Advanced search

Found 3 essays matching the above criteria.

  1. 1. Hedging Your Bets: The Prospects of Cryptocurrency Use in Online Gambling : A Mixed-Methods Study

    University essay from Umeå universitet/Företagsekonomi

    Author : Nicolas Werle; Liina Lehtonen; [2018]
    Keywords : cryptocurrency; online gambling; diffusion of innovation; disruptive technology; blockchain; consumer behaviour;

    Abstract : Since its initial inception, cryptocurrency has hit the world with both intrigue and skepticism. It was acting as an alternative form of currency that people could use that required no regulative authority to back it. READ MORE

  2. 2. Distribution channel strategy design : Application and implementation in healthcare

    University essay from KTH/Industriell ekonomi och organisation (Inst.)

    Author : Anders Ravn; [2012]
    Keywords : Distribution channel strategy; distribution channel integration; communication; customer management; information and communications technology; healthcare;

    Abstract : Healthcare is a very important and intimate service virtually all people use at least at some occasion in a lifetime. It is also highly complex and variable with heterogeneous patients requiring individualised attention in order to be effectively treated. READ MORE

  3. 3. Two Way Mobile Authentication System

    University essay from Blekinge Tekniska Högskola/Sektionen för datavetenskap och kommunikation

    Author : Karthik Mandava; Harish Dinne; [2010]
    Keywords : Two factor authentication; One Time Password OTP ; Demo online Banking application; computer security; mobile device for authentication;

    Abstract : The ever increasing use of internet around the world has without doubt increased the usage of internet based services, e-business models, easier ways of communication and information sharing. Such drastic increase in usage of network based systems has made the current cyber security systems old dated as the hackers and attackers of networked systems is on the rise with new and modern attack methodologies. READ MORE