Essays about: "master thesis computer information security"
Showing result 1 - 5 of 9 essays containing the words master thesis computer information security.
-
1. Efficient and Responsible Incident Management : Designing a Service Desk Web Application with Integrated Major Incident Reporting Functionality for Swedish Government Agencies
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : In this 7.5 HEC B-level thesis in Computer Science, a service desk web application is designed for Swedish government agencies with integrated major incident reporting functionality to the Swedish Civil Contingencies Agency (Myndigheten för samhällsskydd och beredskap). READ MORE
-
2. Blockchain for Education Records : An interpretive research on university students’ perceptions
University essay from Linnéuniversitetet/Institutionen för informatik (IK)Abstract : This research aims to explore students’ perceptions and their desired features on the use of blockchain technology for the management of education records. A literature review formed the basis of the theoretical background of this work by allowing to explore how education records are managed nowadays and the potential for the use of blockchain technology in this area, as well as the importance of user-centred design in order to achieve a higher user-acceptance. READ MORE
-
3. A tool for visual analysis of permission-based data access on Android phones
University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)Abstract : Privacy is a topic of ever-increasing interest in the modern, connected world. With the advent of smart phones, the boundary between internet and the personal sphere has become less distinct. Most users of smart phones have very vague ideas of how various apps intrude on their privacy. READ MORE
-
4. Using Blockchain Techniques to Create an Opinion-Based Whitelisting Procedure
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : Malware has proven to be a persistent problem with an increasing amount of variations, and new attack vectors are constantly being taken advantage of. Security specialists are always on the hunt for new technologies useful in the fight against malware. Blockchain technologies bring promises of high integrity, decentralization, and transparency. READ MORE
-
5. A development of a tool to improve traceability between requirement and verification
University essay from Lunds universitet/Avdelningen för Biomedicinsk teknikAbstract : In the development of a product or system it is important to know that all the requirements are verified and validated in order to maintain a good reputation and standard. Today ThyssenKrupp Marine Systems AB does not have a clear traceability between requirements and verification. READ MORE