Essays about: "user integrity"

Showing result 1 - 5 of 77 essays containing the words user integrity.

  1. 1. A FUTURE WITHOUT THIRD-PARTY COOKIES A study of how Swedish small and medium-sized marketing agencies are affected by the loss of third-party cookies and how potential change strategies are communicated.

    University essay from Institutionen för tillämpad informationsteknologi

    Author : Johanna Elmér; Johanna Nilsson; [2023-02-01]
    Keywords : Digital communication; user integrity; personalized advertising; third-party cookies; organizational change strategies;

    Abstract : For years, digital communicators have taken advantage of the phenomena of third-party cookies to help understand online user behavior in order to produce personalized advertising. The increased discussion of user integrity has led to new privacy regulations and the largest web browsers have therefore banned third-party cookies or plan to remove them in the near future. READ MORE

  2. 2. A SYSTEMATIC REVIEW OF ATTRIBUTE-BASED ENCRYPTION FOR SECURE DATA SHARING IN IoT ENVIRONMENT.

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Faith Nnenna Onwumere; [2023]
    Keywords : IoT; ABE; Attribute-based Encryption; CP-ABE; KP-ABE; Internet of Things; Cryptography; Smart Devices;

    Abstract : Internet of Things (IoT) refers to a network of global and interrelated computing devices that connects humans and machines. It connects anything that has access to the internet and creates an avenue for data and information exchange. READ MORE

  3. 3. Confidential Federated Learning with Homomorphic Encryption

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Zekun Wang; [2023]
    Keywords : Cloud Technology; Confidential Computing; Federated Learning; Homomorphic Encryption; Trusted Execution Environment; Molnteknik; Konfidentiell databehandling; Federerad inlärning; Homomorfisk kryptering; Betrodd körningsmiljö;

    Abstract : Federated Learning (FL), one variant of Machine Learning (ML) technology, has emerged as a prevalent method for multiple parties to collaboratively train ML models in a distributed manner with the help of a central server normally supplied by a Cloud Service Provider (CSP). Nevertheless, many existing vulnerabilities pose a threat to the advantages of FL and cause potential risks to data security and privacy, such as data leakage, misuse of the central server, or the threat of eavesdroppers illicitly seeking sensitive information. READ MORE

  4. 4. ChatGPT as a Supporting Tool for System Developers : Understanding User Adoption

    University essay from Högskolan Dalarna/Informatik

    Author : Mattias Andersson; Tom Marshall Olsson; [2023]
    Keywords : AI; Conversational AI; System developer; ChatGPT; TAM; AI; Konversations-AI; Systemutvecklare; ChatGPT; TAM;

    Abstract : Bakgrund: AI, specifikt konversations-AI som OpenAI:s ChatGPT, växer snabbt i både privata och professionella sammanhang, vilket erbjuder möjligheter till kostnadsbesparingar och modernisering för företag. ChatGPT kan simulera mänskliga konversationer, vilket kan ge fördelar i flera olika industrier och kan genom samarbete mellan människa och AI potentiellt förbättra anställdas produktivitet. READ MORE

  5. 5. Novel attacks against VR applications delivered over the internet : Gathering information about a virtual reality user

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Oscar Stolpe Östman; Gunnar Samuelsson; [2023]
    Keywords : Virtual reality; Fingerprinting attack; VR-security;

    Abstract : Virtual reality systems are increasing in popularity and are being applied to new areas as time moves on. Gaming and entertainment however still remain the most frequent implementation of virtual reality systems. Many applications are delivered over the internet which exposes a system to a number of security threats. READ MORE