Advanced search
Showing result 1 - 5 of 17 essays matching the above criteria.
-
1. The ideal use of NFT in Metaverse - A Systematic literature review
University essay from Stockholms universitet/Institutionen för data- och systemvetenskapAbstract : It has become possible to say that the metaverse is a great opportunity for investment and trade, as it provides massive financial returns. The metaverse is the next evolution in social connection and the successor to the mobile internet. READ MORE
-
2. How cybercrime has evolved in Sweden over the last ten years : A literature review
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : The number of recorded cybercrime incidents has skyrocketed over the last few years. A large part of this development is due to society’s increased reliance on the internet and the backbone that supports it. This in turn increases the profitability of cybercrime. READ MORE
-
3. Risking it to Libya : Irregular Migration from the Brong Ahafo Region of Ghana to Libya
University essay from Malmö universitet/Institutionen för globala politiska studier (GPS)Abstract : This thesis explores the phenomenon of irregular migration from the Brong Ahafo region of Ghana to Libya. It draws on migration theories to explain the underlying drivers of the phenomenon in the region. Many studies on irregular migration in Sub-Saharan Africa have predominantly attributed it to the push/pull theory. READ MORE
-
4. Contemporary Online Banking Fraud in Norway : A case study
University essay from Linnéuniversitetet/Institutionen för informatik (IK)Abstract : Banks are currently battling rising of fraudulent activities as it damages their relationship with their customers. Online banking fraud is decreasing trust and confidence among the customers and decreasing operating performance and increasing cost for the banks. READ MORE
-
5. Why Phishing Works on Smartphones
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Phishing is a form of internet fraud where an attacker attempts to acquire sensitive information from a target by posing as a trustworthy entity. One strategy to fool the target is to create a spoofed (illegitimate copy) of a legitimate website. READ MORE