Showing 3,201 - 3,220 results of 3,718 for search 'AT*', query time: 0.06s Refine Results
  1. 3201

    Emootiot, ihon sähkönjohtavuus ja sisäinen puhe pariterapian yhteisessä naurun hetkessä by Hotakainen, Roosa, Kärki, Minna

    Published 2014
    “…Therapist 2 paid more attention to the male client and to the interaction between the spouses, whereas therapist 1 concentrated more on the positive sides of the moment and to the female client’s point of view. …”
    Get full text Get full text
    Bachelor's thesis
  2. 3202

    Tekoälyn sovelluskohteet kyberturvallisuudessa by Keränen, Oona

    Published 2020
    “…These advances and the use of new techniques with regards to cyber-attacks seem to be leading to the point where old cyber security measures are no longer adequate. …”
    Get full text Get full text
    Bachelor's thesis
  3. 3203

    Tietohallinto osana yrityksen liiketoimintaa by Manninen, Antti-Jussi

    Published 2019
    “…Most significant factors to efficient information governance are involving information governance as a part of business strategy and directors board attention to information governance. …”
    Get full text Get full text
    Bachelor's thesis
  4. 3204

    Obsessioista oivalluksiksi, kompulsioista kuviksi : pakko-oireisesta häiriöstä kommunikoiminen taidetyöpajan avulla by Vessman, Oona

    Published 2022
    “…In February 2022 an art workshop called “OCD, Me and My Loved One – Strengthening of Communication Through Words of Art” was held in Jyväskylä, Finland, to which three OCD-patients and three of their loved ones – a friend, a family member or a romantic partner – attended to. This bachelor’s thesis studies the effects of the art workshop on its participants: what type of associations the group had about obsessive-compulsive disorder before and after the workshop, how the patients and loved ones rated their willingness to communicate about the disorder before and after, and whether the day had any effect on the patients’ feeling of shame about their symptoms. …”
    Get full text Get full text
    Bachelor's thesis
  5. 3205

    APT – Kohdistettu hyökkäys by Kuhalampi, Matti

    Published 2018
    “…These kind of attacks go by the term “APT“, which stands for advanced persistent threat. …”
    Get full text Get full text
    Bachelor's thesis
  6. 3206

    USB-laitteiden hyökkäyksiä isäntälaitetta vastaan by Tolonen, Onni

    Published 2025
    “…The purpose of this thesis is to take a look at and categorize attacks made using USB devices. The attacks are mostly limited to ones that are directed towards the host. …”
    Get full text Get full text
    Bachelor's thesis
  7. 3207

    Datan ja data-analytiikan hyödyntäminen joukkueurheilussa by Mahlberg, Kaarlo

    Published 2022
    “…The use of data in sports is a growing trend and the use of data is constantly increasing, especially in top-level sports. Top athletes and teams need every advantage available. …”
    Get full text Get full text
    Bachelor's thesis
  8. 3208

    Käyttäjäkeskeisen suunnittelun integrointi ketteriin kehitysmenetelmiin by Jäppinen, Lotta

    Published 2020
    “…However, popular agile development methods do not pay enough attention to improving the usability of systems when developing them. …”
    Get full text Get full text
    Bachelor's thesis
  9. 3209

    Le premier constituant de la phrase assertive dans la fiction by Ruuska, Hanna-Kaisa

    Published 2010
    “…Silti suomen olla- verbi esiintyy attribuutin edellä ilman subjektia, ja ranskassa väitelause voidaan aloittaa konjunktiolla, vaikka suomessa sitä jokseenkin vältellään. …”
    Get full text Get full text
    Bachelor's thesis
  10. 3210

    Riski ja luottamus radiotaajuisessa tunnistamisessa by Isomäki, Ari

    Published 2013
    “…Based on McKnights and Chervany’s trust typology the aim is to clarify how trust bears significance in consumers’ attitude towards radio frequency tech-nology and how trust can be enhanced therefore improving consumers percep-tions. …”
    Get full text Get full text
    Bachelor's thesis
  11. 3211

    Mobiilisovellusten aiheuttamat uhat käyttäjän yksityisyydelle by Simsiö, Sami

    Published 2018
    “…In addition, good IT skills were found to predict a more critical attitude towards mobile applications. …”
    Get full text Get full text
    Bachelor's thesis
  12. 3212

    Psychological triggers in video games by Toivio, Olli

    Published 2016
    “…In this thesis, different kinds of attributes are found. These attributes are identified as contributing states of flow and immersion, noticeably seen in the GameFlow model. …”
    Get full text Get full text
    Bachelor's thesis
  13. 3213

    Strategiset haasteet julkisen sektorin palveluiden digitalisaatiossa Afrikan maissa by Pakola, Henri

    Published 2018
    “…Furthermore the benefits are being spread unequally amongst the citizens thus deepening the digital divide. This thesis attempts to clarify the special characteristics of the operational environment in Africa that make successful implementation of eGovernment-strategy so challenging. …”
    Get full text Get full text
    Bachelor's thesis
  14. 3214

    Elm-ohjelmointikieli web-käyttöliittymien ohjelmoinnissa by Hopia, Tuomo

    Published 2019
    “…Elm is a new functional programming language for web front-end development. Elm takes an attempt on solving the most significant problems of current web-development in its own opinionated way. …”
    Get full text Get full text
    Bachelor's thesis
  15. 3215

    Vallankumous vai muutoksen mahdollisuus? Tekoälyn työllisyysvaikutuksiin liitetyt diskurssit Helsingin Sanomien pääkirjoituksissa by Lampi, Anna

    Published 2019
    “…Vallankumousdiskurssin vahvan aseman vuoksi tutkielmassa tehdään myös katsaus moraalisen paniikin teoriaan ja tarkastellaan lopuksi aineistoa moraalisen paniikin attributionaaliseen malliin peilaten. …”
    Get full text Get full text
    Bachelor's thesis
  16. 3216

    Bitcoin mallina lohkoketjun toimintaperiaatteisiin by Iivanainen, Iiro

    Published 2020
    “…Blockchain technologies enable the existance of decentralized systems that have attributes such as data persistance, neutrality as well as anonymity. …”
    Get full text Get full text
    Bachelor's thesis
  17. 3217

    Yritysblokkaamisen motiivit ja haasteet by Ovaska, Jussi

    Published 2014
    “…The results of the study were that in the studies regarding corporate blogs there have for example been attempts to figure out what are the attitudes of managers and employees towards blogs are, their motives to start blogs, the challenges in maintaining blogs, the efficecy of blogs in business or inceasing revenue and categorizing blogs for future research. …”
    Get full text Get full text
    Bachelor's thesis
  18. 3218

    Lohkoketjujen potentiaali ja tulevaisuus by Seppänen, Erno

    Published 2018
    “…On top of that, the code itself is vulnerable to attacks and government regulations take place in many countries. …”
    Get full text Get full text
    Bachelor's thesis
  19. 3219

    Palvelunestohyökkäysten toiminta ja torjunta by Ojanen, Arttu

    Published 2024
    “…Attack and defense methods are presented according to the protocol stack, starting from network/transport layer flooding attacks and defense methods. …”
    Get full text Get full text
    Bachelor's thesis
  20. 3220

    Ohjelmistojen lisensointimallit ja jakelukanavat : pienyrityksen tietohallinnon näkökulma by Remes, Sampo

    Published 2015
    “…As a result of this research an overview was formed on what attributes are required from licensing models applicable to small businesses, and what models are feasible for small business software acquisitions. …”
    Get full text Get full text
    Bachelor's thesis
Search Tools: RSS Feed