Essays about: "Internet penetration"

Showing result 1 - 5 of 79 essays containing the words Internet penetration.

  1. 1. Exploring the influence of ICT on Financial Inclusion and Mobile Money Services in Sub-Saharan Africa

    University essay from Göteborgs universitet/Institutionen för nationalekonomi med statistik

    Author : Noa Almfors; Klara Stenman; [2023-07-10]
    Keywords : Sub-Saharan Africa; Financial Inclusion; Information and Communication Technology; Internet; Mobile Money;

    Abstract : This thesis investigates the influence of two types of Information and Communication Technologies (ICT), internet and mobile phones, on Financial Inclusion (FI) and Mobile Money Mobile Money (MM) adoption in 24 Sub-Saharan African countries in the last decade. A unique feature of this research is the incorporation of an index measuring financial inclusion, developed specifically for this study. READ MORE

  2. 2. A cybersecurity audit of the Garmin Venu

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Oliver Antal; [2023]
    Keywords : IoT wearables; cybersecurity; penetration testing; sniffing; fuzzing; sakernas internet bärbara enheter; cybersäkerhet; intrångstestning; avlyssning; störningsattacker;

    Abstract : The presence of smart wearables has established itself as a norm of the 21 st century, but the state of their trustworthiness from the viewpoint of personal safety remains debatable. The information gathered by such devices has great potential for personal safety risks and must be handled safely. READ MORE

  3. 3. Testing IoT Security : A comparison of existing penetration testing frameworks and proposing a generic framework

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Alva Widerberg Palmfeldt; William Mattsson; [2023]
    Keywords : Internet of Things; penetration testing; standardization; framework; vulnerability exploitation;

    Abstract : The Internet of Things (IoT) refers to the billions of physical devices linked to the Internet worldwide, integrating into various systems like healthcare, finance, and transportation. However, the rapid market expansion has led to software and hardware security shortcomings, leaving IoT devices vulnerable to cybercriminals. READ MORE

  4. 4. Evaluating Thread network performance, locating and strengthening weak radio links

    University essay from Linköpings universitet/Fysik, elektroteknik och matematik; Linköpings universitet/Tekniska fakulteten

    Author : André du Rietz; Elias Salo; [2023]
    Keywords : Internet of Things; IoT; Thread network; Evaluating Thread Network;

    Abstract : In the fast-developing world we are living in, a tech phenomenon known as the Internet of Things (IoT) has taken hold. It has seen a lot of development over the past few decades, and today there are an estimated 30 billion IoT devices active. IoT is a machine-to-machine network that senses the world with the help of sensors. READ MORE

  5. 5. Third-party risks in industrial control systems: : A case study in the wind power sector

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : Abdullahi Ahmed; [2023]
    Keywords : Supply chain security; Wind power; Risk management; Third-party risk management; SCADA-system; Säkerhetshantering för försörjningskedjan; Vindkraft; Riskhantering; Tredjeparts riskhantering; SCADA-system;

    Abstract : This report investigates third-party risk for SCADA systems, using Swedish wind power as an empirical case study. Supervisory, Control, and Data Acquisition (SCADA) systems are used in the wind power industry to monitor and control the operational process. The paper also proposed potential strategies for reducing third-party risks and exposures. READ MORE