Essays about: "misuse computer"

Showing result 1 - 5 of 7 essays containing the words misuse computer.

  1. 1. Privacy threat analysis and evaluation of Privacy Enhancing Technologies for the integration of 3D Scene Graphs in smart buildings

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Alejandra Mugica Trapaga; [2023]
    Keywords : 3DSG; DFD; Hydra; IoT; LINDDUN; PETs; Privacy; Threat modeling.; Technology and Engineering;

    Abstract : The recent advent of 3DSG in the computer vision domain has brought powerful high-level representations of 3D environments. These representations strive to mimic human perception and facilitate the extraction of meaningful insight from visual data. READ MORE

  2. 2. From Idea to Innovation: Exploring the Application of Design Thinking in Product Development

    University essay from Jönköping University/JTH, Industriell produktutveckling, produktion och design

    Author : Sejla Skaljo; Elaine Ljungberg; [2023]
    Keywords : Design thinking; innovation; interdisciplinary; Kansei engineering; IDEO; organisation; human-centered;

    Abstract : Design thinking (DT) is a popular method and methodology for leveraging innovation. However, using DT in practical organisational settings is challenging because there is little acknowledgment of such research in academia. READ MORE

  3. 3. Holographic Communications Technologies : A qualitative study on the ethical and\or legal challenges based on the stakeholders' perspectives

    University essay from Linnéuniversitetet/Institutionen för informatik (IK)

    Author : Natalia Giogiou; [2022]
    Keywords : Digital Ethics; Digital Technology; Ethics in Information Digital Technology; Extended Reality; Holographic Communications Technologies; Ethical Design; Value Sensitive Design; Ethical Framework; Ethical Technology Assessment; Human Computer Interaction; Qualitative Research; Επικοινωνίες μέσω ολογραμμάτων; Ηθική Ψηφιακών Μέσων και Πληροφοριακών Συστημάτων; Νομικοί και Ηθικοί Κίνδυνοι Επικοινωνιών μέσω Ολογραμμάτων;

    Abstract : Holographic communications technologies are a new digital technology being currently  developed by companies to be available to the public in the near future. Through holographic  communications technologies, the image of one user located in one place can be captured with  special equipment from different angles, so that its three-dimensional depiction is created  realistically. READ MORE

  4. 4. Deception strategies for web application security: application-layer approaches and a testing platform

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Mikel Izagirre; [2017]
    Keywords : deception; computer deception; cyberdeception; intrusion detection; intrusion deception; security; cybersecurity; web; web applications; HTTP; penetration testing; security testing; honeypots; honeytokens; decoy; active defense; attacks; web vulnerability scanners; OWASP ZAP; BodgeIt; WAVSEP;

    Abstract : The popularity of the internet has made the use of web applications ubiquitous and essential to the daily lives of people, businesses and governments. Web servers and web applications are commonly used to handle tasks and data that can be critical and highly valuable, making them a very attractive target for attackers and a vector for successful attacks that are aimed at the application layer. READ MORE

  5. 5. Explaining kernel space with a real world example

    University essay from Institutionen för datavetenskap

    Author : Björn Wärmedal; [2012]
    Keywords : ;

    Abstract : The basic premis of this report is to explain the relation of kernel space and user space. It will show how the processor and computer memory work together with the operating system to protect operating system routines from misuse by user programs. READ MORE