Essays about: "impact of Information Technology on individual"

Showing result 1 - 5 of 64 essays containing the words impact of Information Technology on individual.

  1. 1. The Cost of Convenience: An Exploration of the Privacy Aspects in Period-Tracking Applications : A mixed-method study of perceived privacy by users in period-tracking applications

    University essay from Malmö universitet/Fakulteten för teknik och samhälle (TS)

    Author : Linnéa Beramand; [2023]
    Keywords : Femtech; Period-tracking; Actor-Network Theory; Privacy; Sceptical Design;

    Abstract : The increasing demand for female-centred services and devices in the digital era has challenged traditional notions of privacy. This thesis explores how users perceive privacy issues in period- tracking applications provided by various developers. READ MORE

  2. 2. Investigations and Development in the Area of Automated Security Evaluation of Android Devices with Focus on Bluetooth

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Robin Holmquist; [2023]
    Keywords : Bluetooth; Android; Common Criteria; Automated dynamic security evaluation; Mobile device security; Bluetooth; Android; Common Criteria; Automatiserad dynamisk s¨akerhetstestning; S¨akerhet f¨or mobila enheter;

    Abstract : Bluetooth is a technology that has been implemented in over 5 billion devices and therefore has a considerable impact. It is the dominant technology for shortrange wireless communication. READ MORE

  3. 3. Implementing Strategy through PPM in an Internal Development Department

    University essay from Linköpings universitet/Projekt, innovationer och entreprenörskap

    Author : Simon Millard; [2023]
    Keywords : project portfolio management; project management; portfolio management; PPM; PBO; PMO; PMI; PM; SPM; project based organization; strategy; portfolio strategy; project portfolio structuring; portfolio structuring framework; resource allocation; matrix organization; strategic effectiveness; strategic alignment; aggregate planning; project evaluation; portfolio prioritization; project prioritization; prioritization method; portfolio selection; project selection; portfolio balancing; project scoring; portfolio budgeting; portfolio roadmap; project screening; projektportfölj; projekt portfölj; projekt-portfölj; portföljhantering; projektorganisation; projekt organisation; resursallokering;

    Abstract : The focus of strategy research has long revolved around strategy formulation rather thanstrategy implementation, despite the evidence indicating that intended strategies are rarelyachieved. Project portfolio management, PPM, assumes a crucial role in enabling strategyimplementation and can be regarded as a representation of the organization's actual pursuedstrategy. READ MORE

  4. 4. Hard to reach energy consumers in Sweden

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : Sanna Lundin; [2023]
    Keywords : Energy consumers; hard to reach energy consumers; HTR; policies; behavior; FCM; Energikonsumenter; HTR; politiska åtgärder; FCM; beteende;

    Abstract : The transition towards a sustainable and low-carbon future requires significant changes in energy behaviour among energy consumers. However, the question remains about how, by whom, and what changes are necessary to achieve this transition. READ MORE

  5. 5. Information Classification in Information Security Management and its Challenges

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Robert Katura; [2023]
    Keywords : Information classification; information classification research gaps; risk analysis; risk assessment; risk management; information security;

    Abstract : Information classification is a prerequisite for carrying out risk management in information security, as the assets worth protecting are identified and the need for protection is determined by the classification categories. The information classification thus has a major impact on the security architecture of systems and organizations. READ MORE