Search for dissertations about: "digital identity"

Showing result 1 - 5 of 81 swedish dissertations containing the words digital identity.

  1. 1. Digital Maritime Sights : Digital visual documentation and communication in Scandinavian contract maritime archaeology

    Author : Delia Ni Chiobhain Enqvist; Bodil Petersson; Jesse Ransley; Linnéuniversitetet; []
    Keywords : HUMANIORA; HUMANITIES; maritime archaeology; digital archaeology; visualisation; contract archaeology; contract maritime archaeology; underwater dcoumentation; outreach; Archaeology; Arkeologi;

    Abstract : This licentiate thesis investigates the use of digital visualisations for knowledge production and communication of maritime heritage located underwater. The archaeological practice that takes place in response to development, contract archaeology, is the field that is being investigated. READ MORE

  2. 2. Digital innovation and changing identities : investigating organizational implications of digitalization

    Author : Daniel Nylén; Jonny Holmström; Per Levén; Nicholas Berente; Umeå universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Digital innovation; digitalization; platforms; media industry; organizational identity; computer and systems sciences; data- och systemvetenskap;

    Abstract : The emergence of digital technology represents a paradigmatic historical shift. As a process transforming sociotechnical structures, digitalization has had pervasive effects on organizing structures and business logics, as well as contemporary society as a whole. In recent years, these effects have been particularly salient in the content-based (e. READ MORE

  3. 3. Our Humanity Exposed : Predictive Modelling in a Legal Context

    Author : Stanley Greenstein; Peter Wahlgren; Dan Svantesson; Stockholms universitet; []
    Keywords : SAMHÄLLSVETENSKAP; SOCIAL SCIENCES; predictive modelling; predictive analytics; profiling; big data; algorithm; surveillance; privacy; autonomy; identity; digital identity; data privacy; human rights; data protection; European Convention on Human Rights; Data Protection Directive; General Data Protection Regulation GDPR ; empowerment; Law and Information Technology; rättsinformatik;

    Abstract : This thesis examines predictive modelling from the legal perspective. Predictive modelling is a technology based on applied statistics, mathematics, machine learning and artificial intelligence that uses algorithms to analyse big data collections, and identify patterns that are invisible to human beings. READ MORE

  4. 4. Learning Computing at University: Participation and Identity : A Longitudinal Study

    Author : Anne-Kathrin Peters; Arnold Pears; Anders Berglund; Anna Eckerdal; Lars Ulriksen; Uppsala universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; SAMHÄLLSVETENSKAP; SOCIAL SCIENCES; computing education research; engineering education research; computer science; higher education; engagement; diversity; equity; gender; competencies; culture; longitudinal; identity; participation; power; agency; uniformity; communities of practice; social theory of learning; phenomenography; student reflections; Datavetenskap med inriktning mot datavetenskapens didaktik; Computer Science with specialization in Computer Science Education Research;

    Abstract : Computing education has struggled with student engagement and diversity in the student population for a long time. Research in science, technology, engineering, and mathematics (STEM) education suggests that taking a social, long-term perspective on learning is a fruitful approach to resolving some of these persistent challenges. READ MORE

  5. 5. Identity and Anonymity in Ad Hoc Networks

    Author : Leonardo Augusto Martucci; Simone Fischer-Hübner; Tuomas Aura; Karlstads universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; privacy; identity; anonymity; pseudonymity; Sybil attack; security; ad hoc; coputer networks; Datavetenskap; Computer Science;

    Abstract : In ad hoc networks every device is responsible for its own basic computer services, including packet routing, data forwarding, security, and privacy. Most of the protocols used in wired networks are not suitable for ad hoc networks, since they were designed for static environments with defined borders and highly specialized devices, such as routers, authentication servers, and firewalls. READ MORE