Showing 3,481 - 3,500 results of 3,718 for search 'AT*', query time: 0.13s Refine Results
  1. 3481

    Sähköisten oppimateriaalien käytön mahdollisuuksia ja haasteita korkeakoulutuksessa by Toivoniemi, Maria

    Published 2016
    “…Additionally, the variety of materials and the users’ negative attitudes and feelings towards using information and communications technology in their teaching and learning processes can prove to be a challenge. …”
    Get full text Get full text
    Bachelor's thesis
  2. 3482

    Tietohallinnon eroavaisuudet PK-yritysten ja suurten yritysten välillä by Rönkkö, Konsta

    Published 2016
    “…Keskisuuret yritykset pitivät uusien järjestelmien mahdol-listamia uusia toimintatapoja tärkeimpänä, kun taas suuret yritykset esittivät huolenaiheita järjestelmien aiheuttamia muutoksia kohtaan. The study attempts to identify the differences of IT Governance practices be-tween SMEs and bigger enterprises. …”
    Get full text Get full text
    Bachelor's thesis
  3. 3483

    Käytettävyyden vaikutus verkkokaupan käyttäjäkokemukseen by Tervonen, Reetta

    Published 2017
    “…This is due to the fact that a good usability in online shop does not pay much attention. In turn, if there are occurring multiple usability related problems, it will negatively affect the user's opinions on online shop. …”
    Get full text Get full text
    Bachelor's thesis
  4. 3484

    Käyttäjädatan koonti ja hyödyntäminen ohjelmisto- ja pelinkehityksessä by Toivanen, Vilma

    Published 2018
    “…Game development as software development resembles agile software development methods, but during game development especially the user demands must be considered carefully in order to ascertain that developers attain the subjective perspectives that are utilized during game development. …”
    Get full text Get full text
    Bachelor's thesis
  5. 3485

    Käyttäjän manipulaation ehkäisy by Pirilä, Mikko

    Published 2019
    “…Instead of focusing on computers or other electronic devices, the attack targets the user, which the attacker attempts to manipulate to acquire what (s)he wants. …”
    Get full text Get full text
    Bachelor's thesis
  6. 3486

    Kustomoinnin hallinta ERP-järjestelmän käyttöönottoprojektissa by Kause, Jussi

    Published 2019
    “…Based on the findings, a customization management model was created by attaching the factors and the effects on the different phases and activities of the ERP implementation project. …”
    Get full text Get full text
    Bachelor's thesis
  7. 3487

    Sähköinen identiteetti osana tietojärjestelmien pääsynhallintaa by Välimäki, Mona

    Published 2019
    “…User’s location and phone number are examples of attribute values. Identity’s attestation takes place through authentication, where entity properties are verified to be true. …”
    Get full text Get full text
    Bachelor's thesis
  8. 3488

    Kriittisen infrastruktuurin suojaaminen Suomessa by Kuokkanen, Niko

    Published 2020
    “…The cyber security perspective on critical infrastructure was justified by the fact that critical services of society are increasingly connected to a company or public network, which exposes them to cyber attacks. The study revealed the most common critical infrastructure sectors and their responsibilities, the objects to be protected and the practices to protect cyber security. …”
    Get full text Get full text
    Bachelor's thesis
  9. 3489

    E-oppimisen haasteet ja mahdollisuudet kehittyvien maiden koulutuksessa by Aro, Marianne

    Published 2020
    “…The lack of suitable devices and Internet connection as well as the problems concerning language and attitudes were recognized as the most common challenges. …”
    Get full text Get full text
    Bachelor's thesis
  10. 3490

    Hiljaisen tietämyksen hallinta : historiallinen näkökulma by Martiala, Anne

    Published 2020
    “…As a result of the content analysis of the source material, the concept of tacit knowledge is still considered to be strongly attached to information theory published decades ago. …”
    Get full text Get full text
    Bachelor's thesis
  11. 3491

    Lohkoketjuteknologian hyödyntäminen sähköisten potilaskertomusten datan hallinnassa by Tammilehto, Lasse

    Published 2021
    “…Blockchain is a relatively new technological innovation that has recently attracted widespread interest and has initially become familiar to the public through the electronic currency system Bitcoin. …”
    Get full text Get full text
    Bachelor's thesis
  12. 3492

    Digitaalisten palveluiden suunnittelu diginatiiveille by Huntington, Tiia

    Published 2022
    “…In development, special attention should be given to conducting a thorough requirements specification and including the end user into the development process. …”
    Get full text Get full text
    Bachelor's thesis
  13. 3493

    Digitaalinen kaksonen organisaation päätöksenteon tukena by Pitkänen, Lauri

    Published 2023
    “…The digital twin has attracted increasing attention in both research and practical applications in recent years. …”
    Get full text Get full text
    Bachelor's thesis
  14. 3494

    Chatbotit sähköisessä kaupankäynnissä : kuluttajien suhtautuminen ja vaikuttavat tekijät by Haikka, Henri

    Published 2024
    “…The purpose of this thesis is to conduct a literature review to find out what factors affect consumers’ attitude and how those affect attitudes towards chatbots in e-commerce. …”
    Get full text Get full text
    Bachelor's thesis
  15. 3495

    Käyttäjän tunnistus verkkopalveluissa : FIDO-teknologian ja monivaiheisen tunnistautumisen turvallisuus ja käytettävyys by Karjalainen, Eetu

    Published 2024
    “…Tavoitteena oli selvittää olisiko jokin menetelmä jo tarpeeksi kypsä molempien tarkasteltavien attribuuttien osalta korvaamaan tekstipohjaiset salasanat käyttäjän tunnistuksessa, sekä kuinka paljon loppukäyttäjien kokemus niiden käytettävyydestä vaikuttaa niiden hyväksyntään. …”
    Get full text Get full text
    Bachelor's thesis
  16. 3496

    Käyttäjän rooli sähköpostin suojaamisessa tietomurtoja vastaan by Kärki, Meri

    Published 2024
    “…MFA significantly prevents unauthorized access to accounts, as it requires attackers to break multiple authentication factors rather than just cracking a single password. …”
    Get full text Get full text
    Bachelor's thesis
  17. 3497

    Lakiprosessin nopeuttaminen tekoälyn avulla Yhdysvaltojen oikeusjärjestelmässä by Latvala, Mikael

    Published 2025
    “…This study focuses on investigating how AI can be utilized in the U.S. legal system. Special attention was paid to how AI can speed up the various stages of the legal process. …”
    Get full text Get full text
    Bachelor's thesis
  18. 3498

    Tekoälypohjaisten uhkien vaikutus tietojärjestelmiin ja niiden torjunta by Malvela, Eetu

    Published 2025
    “…The prevalence of intelligent malware, AI-powered evasion- and attack -techniques, and generative adversarial networks (GANs) is identified. …”
    Get full text Get full text
    Bachelor's thesis
  19. 3499

    Verkossa pelattaviin rahapeleihin liitettyjä ongelmia : miten rahapelisivustot huomioivat ne by Ikola, Karri

    Published 2018
    “…However, some issues require attention, from the site itself and from its user. …”
    Get full text Get full text
    Bachelor's thesis
  20. 3500

    Poliittisesti motivoitunut kybervakoilu ja tiedustelutoiminta by Lehto, Iida

    Published 2020
    “…Cyber espionage, and intelligence form a complex entity that envelop several cyber and real-world phenomena, such as APT attacks, information operations, and political movement. …”
    Get full text Get full text
    Bachelor's thesis
Search Tools: RSS Feed