Showing 2,341 - 2,360 results of 3,846 for search 'AT*', query time: 0.06s Refine Results
  1. 2341

    Käytettävyyden tärkeys uudessa mobiililaitteessa ja järjestelmässä by Lammintaus, Jonne

    Published 2020
    “…These five attributes can be further refined with a long list of things to consider when planning the usability of a device or system. …”
    Get full text Get full text
    Bachelor's thesis
  2. 2342

    SCADA-järjestelmään kohdistuvat kyberhyökkäykset ja niiltä suojautuminen by Tams, Roope

    Published 2020
    “…Stuxnet is usually being kept as the most famous SCADA attack. Attack was targeted to Iranian uranium plant. …”
    Get full text Get full text
    Bachelor's thesis
  3. 2343

    Hiljaisen tietämyksen hallinta : historiallinen näkökulma by Martiala, Anne

    Published 2020
    “…As a result of the content analysis of the source material, the concept of tacit knowledge is still considered to be strongly attached to information theory published decades ago. …”
    Get full text Get full text
    Bachelor's thesis
  4. 2344

    Virtuaalitodellisuuden hyödyntäminen markkinoinnissa by Haapalainen, Olli

    Published 2020
    “…The features can be used to influence, among other things, customers' brand awareness, attitudes towards advertising and willingness to buy. …”
    Get full text Get full text
    Bachelor's thesis
  5. 2345

    Robotiikka sosiaali- ja terveysalan prosessien tehostajana by Alho, Toni

    Published 2020
    “…As a result, the study forms observations of compatibility of the attributes of social and health sector’s processes and the known properties of service robotics. …”
    Get full text Get full text
    Bachelor's thesis
  6. 2346

    Tekoälyn sovelluskohteet kyberturvallisuudessa by Keränen, Oona

    Published 2020
    “…These advances and the use of new techniques with regards to cyber-attacks seem to be leading to the point where old cyber security measures are no longer adequate. …”
    Get full text Get full text
    Bachelor's thesis
  7. 2347

    Poliittisesti motivoitunut kybervakoilu ja tiedustelutoiminta by Lehto, Iida

    Published 2020
    “…Cyber espionage, and intelligence form a complex entity that envelop several cyber and real-world phenomena, such as APT attacks, information operations, and political movement. …”
    Get full text Get full text
    Bachelor's thesis
  8. 2348

    Älykellojen käyttöön liittyvä käyttäjäkokemus by Muhonen, Juho

    Published 2020
    “…The results of the thesis show that there are visual as well as functional attributes affecting the user experience of a smartwatch. …”
    Get full text Get full text
    Bachelor's thesis
  9. 2349

    Vihreä IT osana organisaation toimintaa by Koskinen, Lotta

    Published 2020
    “…Furthermore, the behaviour and attitudes of personnel in an organisation has a notable influence on how the organisation performs when it comes to being environmentally friendly and a green organisation. …”
    Get full text Get full text
    Bachelor's thesis
  10. 2350

    Tehdään rikos, tehdäänkö oikeutta : ympäristörikosoikeuden täsmentymisen politiikka by Mantere, Inka

    Published 2020
    “…Environmental law and environmental crime are relatively new conceptual and institutional attempts to adhere both postmodern environmental problems and the more general relation to nature. …”
    Get full text Get full text
    Bachelor's thesis
  11. 2351

    Verkkosovellusten yleisimmät haavoittuvuudet ja käytänteet niiden ehkäisemiseksi by Kaasalainen, Santeri

    Published 2018
    “…However, web applications are more prone to cyber-attacks because they accessible through their web user interface. …”
    Get full text Get full text
    Bachelor's thesis
  12. 2352

    PK-yritysten kybervalmius by Matilainen, Juhani

    Published 2018
    “…The most common types of attacks are phishing, various types of scamming attacks and different types of malware. …”
    Get full text Get full text
    Bachelor's thesis
  13. 2353

    Strategiset haasteet julkisen sektorin palveluiden digitalisaatiossa Afrikan maissa by Pakola, Henri

    Published 2018
    “…Furthermore the benefits are being spread unequally amongst the citizens thus deepening the digital divide. This thesis attempts to clarify the special characteristics of the operational environment in Africa that make successful implementation of eGovernment-strategy so challenging. …”
    Get full text Get full text
    Bachelor's thesis
  14. 2354

    Ohjelmistoturvallisuuden parantaminen staattisella analyysillä by Laamanen, Jami

    Published 2018
    “…This bachelors thesis is a small-scale literature review that attempts by examining and analysing research literature to explore how static analysis can be used to the improve the security of modern web-applications. …”
    Get full text Get full text
    Bachelor's thesis
  15. 2355

    Mobiilipelialustan tuotteistaminen : case X-Routes by Vitikainen, Teemu

    Published 2018
    “…Theories related to productization and service perspective cre-ate the theoretical framework of this study. The importance of segmentation, revenue models and customization in the productization of a game platform is analyzed at the examination part (chapter 4). …”
    Get full text Get full text
    Bachelor's thesis
  16. 2356

    Eettinen hakkerointi osana järjestelmän tietoturvaa by Hellberg, Jan

    Published 2019
    “…This raises the amount of attacks against these systems and forces companies and organizations to put more emphasis on their information security. …”
    Get full text Get full text
    Bachelor's thesis
  17. 2357

    Myn kere sötha moder : om användning av adjektiv vid kvinnliga huvudord i Erikskrönikan by Hopiavuori, Jenna

    Published 2019
    “…Eerikinkronikassa käytetty runomitta knitteli vaikutti tietyissä tapauksissa sanajärjestykseen, jolloin attribuutti oli siirretty pääsanansa jälkeen riimiparin luomiseksi. …”
    Get full text Get full text
    Bachelor's thesis
  18. 2358

    Esineiden internet ja sen tietoturva sovelluskerroksella by Lahtinen, Tuomo

    Published 2019
    “…IoT has different layers and each layer are exposed to different kinds of attacks. These attack can be critical to mankind. …”
    Get full text Get full text
    Bachelor's thesis
  19. 2359

    Tunnistautumismenetelmät tietojärjestelmissä by Taipale, Juho

    Published 2019
    “…Therefore, it is important that attention is paid to both security and usability when designing the information system and selecting its authentication method. …”
    Get full text Get full text
    Bachelor's thesis
  20. 2360

    Anonymiteetin haasteet Bitcoinin käytössä by Kukulj, Tomislav

    Published 2019
    “…To examine the anonymity of cryptocurrencies, the anonymity theories attached to traditional data transmission are not fully applicable and, consequently, a new definition of anonymity for cryptocurrencies has been formed. …”
    Get full text Get full text
    Bachelor's thesis
Search Tools: RSS Feed