Essays about: "Access Control"
Showing result 6 - 10 of 805 essays containing the words Access Control.
-
6. Exploring the influence of ICT on Financial Inclusion and Mobile Money Services in Sub-Saharan Africa
University essay from Göteborgs universitet/Institutionen för nationalekonomi med statistikAbstract : This thesis investigates the influence of two types of Information and Communication Technologies (ICT), internet and mobile phones, on Financial Inclusion (FI) and Mobile Money Mobile Money (MM) adoption in 24 Sub-Saharan African countries in the last decade. A unique feature of this research is the incorporation of an index measuring financial inclusion, developed specifically for this study. READ MORE
-
7. A Decentralised Application for Storing Electronic Health Records using Blockchain Technology
University essay from Göteborgs universitet/Institutionen för data- och informationsteknikAbstract : With the systems currently used in healthcare, medical records are often centrally stored in local databases or cloud services and managed by each individual healthcare provider. Due to this, the information exchange between healthcare providers is often limited. READ MORE
-
8. The Cost of Convenience: An Exploration of the Privacy Aspects in Period-Tracking Applications : A mixed-method study of perceived privacy by users in period-tracking applications
University essay from Malmö universitet/Fakulteten för teknik och samhälle (TS)Abstract : The increasing demand for female-centred services and devices in the digital era has challenged traditional notions of privacy. This thesis explores how users perceive privacy issues in period- tracking applications provided by various developers. READ MORE
-
9. Implementing a Zero Trust Environmentfor an Existing On-premises Cloud Solution
University essay from KTH/Hälsoinformatik och logistikAbstract : This thesis project aimed to design and implement a secure system for handling and safeguarding personal data. The purpose of the work is to prevent unauthorized actors from gaining access to systems and data. The proposed solution is a Zero Trust architecture which emphasizes strong security measures by design and strict access controls. READ MORE
-
10. Wi-Fi fingerprinting as a mean to measure building occupancy : A case study in an office environment
University essay from KTH/TransportplaneringAbstract : The task of collecting visitor data in an indoor environment and therein determining the occupancy of a building is an extensive task. Conventional methods are expensive, time-consuming, and often lack the ability to produce data in longer time series. Further, they often require disruption of the studied area as equipment must be deployed. READ MORE