Essays about: "Security Patterns"

Showing result 11 - 15 of 145 essays containing the words Security Patterns.

  1. 11. DevOps: Assessing the Factors Influencing the Adoption of Infrastructure as Code, and the Selection of Infrastructure as Code Tools : A Case Study with Atlas Copco

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : David Ljunggren; [2023]
    Keywords : DevOps; Infrastructure as Code; Automation; DevOps; Infrastruktur som kod; Automation;

    Abstract : This research initiative, which takes the shape of an interpretive qualitative case study, intends to investigate the key considerations for organizations that are to adopt IaC and select an IaC tool. Interviews with operations specialists with varying experience with Infrastructure as Code were conducted for data collection, which was then followed by thematic data analysis. READ MORE

  2. 12. Primary Care in the Digital Age: is mHealth the answer? : A Quantitative Study Assessing Factors Influencing Young Elderly Swedes' Attitudes Towards mHealth for Primary Healthcare

    University essay from

    Author : Sanna Göransson; Nelli Hajdu; [2023]
    Keywords : eHealth; mHealth; young elderly; Sweden; digital healthcare;

    Abstract : The combination of declining birth rates and an aging Swedish population presents challenges for the government in terms of accommodating and providing for the needs of a larger and older population. This demographic shift will exert significant pressure on the public sector, particularly the healthcare system. READ MORE

  3. 13. Communicating compliance : A qualitative research of safety information within blue collar industries in Sweden and Norway and an onboarding design proposal of a regulatory compliance app

    University essay from Mälardalens universitet/Akademin för innovation, design och teknik

    Author : Karolina Meijer; [2023]
    Keywords : blue collar worker; construction industry; digital onboarding; re-design;

    Abstract : Which solutions exist within the blue collar industries in Sweden and Norway today for conveying safety information to its employees? How may one re-design an understandable onboarding process to a digital app for Swedish-speaking blue collar workers? This study set out to research these questions, collaborating with Inphiz Technologies AB, a SaaS company in Stockholm, Sweden who has created a digital service to manage and automate legislative and regulatory compliance data in blue collar industries. The objective of the study was to answer the research questions and to create a design proposal for the users first steps into the Inphiz app through an onboarding process. READ MORE

  4. 14. Anomaly detection in surveillance camera data

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Viktoriia Semerenska; [2023]
    Keywords : Anomaly detection; Machine Learning; Supervised learning; Video Analytics; Artificial Intelligence;

    Abstract : The importance of detecting anomalies in surveillance camera data cannot be overemphasized. With the increasing availability of surveillance cameras in public and private locations, the need for reliable and effective methods to detect anomalous behavior has become critical to public safety. READ MORE

  5. 15. Identification of Child Maltreatment : A Systematic Literature Review on Professionals' Identification of Child Maltreatment and the Influencing Factors that Affect their Ability to Act.

    University essay from Jönköping University/HLK, CHILD

    Author : Jenny Karlsson; [2023]
    Keywords : Child maltreatment; child abuse; child neglect; professionals; identifying; child security; Barn; misshandel; försummelse; yrkesverksamma; identifiering; skyddsnät;

    Abstract : Several organizations actively work for children's rights to a safe and secure upbringing (WHO, 2022b; UNICEF, 2021). Despite this, over 1 billion children were exposed to physical, sexual, or psychological/emotional harm in 2021 (WHO, 2022c). READ MORE