Essays about: "Permissions"

Showing result 16 - 20 of 57 essays containing the word Permissions.

  1. 16. Awareness and trust of web users on information sharing in social logins

    University essay from Linnéuniversitetet/Institutionen för informatik (IK)

    Author : Chaithanya Kumar Narayana; [2020]
    Keywords : Social Network; Social Login; User Awareness; Information Sharing; Information Exchange; Trust; Trust on Social Login;

    Abstract : Accessing websites using social networking credentials, also known as social login, is becoming increasingly popular as users do not need to create and maintain accounts on each and every website they access. During these social logins, the private information of users is shared with third-party websites from their social profile, and much of this happens behind the scenes which is abstracted from the user. READ MORE

  2. 17. Models for Risk assessment of Mobile applications

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Chigozie Charles Ikwuegbu; [2020]
    Keywords : Risk Assessment; Security and Privacy; Machine Learning; Mobile application security; Mo-bile application metadata;

    Abstract : Mobile applications are software that extend the functionality of our smartphones by connecting us with friends and a wide range of other services. Android, which is an operating system based on the Linux kernel, leads the market with over 2.6 million applications recorded on their official store. READ MORE

  3. 18. Privacy impact self-assessment app

    University essay from

    Author : Ludwig Toresson; Sebastian Olars; Maher Shaker; [2020]
    Keywords : Personas; Partial Identity Attribute; Permissions;

    Abstract : The popularity of the Android OS has led to the development of millions of applications. The assumption of the majority of the Android user base is that these applications are trustworthy and that the Android system does enough to protect them from the untrustworthy applications. READ MORE

  4. 19. Who Watches The Privileged Users

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Sebastian Persson; [2020]
    Keywords : Information security; cybersecurity; cyber security; access control; four-eye principle; 4EP;

    Abstract : Today, companies are spending millions of dollars on cybersecurity, but compromised systems and stealing sensitive information are still huge problems. Protecting sensitive information has always been of vital importance. READ MORE

  5. 20. Hur påverkas mjölkkornas tidsbudget, mjölkavkastning och foderintag av tiden i väntfållan i AMS?

    University essay from SLU/Dept. of Animal Nutrition and Management

    Author : Mikaela Vestberg; [2019]
    Keywords : väntfålla; mjölkkor; AMS; tidsbudget; foderintag; mjölkavkastning;

    Abstract : Automatic milking systems (AMS) are used in many countries worldwide, and it is an efficient system with several benefits for both the farmer and the dairy cows. The cows can move freely in the barn and they therefore decide to a large extent over their own time budget throughout the day. READ MORE