Essays about: "literature review information security"
Showing result 6 - 10 of 129 essays containing the words literature review information security.
-
6. Enhancing human-robot interaction using mixed reality
University essay from Högskolan i Skövde/Institutionen för ingenjörsvetenskapAbstract : Industry 4.0 is a new phase of industrial growth that has been ushered in by the quick development of digital technologies like the Internet of Things (IoT), artificial intelligence (AI), and robots. Collaborative robotic products have appeared in this changing environment, enabling robots to collaborate with people in open workspaces. READ MORE
-
7. Health Data Exchange during Transfer of Multi-morbid Elderly
University essay from KTH/Medicinteknik och hälsosystemAbstract : This project aimed to enhance communication and collaboration among care providers in Stockholm Region and Stockholm Municipality by analyzing health data in various medical record systems and identifying the data that needs to be shared to support elderly individuals with multi-morbidity. Interviews with health experts, caregivers, and policymakers, as well as a literature review, were conducted to gather data. READ MORE
-
8. Beneath the Surface: Exploring the Dark Web and its Societal Impacts
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : The Dark Web is a hidden part of the Internet that has gained attention due to its illegal activities and potential impact on society. This thesis aims to explore the structure of the Dark Web and its actors. Moreover, this thesis covers the effects the Dark Web has had onindividuals and society. READ MORE
-
9. Third-party risks in industrial control systems: : A case study in the wind power sector
University essay from KTH/Skolan för industriell teknik och management (ITM)Abstract : This report investigates third-party risk for SCADA systems, using Swedish wind power as an empirical case study. Supervisory, Control, and Data Acquisition (SCADA) systems are used in the wind power industry to monitor and control the operational process. The paper also proposed potential strategies for reducing third-party risks and exposures. READ MORE
-
10. A SYSTEMATIC REVIEW OF ATTRIBUTE-BASED ENCRYPTION FOR SECURE DATA SHARING IN IoT ENVIRONMENT.
University essay from Stockholms universitet/Institutionen för data- och systemvetenskapAbstract : Internet of Things (IoT) refers to a network of global and interrelated computing devices that connects humans and machines. It connects anything that has access to the internet and creates an avenue for data and information exchange. READ MORE