Essays about: "Network access"

Showing result 1 - 5 of 933 essays containing the words Network access.

  1. 1. A Comparative Analysis of SecurityServices Using Identity and AccessManagement (IAM)

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Nithya Sree Muddychetty; [2024]
    Keywords : Access Control Lists; Identity Access Management; Multi-Factor Authentication; One time password; Single sign on; System Usability Scale; Virtual private network;

    Abstract : Background: Identity and Access Management (IAM) is a critical IT securityframework for managing digital identities and resource access. With roots datingback to ancient civilizations, IAM has evolved from basic authentication to sophisticated methods. READ MORE

  2. 2. Identifying Graph Characteristics in Growing Vascular Networks

    University essay from Uppsala universitet/Tillämpad beräkningsvetenskap

    Author : Christopher Finn Plummer; [2024]
    Keywords : Anigogenesis; Vascular Networks; Network Science;

    Abstract : One of the ways that a vascular network grows is through the process of angiogenesis, wherebya new blood vessel forms as a branch from an existing vessel towards an area which isstimulating vascular growth. Due to the demands for nutrients and waste transport, growingtumour cells will access the surrounding vascular network by inducing angiogenesis. READ MORE

  3. 3. Empowering resettled middle Eastern refugees: Exploring information and communication technology for social inclusion, agency and well-being.

    University essay from Göteborgs universitet/Institutionen för pedagogik och specialpedagogik

    Author : Elham Salesi; [2023-10-31]
    Keywords : information and communication technology; social inclusion; refugees; capability approach; well-being; agency;

    Abstract : Aim: This study aims to investigate the role of information and communication technologies (ICTs) in facilitating the social inclusion of resettled Middle Eastern refugees in Sweden. Through a capability approach lens, the research delves into the ways in which refugees utilize ICTs to enhance their agency, self-reliance, and overall well-being within their new societal context. READ MORE

  4. 4. The Cost of Convenience: An Exploration of the Privacy Aspects in Period-Tracking Applications : A mixed-method study of perceived privacy by users in period-tracking applications

    University essay from Malmö universitet/Fakulteten för teknik och samhälle (TS)

    Author : Linnéa Beramand; [2023]
    Keywords : Femtech; Period-tracking; Actor-Network Theory; Privacy; Sceptical Design;

    Abstract : The increasing demand for female-centred services and devices in the digital era has challenged traditional notions of privacy. This thesis explores how users perceive privacy issues in period- tracking applications provided by various developers. READ MORE

  5. 5. Peering into the Dark : A Dark Web Digital Forensic Investigation on Windows 11

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Johanna Kahlqvist; Frida Wilke; [2023]
    Keywords : Dark Web; Digital Forensics; The Onion Router Tor ; Windows 11;

    Abstract : The ability to access the Internet while remaining anonymous is a necessity in today's society. Whistleblowers need it to establish contact with journalists, and individuals living under repressive regimes need it to access essential resources. READ MORE