Suggested Topics within your search.
- 601 462
- Tietojärjestelmätiede 406
- Information Systems Science 397
- 502 249
- Liikuntapedagogiikka 249
- Physical Education Teacher Education 249
- asenteet 211
- liikunta 186
- urheilijat 186
- Tietotekniikka 165
- nuoret 164
- Mathematical Information Technology 163
- urheilu 157
- Psykologia 148
- 202 147
- Psychology 147
- 602 146
- opetus 133
- motivaatio 125
- 5032 121
- fyysinen aktiivisuus 121
- Liikunnan yhteiskuntatieteet 120
- Social Sciences of Sport 120
- tietoturva 113
- kyberturvallisuus 99
- sosiaalinen media 97
- English 96
- Englannin kieli 95
- englannin kieli 91
- Health Education 88
-
3661
Esineiden internet ja sen tietoturva sovelluskerroksella
Published 2019“…IoT has different layers and each layer are exposed to different kinds of attacks. These attack can be critical to mankind. …”
Get full text Get full textBachelor's thesis -
3662
Pelikonsoleiden verkkopalveluiden tietoturvauhat
Published 2020“…The paper deals with the types of security threats as well as the 2011 and 2014 attacks on PlayStation Network and Xbox Live. The attacks were implemented using distributed denial of service attack (DDoS) and SQL injection. …”
Get full text Get full textBachelor's thesis -
3663
Grafeenin ja proteiinien vuorovaikutus
Published 2019“…Grafeenimateriaalien pintoja ja näiden funktionalisointia voidaan tutkia useilla eri tavoilla, kuten muun muassa fluoresenssilla ja mikroskopian muodoilla, kuten elektroni-, atomivoima- ja valomikroskopialla. Näiden sovelluskohteiden mahdollisuuksien arvioimiseksi ja turvalliseksi tekemiseksi täytyy grafeenimateriaalien ja biomolekyylien väliset vuorovaikutukset tuntea tarkasti. …”
Get full text Get full textBachelor's thesis -
3664
Kodin IoT-laitteet ja tietoturva
Published 2022“…In addition to security, various options to target attacks on IoT devices are specified. Also, the thesis examines the attitude towards the security of IoT devices. …”
Get full text Get full textBachelor's thesis -
3665
Sybil-hyökkäykset ja niiden havaitseminen ajoneuvojen langattomissa verkoissa (VANET)
Published 2022“…Like any other open network, VANETs are vulnerable to cyberattacks. The most dangerous attack is the Sybil attack, which enables the attacker to perform all other types of attacks in the network. …”
Get full text Get full textBachelor's thesis -
3666
Henkilöautojen varkaudenestojärjestelmien vertailu
Published 2022“…During the presentation of the concepts, the vulnerabilities and some attack methods are also presented. After the introduction of the concepts, the thesis makes a comparison between traditional and modern anti-theft systems for passenger cars, from the perspective of risk assessment. …”
Get full text Get full textBachelor's thesis -
3667
Verkkohuijausten tyypit sosiaalisessa mediassa
Published 2017“…These types of scams were phishing scams, scams related to social engineering malware attacks and 419 -scams. There were a couple of scam scenarios that were not detected outside of social media context due to social networking site required as a platform for the scams. …”
Get full text Get full textBachelor's thesis -
3668
Verkkosovellusten yleisimmät haavoittuvuudet ja käytänteet niiden ehkäisemiseksi
Published 2018“…However, web applications are more prone to cyber-attacks because they accessible through their web user interface. …”
Get full text Get full textBachelor's thesis -
3669
Kyberturvallisuus esineiden internetissä
Published 2017“…These threats are physical vulnerability from physical attacks, wireless communication and low amount of computing power in the devices of internet of things. …”
Get full text Get full textBachelor's thesis -
3670
PK-yritysten kybervalmius
Published 2018“…The most common types of attacks are phishing, various types of scamming attacks and different types of malware. …”
Get full text Get full textBachelor's thesis -
3671
Tietoturvan ihmiselementti : sosiaalinen manipulointi
Published 2017“…The result of this thesis is that Social Engineering is an effective strategy for the attacker because the lack of user awareness and easily predictable behavior. …”
Get full text Get full textBachelor's thesis -
3672
Mobiilipelialustan tuotteistaminen : case X-Routes
Published 2018“…Theories related to productization and service perspective cre-ate the theoretical framework of this study. The importance of segmentation, revenue models and customization in the productization of a game platform is analyzed at the examination part (chapter 4). …”
Get full text Get full textBachelor's thesis -
3673
Liikuntateknologiat ja niiden käyttö
Published 2020“…The study also analyzed the attributes of gamification and future applications of sports technologies. …”
Get full text Get full textBachelor's thesis -
3674
3D production pipeline in game development
Published 2012“…These pipelines have been used to make processes more efficient and rational. This study attempts to explain the meaning of 3D production pipeline for game development and evaluate the processes. …”
Get full text Get full textBachelor's thesis -
3675
RFID-implantit ja tietosuoja
Published 2021“…Another problems are the possible cyber attacks that could gain access to a person's private information. …”
Get full text Get full textBachelor's thesis -
3676
The use of information operation activities in foreign electoral interference
Published 2019“…The thesis showed that the Russian government intervened in the election by an extensive social media disinformation campaign that involved the use of trolls, bots, disinformation, “active measures” and purchasing of political advertisements as well as computer network exploitation attacks on systems containing sensitive information and then the leaking of that information. …”
Get full text Get full textBachelor's thesis -
3677
Naisten asema IT-alalla
Published 2023“…Organisations should pay attention to their communication styles during recruitment processes, to get also females interested in applying. …”
Get full text Get full textBachelor's thesis -
3678
Pelitilan synkronointi verkkomoninpeleissä
Published 2024“…Gamestate synchronization in multiplayer online games (MOGs) has gained increasing attention from the research community in the last two decades. …”
Get full text Get full textBachelor's thesis -
3679
Käyttäjien tietoisuus kyberturvallisuusuhista ja digitaalisten järjestelmien turvallisuus
Published 2024“…The aim was to use a literature review to create an overall picture of users’ awareness and attitudes towards cyber security threats. Based on the reviewed studies, most users are not aware of cybersecurity threats or how to prevent them, and awareness was found to influence the user’s attitude towards cyber security threats. …”
Get full text Get full textBachelor's thesis -
3680
Skriftliga språkkunskaper i A-svenska hos finska abiturienter på basis av processbarhetsteori
Published 2016“…Tutkittavat kieliopilliset rakenteet olivat inversio väitelauseessa, jälkilauseen sanajärjestys, kieltosanan paikka sivulauseessa, epäsuora kysymys sekä adjektiivi attributiivisena ja predikatiivisena lauseenjäsenenä. Tutkimuksen tulokset osoittavat, että 12:sta tutkimushenkilöstä kaksi sijoittuu prosessoitavuusteorian neljännelle tasolle ja peräti kymmenen viidennelle eli ylimmälle tasolle. …”
Get full text Get full textBachelor's thesis