Essays about: "literature review information security"

Showing result 6 - 10 of 129 essays containing the words literature review information security.

  1. 6. Enhancing human-robot interaction using mixed reality

    University essay from Högskolan i Skövde/Institutionen för ingenjörsvetenskap

    Author : Santiago Molina Morillas; [2023]
    Keywords : Human-robot interaction; mixed reality; autonomous mobile robots; safety;

    Abstract : Industry 4.0 is a new phase of industrial growth that has been ushered in by the quick development of digital technologies like the Internet of Things (IoT), artificial intelligence (AI), and robots. Collaborative robotic products have appeared in this changing environment, enabling robots to collaborate with people in open workspaces. READ MORE

  2. 7. Health Data Exchange during Transfer of Multi-morbid Elderly

    University essay from KTH/Medicinteknik och hälsosystem

    Author : Hanan Hadi; [2023]
    Keywords : Ageing; Multi-morbidity; Health data; Health Information Exchange; Cooperation between region and municipality; Äldre; Multisjuka; Hälsodata; Utbyte av hälsoinformation; Samarbete mellan region och kommun;

    Abstract : This project aimed to enhance communication and collaboration among care providers in Stockholm Region and Stockholm Municipality by analyzing health data in various medical record systems and identifying the data that needs to be shared to support elderly individuals with multi-morbidity. Interviews with health experts, caregivers, and policymakers, as well as a literature review, were conducted to gather data. READ MORE

  3. 8. Beneath the Surface: Exploring the Dark Web and its Societal Impacts

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Hasan Saleh; [2023]
    Keywords : ;

    Abstract : The Dark Web is a hidden part of the Internet that has gained attention due to its illegal activities and potential impact on society. This thesis aims to explore the structure of the Dark Web and its actors. Moreover, this thesis covers the effects the Dark Web has had onindividuals and society. READ MORE

  4. 9. Third-party risks in industrial control systems: : A case study in the wind power sector

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : Abdullahi Ahmed; [2023]
    Keywords : Supply chain security; Wind power; Risk management; Third-party risk management; SCADA-system; Säkerhetshantering för försörjningskedjan; Vindkraft; Riskhantering; Tredjeparts riskhantering; SCADA-system;

    Abstract : This report investigates third-party risk for SCADA systems, using Swedish wind power as an empirical case study. Supervisory, Control, and Data Acquisition (SCADA) systems are used in the wind power industry to monitor and control the operational process. The paper also proposed potential strategies for reducing third-party risks and exposures. READ MORE

  5. 10. A SYSTEMATIC REVIEW OF ATTRIBUTE-BASED ENCRYPTION FOR SECURE DATA SHARING IN IoT ENVIRONMENT.

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Faith Nnenna Onwumere; [2023]
    Keywords : IoT; ABE; Attribute-based Encryption; CP-ABE; KP-ABE; Internet of Things; Cryptography; Smart Devices;

    Abstract : Internet of Things (IoT) refers to a network of global and interrelated computing devices that connects humans and machines. It connects anything that has access to the internet and creates an avenue for data and information exchange. READ MORE