Essays about: "Communication Privacy Management"

Showing result 1 - 5 of 35 essays containing the words Communication Privacy Management.

  1. 1. A Qualitative Analysis of the Impact of Artificial Intelligence (AI) Adoption (Focusing on Machine Learning (ML)) on the Organizational Capabilities of the Telecom Industry in Sweden and Finland

    University essay from Blekinge Tekniska Högskola/Institutionen för industriell ekonomi

    Author : Neeraj Verma; [2023]
    Keywords : AI; R D; Industry 4.0; Qualitative Analysis; Innovation; Machine Learning; Business Performance; People and Culture; Process and Organization; Telecom; Technology.;

    Abstract : The German government's "Industry 4.0" paradigm transforms technology application across domains using real-time data and connectivity. The telecom sector's reliance on digital, software-driven infrastructure for real-time data and connectivity is paramount. READ MORE

  2. 2. Designing a Trustworthy EU Digital Identity Wallet : A study of user needs and preferences

    University essay from Uppsala universitet/Datorteknik

    Author : Madeleine Sjöholm; [2023]
    Keywords : eIDAS; trust; digital identity; EU digital identity wallet; regulation; usability;

    Abstract : The digitalization has become increasingly central in today’s society and digital identities are one of the tangible changes that has quickly become integrated into our society. However, increased integration in societies also creates new challenges and responsibilities. READ MORE

  3. 3. What Happens When the Cookies Crumble? : A mixed-method approach to investigate Internet users’ perceptions towards the Cookieless Future

    University essay from Linnéuniversitetet/Institutionen för marknadsföring och turismvetenskap (MTS)

    Author : Anikó Ács; Jelia Agiden; [2023]
    Keywords : Third-party Cookies; Consumer Perspective; User Intention; Perception;

    Abstract : Purpose: The purpose of this study is to investigate and understand the consumer perspective and intentions toward the prospect of a future without third-party cookies.Design/Methodology/Approach: This thesis utilized a combination of exploratory and confirmatory research design. A mixed-method approach was used for the data collection. READ MORE

  4. 4. Securing LwM2M with Mbed TLS in Contiki-NG

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Jayendra Ellamathy; [2023]
    Keywords : ;

    Abstract : As the Internet of Things (IoT) becomes increasingly integrated into our personal lives and industries, security concerns and attacks on these devices are growing. This concern is one of the major bottlenecks for adopting IoT, as these devices can often collect sensitive information. READ MORE

  5. 5. Understanding Informational Privacy Through User Interfaces in Web Applications

    University essay from Södertörns högskola/Medieteknik

    Author : Annalisa Spence; Mimmi Svensson; [2023]
    Keywords : Privacy; Information; Interface Design; Web Applications; Communication Privacy Management; Protection Motivation Theory; Integrity; HCI; Privacy Concerns; Quantitative;

    Abstract : This paper critically examines users' perceptions of privacy and security in web applications,emphasizing interface design. Drawing on both quantitative and qualitative data grounded inCPM and PMT theories, our research addresses Internet users' concerns regarding onlineprivacy and security. READ MORE