Essays about: "Personal integrity in communication"

Showing result 1 - 5 of 13 essays containing the words Personal integrity in communication.

  1. 1. Understanding Informational Privacy Through User Interfaces in Web Applications

    University essay from Södertörns högskola/Medieteknik

    Author : Annalisa Spence; Mimmi Svensson; [2023]
    Keywords : Privacy; Information; Interface Design; Web Applications; Communication Privacy Management; Protection Motivation Theory; Integrity; HCI; Privacy Concerns; Quantitative;

    Abstract : This paper critically examines users' perceptions of privacy and security in web applications,emphasizing interface design. Drawing on both quantitative and qualitative data grounded inCPM and PMT theories, our research addresses Internet users' concerns regarding onlineprivacy and security. READ MORE

  2. 2. Face-to-face over the Internet : Facing the hard truth with physical attendance in a post-pandemic society

    University essay from Karlstads universitet/Fakulteten för humaniora och samhällsvetenskap (from 2013)

    Author : Kevin Nermark; [2023]
    Keywords : event attendance; remote participation; hybrid spaces; digital marketing; strategic communication; event planning.; eventdeltagande; deltagande på avstånd; hybridutrymmen; digital marknadsföring; strategisk kommunikation; eventplanering.;

    Abstract : This research is based on a pilot study, conducted on a marketer from an unnamed company within the tech industry (the anonymity is used because of the integrity of the interview subjects of both the pilot study and this study). The company deals with B2B (Business to business) transactions, and the marketing in this is somewhat different from the typical B2C (business to consumer) type of marketing. READ MORE

  3. 3. Cookies, cookies everywhere! : A qualitative interview study about how internet users interact with cookie consent notices

    University essay from Karlstads universitet/Institutionen för geografi, medier och kommunikation (from 2013)

    Author : Niklas Hofstad; Anton Lundqvist; [2021]
    Keywords : Cookie; Consent; GDPR; Informed; Personal data; Privacy;

    Abstract : The purpose of this study is to examine what reasons internet users have for accepting, declining, or adjusting cookie settings. The study’s research question is: what reasons do Internet users have for accepting, declining, or adjusting cookie settings? To answer the research question, we constructed three research support questions: 1) how do internet users access the internet?, 2) What are internet users’ perspectives on privacy on the internet?, 3) How do internet users interact with cookie consent notices? The study’s theoretical framework consists of informed consent, contextual integrity, nudging, and political economy. READ MORE

  4. 4. User Inclusion during ERP Implementations and its effects on Symbolic Adoption

    University essay from Linköpings universitet/Industriell ekonomi

    Author : Henrik Hörnlund; Johannes Ålander; [2021]
    Keywords : ERP; symbolic adoption; change management; user participation; user involvement; user inclusion; implementation success;

    Abstract : Having a modern Enterprise Resource Planning (ERP) system is seen as increasingly important if an organisation wants to compete in today’s business environment. The implementation of a new ERP system can result in added automatization and the replacement and/or coupling of legacy systems. READ MORE

  5. 5. Enhancing Zigbee Security for Industrial Implementation

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Hamza Kadhum; [2020]
    Keywords : Zigbee network security; LoWPAN; IoT; Wireless Sensor Network; Node lifetime; Zigbee nätverk säkerhet; LoWPAN; IoT; Trådlöst Sensornätverk; Sensornodens livslängd;

    Abstract : Zigbee network is a popular choice for deploying low power personal area network (LoWPAN). The application areas vary but the most popular are industrial area monitoring and home automation. But Zigbee has been identified to have weak security and is not applicable for industrial implementation. READ MORE