Suggested Topics within your search.
- 601 462
- Tietojärjestelmätiede 410
- Information Systems Science 401
- 502 249
- Liikuntapedagogiikka 249
- Physical Education Teacher Education 249
- asenteet 214
- urheilijat 188
- liikunta 187
- nuoret 168
- Tietotekniikka 167
- Mathematical Information Technology 165
- urheilu 158
- Psykologia 154
- Psychology 153
- 202 147
- 602 146
- opetus 134
- motivaatio 125
- 5032 121
- fyysinen aktiivisuus 121
- Liikunnan yhteiskuntatieteet 120
- Social Sciences of Sport 120
- tietoturva 114
- kyberturvallisuus 99
- sosiaalinen media 98
- English 96
- Englannin kieli 95
- englannin kieli 93
- opettajat 90
-
2341
Käytettävyyden tärkeys uudessa mobiililaitteessa ja järjestelmässä
Published 2020“…These five attributes can be further refined with a long list of things to consider when planning the usability of a device or system. …”
Get full text Get full textBachelor's thesis -
2342
SCADA-järjestelmään kohdistuvat kyberhyökkäykset ja niiltä suojautuminen
Published 2020“…Stuxnet is usually being kept as the most famous SCADA attack. Attack was targeted to Iranian uranium plant. …”
Get full text Get full textBachelor's thesis -
2343
Hiljaisen tietämyksen hallinta : historiallinen näkökulma
Published 2020“…As a result of the content analysis of the source material, the concept of tacit knowledge is still considered to be strongly attached to information theory published decades ago. …”
Get full text Get full textBachelor's thesis -
2344
Virtuaalitodellisuuden hyödyntäminen markkinoinnissa
Published 2020“…The features can be used to influence, among other things, customers' brand awareness, attitudes towards advertising and willingness to buy. …”
Get full text Get full textBachelor's thesis -
2345
Robotiikka sosiaali- ja terveysalan prosessien tehostajana
Published 2020“…As a result, the study forms observations of compatibility of the attributes of social and health sector’s processes and the known properties of service robotics. …”
Get full text Get full textBachelor's thesis -
2346
Tekoälyn sovelluskohteet kyberturvallisuudessa
Published 2020“…These advances and the use of new techniques with regards to cyber-attacks seem to be leading to the point where old cyber security measures are no longer adequate. …”
Get full text Get full textBachelor's thesis -
2347
Poliittisesti motivoitunut kybervakoilu ja tiedustelutoiminta
Published 2020“…Cyber espionage, and intelligence form a complex entity that envelop several cyber and real-world phenomena, such as APT attacks, information operations, and political movement. …”
Get full text Get full textBachelor's thesis -
2348
Älykellojen käyttöön liittyvä käyttäjäkokemus
Published 2020“…The results of the thesis show that there are visual as well as functional attributes affecting the user experience of a smartwatch. …”
Get full text Get full textBachelor's thesis -
2349
Vihreä IT osana organisaation toimintaa
Published 2020“…Furthermore, the behaviour and attitudes of personnel in an organisation has a notable influence on how the organisation performs when it comes to being environmentally friendly and a green organisation. …”
Get full text Get full textBachelor's thesis -
2350
Tehdään rikos, tehdäänkö oikeutta : ympäristörikosoikeuden täsmentymisen politiikka
Published 2020“…Environmental law and environmental crime are relatively new conceptual and institutional attempts to adhere both postmodern environmental problems and the more general relation to nature. …”
Get full text Get full textBachelor's thesis -
2351
Verkkosovellusten yleisimmät haavoittuvuudet ja käytänteet niiden ehkäisemiseksi
Published 2018“…However, web applications are more prone to cyber-attacks because they accessible through their web user interface. …”
Get full text Get full textBachelor's thesis -
2352
PK-yritysten kybervalmius
Published 2018“…The most common types of attacks are phishing, various types of scamming attacks and different types of malware. …”
Get full text Get full textBachelor's thesis -
2353
Strategiset haasteet julkisen sektorin palveluiden digitalisaatiossa Afrikan maissa
Published 2018“…Furthermore the benefits are being spread unequally amongst the citizens thus deepening the digital divide. This thesis attempts to clarify the special characteristics of the operational environment in Africa that make successful implementation of eGovernment-strategy so challenging. …”
Get full text Get full textBachelor's thesis -
2354
Ohjelmistoturvallisuuden parantaminen staattisella analyysillä
Published 2018“…This bachelors thesis is a small-scale literature review that attempts by examining and analysing research literature to explore how static analysis can be used to the improve the security of modern web-applications. …”
Get full text Get full textBachelor's thesis -
2355
Mobiilipelialustan tuotteistaminen : case X-Routes
Published 2018“…Theories related to productization and service perspective cre-ate the theoretical framework of this study. The importance of segmentation, revenue models and customization in the productization of a game platform is analyzed at the examination part (chapter 4). …”
Get full text Get full textBachelor's thesis -
2356
Eettinen hakkerointi osana järjestelmän tietoturvaa
Published 2019“…This raises the amount of attacks against these systems and forces companies and organizations to put more emphasis on their information security. …”
Get full text Get full textBachelor's thesis -
2357
Myn kere sötha moder : om användning av adjektiv vid kvinnliga huvudord i Erikskrönikan
Published 2019“…Eerikinkronikassa käytetty runomitta knitteli vaikutti tietyissä tapauksissa sanajärjestykseen, jolloin attribuutti oli siirretty pääsanansa jälkeen riimiparin luomiseksi. …”
Get full text Get full textBachelor's thesis -
2358
Esineiden internet ja sen tietoturva sovelluskerroksella
Published 2019“…IoT has different layers and each layer are exposed to different kinds of attacks. These attack can be critical to mankind. …”
Get full text Get full textBachelor's thesis -
2359
Tunnistautumismenetelmät tietojärjestelmissä
Published 2019“…Therefore, it is important that attention is paid to both security and usability when designing the information system and selecting its authentication method. …”
Get full text Get full textBachelor's thesis -
2360
Anonymiteetin haasteet Bitcoinin käytössä
Published 2019“…To examine the anonymity of cryptocurrencies, the anonymity theories attached to traditional data transmission are not fully applicable and, consequently, a new definition of anonymity for cryptocurrencies has been formed. …”
Get full text Get full textBachelor's thesis