Essays about: "the use and misuse of computer"

Found 3 essays containing the words the use and misuse of computer.

  1. 1. Holographic Communications Technologies : A qualitative study on the ethical and\or legal challenges based on the stakeholders' perspectives

    University essay from Linnéuniversitetet/Institutionen för informatik (IK)

    Author : Natalia Giogiou; [2022]
    Keywords : Digital Ethics; Digital Technology; Ethics in Information Digital Technology; Extended Reality; Holographic Communications Technologies; Ethical Design; Value Sensitive Design; Ethical Framework; Ethical Technology Assessment; Human Computer Interaction; Qualitative Research; Επικοινωνίες μέσω ολογραμμάτων; Ηθική Ψηφιακών Μέσων και Πληροφοριακών Συστημάτων; Νομικοί και Ηθικοί Κίνδυνοι Επικοινωνιών μέσω Ολογραμμάτων;

    Abstract : Holographic communications technologies are a new digital technology being currently  developed by companies to be available to the public in the near future. Through holographic  communications technologies, the image of one user located in one place can be captured with  special equipment from different angles, so that its three-dimensional depiction is created  realistically. READ MORE

  2. 2. Deception strategies for web application security: application-layer approaches and a testing platform

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Mikel Izagirre; [2017]
    Keywords : deception; computer deception; cyberdeception; intrusion detection; intrusion deception; security; cybersecurity; web; web applications; HTTP; penetration testing; security testing; honeypots; honeytokens; decoy; active defense; attacks; web vulnerability scanners; OWASP ZAP; BodgeIt; WAVSEP;

    Abstract : The popularity of the internet has made the use of web applications ubiquitous and essential to the daily lives of people, businesses and governments. Web servers and web applications are commonly used to handle tasks and data that can be critical and highly valuable, making them a very attractive target for attackers and a vector for successful attacks that are aimed at the application layer. READ MORE

  3. 3. Independent Domain of Symmetric Encryption using Least SignificantBit : Computer Vision, Steganography and Cryptography Techniques

    University essay from Högskolan Dalarna/Datateknik

    Author : Bhupathi Rajan Guruswamy Aarumugam; [2011]
    Keywords : Image watermarking; LSB; Vigenere Square; AI Techniques; Computer Vision; Steganography and Cryptography;

    Abstract : The rapid development of data transfer through internet made it easier to send the data accurate and faster to the destination. There are many transmission media to transfer the data to destination like e-mails; at the same time it is may be easier to modify and misuse the valuable information through hacking. READ MORE