Essays about: "Software Risks"

Showing result 1 - 5 of 185 essays containing the words Software Risks.

  1. 1. Product development of hand-held scooping utensil for the pharmaceutical industry

    University essay from KTH/Ergonomi

    Author : Josefin Kruse; [2024]
    Keywords : ;

    Abstract : Musculoskeletal disorders (MSDs) are one of the most common groups of work-related illnesses. At PET Dispensing, AstraZeneca Södertälje, several MSDs had been linked to a specific scooping utensil made of stainless steel. READ MORE

  2. 2. Handling Third-Party Component Licenses:A Case Study in a Swedish Company : How well do existing license management tools detect potentially unsafe third-party component licenses?

    University essay from Högskolan Dalarna/Informatik

    Author : Fanny Bruckner; Isac Njie; [2023]
    Keywords : Third-party components; software licenses; component analysis tools;

    Abstract : Modern software development relies heavily on third-party components, which are pre-built software modules developed by other organisations and can be either open-source or commercial. These components serve as building blocks for developers to create complex applications more efficiently. READ MORE

  3. 3. A cybersecurity audit of the Garmin Venu

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Oliver Antal; [2023]
    Keywords : IoT wearables; cybersecurity; penetration testing; sniffing; fuzzing; sakernas internet bärbara enheter; cybersäkerhet; intrångstestning; avlyssning; störningsattacker;

    Abstract : The presence of smart wearables has established itself as a norm of the 21 st century, but the state of their trustworthiness from the viewpoint of personal safety remains debatable. The information gathered by such devices has great potential for personal safety risks and must be handled safely. READ MORE

  4. 4. How to Educate an Organization in Working with Security Topics from a User Experience Perspective

    University essay from Lunds universitet/Ergonomi och aerosolteknologi; Lunds universitet/Certec - Rehabiliteringsteknik och Design

    Author : Felicia Gabrielii Augustsson; Anna Dahlström; [2023]
    Keywords : User centered design; threat analysis; security; experiential learning; gamification; interactive learning tool; the design process; Technology and Engineering;

    Abstract : In today's rapidly evolving society, the pervasive influence of technology has profoundly transformed various aspects of human life, presenting both unprecedented opportunities and critical security challenges. To mitigate the risks of data breaches, malicious attacks, and overall cyber threats, companies have taken proactive measures by providing education and training to their employees in the areas of cyber security and software security. READ MORE

  5. 5. Meaningful Metrics in Software Engineering : The Value and Risks of Using Repository Metrics in a Company

    University essay from Malmö universitet/Fakulteten för teknik och samhälle (TS)

    Author : Frida Jacobsson; [2023]
    Keywords : Repository metrics; measurements in software development; ethics in software engineering; performance monitoring; GDPR; Git;

    Abstract : Many large companies use various business intelligence solutions to filter, process, and visualize their software source code repository data. These tools focus on improving continuous integration and are used to get insights about people, products, and projects in the organization. READ MORE