Search for dissertations about: "security. pdf"
Showing result 1 - 5 of 827 swedish dissertations containing the words security. pdf.
-
1. Smartphone security : The smartphone as a security device and the public/private production of security
Abstract : This thesis examines the smartphone as a security device through a comprehensive summary and four independent papers. The thesis starts from the observation that a central and yet underexplored characteristic of contemporary security politics is that the smartphone, as one especially important piece of consumer technology, is increasingly being transformed into a security device. READ MORE
-
2. Sensitising Urban Transport Security : Surveillance and Policing in Berlin, Stockholm, and Warsaw
Abstract : The city as a focal point of both domestic and international security policy is characteristic of the 21st century security landscape in Europe. Amidst the 'War on Terror' and the pan-European battle against organised crime, the city is the location where global processes are actually taking place. READ MORE
-
3. Actual and Perceived Information Systems Security
Abstract : As the Internet becomes the major information infrastructure in most sectors, the importance of Information Systems (IS) security steadily increases. While reaching a certain level of actual IS security is vital for most businesses, this level must also be perceived as acceptable by stakeholders. READ MORE
-
4. Web Application Content Security
Abstract : The web has become ubiquitous in modern lives. People go online to stay in contact with their friends or to manage their bank account. With lots of different sensitive information handled by web applications securing them naturally becomes important. READ MORE
-
5. Modeling and Tuning Security from a Quality of Service Perspective
Abstract : Security has traditionally been thought of as a system or network attribute that was the result of the joint endeavors of the designer, maintainer and user, among others. Even though security can never reach a level of 100%, the aim has been to provide as much security as possible, given the boundary conditions in question. With the advent of, e.g. READ MORE