Essays about: "Critical Security"

Showing result 21 - 25 of 528 essays containing the words Critical Security.

  1. 21. A Qualitative Analysis of the Impact of Artificial Intelligence (AI) Adoption (Focusing on Machine Learning (ML)) on the Organizational Capabilities of the Telecom Industry in Sweden and Finland

    University essay from Blekinge Tekniska Högskola/Institutionen för industriell ekonomi

    Author : Neeraj Verma; [2023]
    Keywords : AI; R D; Industry 4.0; Qualitative Analysis; Innovation; Machine Learning; Business Performance; People and Culture; Process and Organization; Telecom; Technology.;

    Abstract : The German government's "Industry 4.0" paradigm transforms technology application across domains using real-time data and connectivity. The telecom sector's reliance on digital, software-driven infrastructure for real-time data and connectivity is paramount. READ MORE

  2. 22. Enhancing human-robot interaction using mixed reality

    University essay from Högskolan i Skövde/Institutionen för ingenjörsvetenskap

    Author : Santiago Molina Morillas; [2023]
    Keywords : Human-robot interaction; mixed reality; autonomous mobile robots; safety;

    Abstract : Industry 4.0 is a new phase of industrial growth that has been ushered in by the quick development of digital technologies like the Internet of Things (IoT), artificial intelligence (AI), and robots. Collaborative robotic products have appeared in this changing environment, enabling robots to collaborate with people in open workspaces. READ MORE

  3. 23. Matching ESCF Prescribed Cyber Security Skills with the Swedish Job Market : Evaluating the Effectiveness of a Language Model

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Al Ghaith Ahmad; Ibrahim Abd ULRAHMAN; [2023]
    Keywords : ESCF; ChatGPT; Scraping; Crawler; Prompt Engineering;

    Abstract : Background: As the demand for cybersecurity professionals continues to rise, it is crucial to identify the key skills necessary to thrive in this field. This research project sheds light on the cybersecurity skills landscape by analyzing the recommendations provided by the European Cybersecurity Skills Framework (ECSF), examining the most required skills in the Swedish job market, and investigating the common skills identified through the findings. READ MORE

  4. 24. How to Educate an Organization in Working with Security Topics from a User Experience Perspective

    University essay from Lunds universitet/Ergonomi och aerosolteknologi; Lunds universitet/Certec - Rehabiliteringsteknik och Design

    Author : Felicia Gabrielii Augustsson; Anna Dahlström; [2023]
    Keywords : User centered design; threat analysis; security; experiential learning; gamification; interactive learning tool; the design process; Technology and Engineering;

    Abstract : In today's rapidly evolving society, the pervasive influence of technology has profoundly transformed various aspects of human life, presenting both unprecedented opportunities and critical security challenges. To mitigate the risks of data breaches, malicious attacks, and overall cyber threats, companies have taken proactive measures by providing education and training to their employees in the areas of cyber security and software security. READ MORE

  5. 25. Investigating the Impact of User Behavior in the Security of Smart Home IoT Devices

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Maha Ghunaim; [2023]
    Keywords : Smart Homes; Smart Home Devices; Home Automation; User Behavior; Internet of Things IoT ; Smarta hem; smarta hemenheter; hemautomation; användarbeteende; internet av Saker IoT ; المنازل الذكية ، أجهزة المنزل الذكي ، أتمتة المنزل ، سلوك المستخدم ، إنترنت أشياء إنترنت الأشياء ;

    Abstract : As technology is growing at a fast pace, IoT-based smart home services are increasingly adopted by people. IoT-based smart homes offer numerous unimaginable benefits, including efficiency, safety, effectiveness, scalability of services, devices, and data, among many others. However, there is another side to this technology: security threats. READ MORE