing and virtualization. However, no system is infallible especially if resources are distributed and mutualized. They raise a number of problems and involve directly security issues, which remain one of the main barriers to the adoption of these technologies.Like any new technology, Cloud Computing and virtualization create new risks, which come to graft to traditional threats of the outsourcing management of the privilege separation, the identity and accesses management, the robustness of the virtualization software, the virtual machine isolation, the personal data protection, reversibility, privacy... The traditional Internet architecture cannot provide the adequate solutions to the challenges raised by these new approaches: mobility, flexibility, security requirements, reliability and robustness. Thus, a research project (SecFuNet : Security For Future Networks) was validated by the European Commission, to provide some answers, to make a state of the art of these security mechanisms and a comprehensive study of orchestration and integration techniques based on protection components within overall security architecture.
29

Advanced personalization of IPTV services / Individualisation avancée des services IPTV

Song, Songbo 06 January 2012 (has links)
Le monde de la TV est en cours de transformation de la télévision analogique à la télévision numérique, qui est capable de diffuser du contenu de haute qualité, offrir aux consommateurs davantage de choix, et rendre l'expérience de visualisation plus interactive. IPTV (Internet Protocol TV) présente une révolution dans la télévision numérique dans lequel les services de télévision numérique sont fournis aux utilisateurs en utilisant le protocole Internet (IP) au dessus d’une connexion haut débit. Les progrès de la technologie IPTV permettra donc un nouveau modèle de fourniture de services. Les fonctions offertes aux utilisateurs leur permettent de plus en plus d’autonomie et de plus en plus de choix. Il en est notamment ainsi de services de type ‘nTS’ (pour ‘network Time Shifting’ en anglais) qui permettent à un utilisateur de visionner un programme de télévision en décalage par rapport à sa programmation de diffusion, ou encore des services de type ‘nPVR’ (pour ‘network Personal Video Recorder’ en anglais) qui permettent d’enregistrer au niveau du réseau un contenu numérique pour un utilisateur. D'autre part, l'architecture IMS proposée dans NGN fournit une architecture commune pour les services IPTV. Malgré les progrès rapides de la technologie de télévision interactive (comprenant notamment les technologies IPTV et NGN), la personnalisation de services IPTV en est encore à ses débuts. De nos jours, la personnalisation des services IPTV se limite principalement à la recommandation de contenus et à la publicité ciblée. Ces services ne sont donc pas complètement centrés sur l’utilisateur, alors que choisir manuellement les canaux de diffusion et les publicités désirées peut représenter une gêne pour l’utilisateur. L’adaptation des contenus numériques en fonction de la capacité des réseaux et des dispositifs utilisés n’est pas encore prise en compte dans les implémentations actuelles. Avec le développement des technologies numériques, les utilisateurs sont amenés à regarder la télévision non seulement sur des postes de télévision, mais également sur des smart phones, des tablettes digitales, ou encore des PCs. En conséquence, personnaliser les contenus IPTV en fonction de l’appareil utilisé pour regarder la télévision, en fonction des capacités du réseau et du contexte de l’utilisateur représente un défi important. Cette thèse présente des solutions visant à améliorer la personnalisation de services IPTV à partir de trois aspects: 1) Nouvelle identification et authentification pour services IPTV. 2) Nouvelle architecture IPTV intégrée et comportant un système de sensibilité au contexte pour le service de personnalisation. 3) Nouveau service de recommandation de contenu en fonction des préférences de l’utilisateur et aussi des informations contextes / Internet Protocol TV (IPTV) delivers television content to users over IP-based network. Different from the traditional TV services, IPTV platforms provide users with large amount of multimedia contents with interactive and personalized services, including the targeted advertisement, on-demand content, personal video recorder, and so on. IPTV is promising since it allows to satisfy users experience and presents advanced entertainment services. On the other hand, the Next Generation Network (NGN) approach in allowing services convergence (through for instance coupling IPTV with the IP Multimedia Subsystem (IMS) architecture or NGN Non-IMS architecture) enhances users’ experience and allows for more services personalization. Although the rapid advancement in interactive TV technology (including IPTV and NGN technologies), services personalization is still in its infancy, lacking the real distinguish of each user in a unique manner, the consideration of the context of the user (who is this user, what is his preferences, his regional area, location, ..) and his environment (characteristics of the users’ devices ‘screen types, size, supported resolution, ‘‘ and networks available network types to be used by the user, available bandwidth, ..’) as well as the context of the service itself (content type and description, available format ‘HD/SD’, available language, ..) in order to provide the adequate personalized content for each user. This advanced IPTV services allows services providers to promote new services and open new business opportunities and allows network operators to make better utilization of network resources through adapting the delivered content according to the available bandwidth and to better meet the QoE (Quality of Experience) of clients. This thesis focuses on enhanced personalization for IPTV services following a user-centric context-aware approach through providing solutions for: i) Users’ identification during IPTV service access through a unique and fine-grained manner (different from the identification of the subscription which is the usual current case) based on employing a personal identifier for each user which is a part of the user context information. ii) Context-Aware IPTV service through proposing a context-aware system on top of the IPTV architecture for gathering in a dynamic and real-time manner the different context information related to the user, devices, network and service. The context information is gathered throughout the whole IPTV delivery chain considering the user domain, network provider domain, and service/content provider domain. The proposed context-aware system allows monitoring user’s environment (devices and networks status), interpreting user’s requirements and making the user’s interaction with the TV system dynamic and transparent. iii) Personalized recommendation and selection of IPTV content based on the different context information gathered and the personalization decision taken by the context-aware system (different from the current recommendation approach mainly based on matching content to users’ preferences) which in turn highly improves the users’ Quality of Experience (QoE) and enriching the offers of IPTV services
30

Manipulerade streams och dess roll i musikbranschen : - En kvalitativ studie om hur manipulerade streams färgar dagens musikbransch (ur ett marknadsföringsperspektiv). / Stream manipulations and its role in the music industry : - A qualitative study of how manipulated streams color today's music industry (from a marketing perspective).

Berggren, Alva, Danielsson, Samuel, Ogvall, Bernadina January 2021 (has links)
The digitalization and emergence of the Internet have given rise to new platforms providing marketing, distribution and revenues to happen in the same place, a significant difference from the past. New platforms have become new places for artists to compete for, for instance, positions on toplists. This is the fundamental background to the occurrence of manipulated streams in the music industry. The purpose of this study has been to examine and create a deeper understanding of manipulated streams and its role in the music industry, from a marketing perspective. Thus, the study aims to provide knowledge on the meaning of having high streaming numbers, why streams are being manipulated and how they are used in marketing.  The empirical data is based on six interviews with people from different parts of the music business. The results indicate that manipulated streams affect expectations of the artist and provide an opportunity for the artist to stand out in today's information overload. The artists have gained more power and influence as they are now being compared with influencers, and can influence the way the audience listens to music. Moreover, the findings also indicate that actors and platforms of the music industry need adjustments to encounter the phenomenon of manipulated streams.  Lastly, we suggest that future research should focus on how to prevent the occurrence of manipulated streams, in addition to social media's effect on cognitive behaviours of the users in relation to high streaming numbers.

Page generated in 0.0544 seconds