Essays about: "datasäkerhet"

Showing result 1 - 5 of 51 essays containing the word datasäkerhet.

  1. 1. Unraveling Paradoxical Tensions in Digital Servitization Ecosystems : A case study in the mining industry

    University essay from Luleå tekniska universitet/Institutionen för ekonomi, teknik, konst och samhälle

    Author : Johannes Åström; Jakob Karlelid; [2024]
    Keywords : Digital servitization; Ecosystem; Paradoxes; Tensions; Digital tjänstefiering; Ekosystem; Paradoxer; Spänningar;

    Abstract : Purpose - This study aims to understand what paradoxical tensions arise within an ecosystem when companies collectively pursue digital servitization and how these tensions impact value co-creation. Method -  The study is an explorative single-case study based on the mining industry in Sweden and involves respondents from industry-leading organizations. READ MORE

  2. 2. Examining Data Privacy and User Trust in Fertility- and Menstruation Technologies Using an Intersectional Feminist Perspective

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Sandra Larsson; [2023]
    Keywords : femtech; data privacy; trust; user experience; feminist hci; data feminism; menstruation; fertility; femtech; datasäkerhet; tillit; användarupplevelse; feministisk människadatorinteraktion; data feminism; menstruation; fertilitet;

    Abstract : With the digitization of healthcare, there has been an increase in self-tracking technologies for health. One group of self-tracking technologies is FMTs, fertility- and menstruation technologies. READ MORE

  3. 3. Authentication challenges for people with neurodevelopmental disorders

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Patryk Chrzan; [2023]
    Keywords : Authentication; passwords; neurodevelopmental disorders; cybersecurity; disabilities; Autentisering; lösenord; neuropsykiatriska funktionsnedsättningar; datasäkerhet; funktionshinder;

    Abstract : We live in a world where we increasingly depend on information technology, as much of our work and education occurs online, often from home. An average user has an increasing amount of accounts for all kinds of online services, making authentication more and more important. READ MORE

  4. 4. Diverse Double-Compiling to Harden Cryptocurrency Software

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Niklas Rosencrantz; [2023]
    Keywords : Trusting trust; Compiler security; Software Supply Chain; Trojan Horse; Cryptocurrency; Datasäkerhet; kompilator; datavirus; kryptovaluta; Trojansk häst;

    Abstract : A trusting trust attack is a special case of a software supply-chain attack. The project in this report, named diverse double-compiling for cryptocurrency (DDC4CC), demonstrates and explains a defense for cryptocurrency software against trusting trust attacks. READ MORE

  5. 5. Confidential Federated Learning with Homomorphic Encryption

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Zekun Wang; [2023]
    Keywords : Cloud Technology; Confidential Computing; Federated Learning; Homomorphic Encryption; Trusted Execution Environment; Molnteknik; Konfidentiell databehandling; Federerad inlärning; Homomorfisk kryptering; Betrodd körningsmiljö;

    Abstract : Federated Learning (FL), one variant of Machine Learning (ML) technology, has emerged as a prevalent method for multiple parties to collaboratively train ML models in a distributed manner with the help of a central server normally supplied by a Cloud Service Provider (CSP). Nevertheless, many existing vulnerabilities pose a threat to the advantages of FL and cause potential risks to data security and privacy, such as data leakage, misuse of the central server, or the threat of eavesdroppers illicitly seeking sensitive information. READ MORE