Essays about: "knowledge security"

Showing result 11 - 15 of 614 essays containing the words knowledge security.

  1. 11. Why do people use public Wi-Fi? : An investigation of risk-taking behaviour and factors lead to decisions

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Mohamad Abdulkader; [2023]
    Keywords : Public Wi-Fi; hotspots; wireless networks; privacy; security; awareness; attitude; knowledge; risks; factor;

    Abstract : The usage of public Wi-Fi and hotspots has witnessed a substantial increase in recent times, providing convenient connectivity in various public areas. Public wireless networks are now widely accessible, especially in smart cities. However, utilising public Wi-Fi exposes individuals to potential threats to their privacy and security. READ MORE

  2. 12. Thinking Outside of the Organisational Box; How Private Firms Can Invest in Nature-based Solutions at the Watershed-level to Manage Agricultural Water Risks in California’s San Joaquin Valley

    University essay from Lunds universitet/Internationella miljöinstitutet

    Author : Ethan Dunnenberger; [2023]
    Keywords : water scarcity; agriculture; private sector; risk management; nature-based solutions; watershed restoration; San Joaquin Valley; water security; value; Earth and Environmental Sciences;

    Abstract : Nature-based solutions (NBS) can provide a range of benefits to tackle acute sustainability challenges in an enduring and cost-effective manner. Increasing recognition of the value of these solutions has led to their adoption across the globe. READ MORE

  3. 13. Streamlining UAV Communication : Investigating and implementing an accessible communication interface between a ground control station and a companion computer

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Johan Gustafsson; Daniel Mogensen; [2023]
    Keywords : UAV; communication protocol; design science; UAV security; software architecture; programming; Mavlink; UAV protocols;

    Abstract : In the future, the usage of UAVs (Unmanned Aerial Vehicles) will be applied in many different areas. Continued research in UAVs can benefit through its applications in disaster response, humanitarian aid, environmental monitoring, infrastructure inspection, improved transportation and delivery systems, and scientific research. READ MORE

  4. 14. OODOOLL : Exploring the Potential of Data Physicalisations to Increase Awareness and Control of Personal Data Privacy

    University essay from Malmö universitet/Institutionen för konst, kultur och kommunikation (K3)

    Author : Sarah Skavron; [2023]
    Keywords : Data Physicalisations; data security; personal data; empowerment; interaction design;

    Abstract : Through online activities, we produce a large amount of personal data traces every day. Many people acknowledge the significance of protecting personal data online but they might not act accordingly. This thesis project seeks to make these often hidden traces visible and thus understandable through a data physicalisation. READ MORE

  5. 15. How to Educate an Organization in Working with Security Topics from a User Experience Perspective

    University essay from Lunds universitet/Ergonomi och aerosolteknologi; Lunds universitet/Certec - Rehabiliteringsteknik och Design

    Author : Felicia Gabrielii Augustsson; Anna Dahlström; [2023]
    Keywords : User centered design; threat analysis; security; experiential learning; gamification; interactive learning tool; the design process; Technology and Engineering;

    Abstract : In today's rapidly evolving society, the pervasive influence of technology has profoundly transformed various aspects of human life, presenting both unprecedented opportunities and critical security challenges. To mitigate the risks of data breaches, malicious attacks, and overall cyber threats, companies have taken proactive measures by providing education and training to their employees in the areas of cyber security and software security. READ MORE