Essays about: "Access Control"

Showing result 6 - 10 of 805 essays containing the words Access Control.

  1. 6. Exploring the influence of ICT on Financial Inclusion and Mobile Money Services in Sub-Saharan Africa

    University essay from Göteborgs universitet/Institutionen för nationalekonomi med statistik

    Author : Noa Almfors; Klara Stenman; [2023-07-10]
    Keywords : Sub-Saharan Africa; Financial Inclusion; Information and Communication Technology; Internet; Mobile Money;

    Abstract : This thesis investigates the influence of two types of Information and Communication Technologies (ICT), internet and mobile phones, on Financial Inclusion (FI) and Mobile Money Mobile Money (MM) adoption in 24 Sub-Saharan African countries in the last decade. A unique feature of this research is the incorporation of an index measuring financial inclusion, developed specifically for this study. READ MORE

  2. 7. A Decentralised Application for Storing Electronic Health Records using Blockchain Technology

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : Edenia Isaac; Hampus Jernkrook; NIls Johnsson; Christopher Molin; Wendy Pau; David Zamanian; [2023-03-03]
    Keywords : electronic health records; EHR; medical records; blockchain; Ethereum; IPFS; decentralised applications; Web3.Storage; information exchange; patientjournaler; blockkedja; decentraliserade applikationer; informationsdelning;

    Abstract : With the systems currently used in healthcare, medical records are often centrally stored in local databases or cloud services and managed by each individual healthcare provider. Due to this, the information exchange between healthcare providers is often limited. READ MORE

  3. 8. The Cost of Convenience: An Exploration of the Privacy Aspects in Period-Tracking Applications : A mixed-method study of perceived privacy by users in period-tracking applications

    University essay from Malmö universitet/Fakulteten för teknik och samhälle (TS)

    Author : Linnéa Beramand; [2023]
    Keywords : Femtech; Period-tracking; Actor-Network Theory; Privacy; Sceptical Design;

    Abstract : The increasing demand for female-centred services and devices in the digital era has challenged traditional notions of privacy. This thesis explores how users perceive privacy issues in period- tracking applications provided by various developers. READ MORE

  4. 9. Implementing a Zero Trust Environmentfor an Existing On-premises Cloud Solution

    University essay from KTH/Hälsoinformatik och logistik

    Author : Victor Pero; Linus Ekman; [2023]
    Keywords : Zero Trust; GitLab; Keycloak; OpenVPN; data protection; network security; access control; Zero Trust; GitLab; Keycloak; OpenVPN; dataskydd; nätverkssäkerhet; åtkomstkontroll;

    Abstract : This thesis project aimed to design and implement a secure system for handling and safeguarding personal data. The purpose of the work is to prevent unauthorized actors from gaining access to systems and data. The proposed solution is a Zero Trust architecture which emphasizes strong security measures by design and strict access controls. READ MORE

  5. 10. Wi-Fi fingerprinting as a mean to measure building occupancy : A case study in an office environment

    University essay from KTH/Transportplanering

    Author : Johan Bexhorn; Karl Kvarnefalk; [2023]
    Keywords : Wi-Fi tracking systems; Wi-Fi fingerprinting; footfall analytics;

    Abstract : The task of collecting visitor data in an indoor environment and therein determining the occupancy of a building is an extensive task. Conventional methods are expensive, time-consuming, and often lack the ability to produce data in longer time series. Further, they often require disruption of the studied area as equipment must be deployed. READ MORE