Essays about: "use of computer in security"

Showing result 1 - 5 of 134 essays containing the words use of computer in security.

  1. 1. Linking for Peace. An affordance perspective of LinkedIn as an instrument for peace professionals to advance constructive conflict resolution and transformative efforts

    University essay from Institutionen för tillämpad informationsteknologi

    Author : Jasmine Traore; [2023-11-22]
    Keywords : Affordances; Human Computer Interaction HCI ; Peace and Conflict Research;

    Abstract : Has LinkedIn become the platform for a global community of practice for peace professionals? Does it have the potential to be? An inductive approach to Reflexive Thematic Analysis (RTA) following Braun and Clarke’s six-phase methodology was used as an analytic instrument on empirical data from 13 semi-structured interviews with professionals in peace mediation, using the theoretical lens of affordances. The participants in the study were found to use LinkedIn to create and sustain meaningful connections globally and across sectors, learn from empirical knowledge, stories and insights from others and explore economic opportunities. READ MORE

  2. 2. Ensuring the Security of PyPI Packages

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : David Shakoori Gustafsson; [2023-10-23]
    Keywords : Computer science; Security; Python; PyPI; Typosquatting;

    Abstract : Developers often use open-source code libraries in order to achieve desired functionalities without needing to re-implement existing code. Python developers are no exceptions here, and frequently use the Python Package Index, PyPI, to download the specific code packages they want to use. READ MORE

  3. 3. OpenCourse: Gamification in Computer Science Education

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : Gustaf Bodin; Elias Ekroth; Tobias Engblom; Filip Linde; Anwarr Shiervani; [2023-03-03]
    Keywords : Gamification; Education; Heuristic Evaluation; Desktop Application Development; Spelifiering; Utbildning; Heuristisk Utvärdering; Datorapplikationsutveckling;

    Abstract : Academic degrees in computer science suffer from the highest dropout rates among universities. As a result, there is a lack of technical professionals, which could threaten the digital infrastructure. READ MORE

  4. 4. Effects of Energy Performance Improving Measures on a 1990's Brick House in Southern Czech Republic : Computer Simulations using IDA-ICE

    University essay from Högskolan i Gävle/Energisystem och byggnadsteknik

    Author : Vaclav Panek; [2023]
    Keywords : Final energy demand; Primary energy demand; Energy performance; Refurbishment; Single-family house; Space heating;

    Abstract : The residential sector was responsible for 25% of the Final Energy Demand (FED) in the European Union in 2015. Countries in Central and Eastern Europe such as the Czech Republic are particularly concerned with ensuring security of supply at the lowest possible cost in recent years. READ MORE

  5. 5. How to Educate an Organization in Working with Security Topics from a User Experience Perspective

    University essay from Lunds universitet/Ergonomi och aerosolteknologi; Lunds universitet/Certec - Rehabiliteringsteknik och Design

    Author : Felicia Gabrielii Augustsson; Anna Dahlström; [2023]
    Keywords : User centered design; threat analysis; security; experiential learning; gamification; interactive learning tool; the design process; Technology and Engineering;

    Abstract : In today's rapidly evolving society, the pervasive influence of technology has profoundly transformed various aspects of human life, presenting both unprecedented opportunities and critical security challenges. To mitigate the risks of data breaches, malicious attacks, and overall cyber threats, companies have taken proactive measures by providing education and training to their employees in the areas of cyber security and software security. READ MORE