Essays about: "user roles"

Showing result 11 - 15 of 97 essays containing the words user roles.

  1. 11. Data-Driven Requirements Engineering in Agile Software Development - An Approach for Eliciting Requirements from Digital Sources in Organizations using Scrum Methodology

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Stylianos Georgiadis; [2023]
    Keywords : Requirement Engineering; Data-Driven Requirements Engineering; Agile Software Development; Scrum Methodology; Scrum Master; Product Owner; Development Team; User Stories; Design Science Research;

    Abstract : Nowadays, the business world is characterized by complexity since market and customer requirements are changing rapidly. Based on this assumption, providers are facing the challenge of delivering software products in shorter terms while these products remain innovative. READ MORE

  2. 12. Cooperative Modular Neural Networks for Artificial Intelligence in Games : A Comparison with A Monolithic Neural Network Regarding Technical Aspects and The Player Experience

    University essay from Blekinge Tekniska Högskola/Fakulteten för datavetenskaper

    Author : Emil Högstedt; Ove Ødegård; [2023]
    Keywords : Neural Network; Modularization; Sensor; Reinforcement Learning; Supervised Learning; Neuralt Nätverk; Modulärisering; Sensor; Förstärkningsinlärning; Väglett Lärande;

    Abstract : Recent years have seen multiple machine-learning research projects concerning agents in video games. Yet, there is a disjoint between this academic research and the video game industry, evidenced by the fact that game developers still hesitate to use neural networks (NN) due to lack of clarity and control. READ MORE

  3. 13. Role Based Access Control (RBAC) in the context of Smart Grids : Implementing and Evaluating a Role Based Access Control System for Configuration Loading in a Substation from a Desktop

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Gatien Ducornaud; [2023]
    Keywords : Role Based Access Control RBAC ; Cybersecurity; Smart Grid; Substation; Desktop Applications; Contrôle d’accès basé sur les rôles RBAC ; Cybersécurité; Réseau électrique intelligent; Sous-Station; Application Desktop; Rollbaserad åtkomstkontroll RBAC ; Cybersäkerhet; Smarta nät; Transformatorstation; datorapplikation;

    Abstract : Access control is a crucial aspect of cybersecurity, and Role Based Access Control (RBAC) is a typical framework for controlling the access to specific resources. However, in the context of Smart Grids, the usual authentication solution of using a trusted identity provider might not be possible to provide authentication of a user, as systems cannot rely on external services. READ MORE

  4. 14. The Fashion Consumer's Conundrum : Bridging the gap between expectations and experiences in E-commerce and physical shopping in connection with sustainability

    University essay from Mälardalens universitet/Akademin för ekonomi, samhälle och teknik

    Author : Ella Lindell; Rebecka Nilsson; [2023]
    Keywords : ;

    Abstract : Date: 2023-05-30 Level: Bachelor/Master thesis in Business Administration, 15 cr Institution: School of Business, Society and Engineering, Mälardalen University Authors: Ella Lindell, Rebecka Nilsson Title: The fashion Consumer’s Condrum: Bridging the gap between expectations and experiences in E-commerce and physical shopping in connection with sustainability Supervisor: Edward Gillmore Keywords: Consumer behavior, E-commerce, Physical store, CSR, Sustainability, Sufficientconsumption Research question: How do the organization’s activities in the fashion industry influence consumptionwithin E-commerce and physical shopping from a sustainability perspective? Purpose:This thesis aims to investigate the gaps in consumer experiences and expectations betweenphysical shopping and E-commerce, specifically in the context of sustainable consumption. The research seeks to understand how consumers perceive and evaluate their experiences in both settings, includingtheir expectations of retailers and whether they meet sustainability requirements. READ MORE

  5. 15. Anonymization of Sensitive Data through Cryptography

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Isac Holm; Johan Dahl; [2023]
    Keywords : Cryptography; Encryption; Decryption; AES; Camellia; Anonymization; Sensitive Data;

    Abstract : In today's interconnected digital landscape, the protection of sensitive information is of great importance. As a result, the field of cryptography plays a vital role in ensuring individuals' anonymity and data integrity. READ MORE