Sökning: "PII"

Visar resultat 1 - 5 av 6 uppsatser innehållade ordet PII.

  1. 1. Om de oskiljaktiga storheternas identitet

    Kandidat-uppsats, Umeå universitet/Institutionen för idé- och samhällsstudier

    Författare :Ola Nilsson; [2022]
    Nyckelord :PII; Leibniz lag; Identity of indiscernibles; principen om oskiljaktiga storheters identitet;

    Sammanfattning : The identity of indiscernibles is the ontological principle which prescribes that there can be no separate objects which have all the properties in common. This means that, for example, there cannot be two chairs which are perfectly similar. LÄS MER

  2. 2. Kartläggning av olika testdatahanteringsverktyg : Jämförelse och utvärdering av olika testdatahanteringsverktyg

    Kandidat-uppsats, Mittuniversitetet/Institutionen för informationssystem och –teknologi

    Författare :Jakob Viking; [2019]
    Nyckelord :Test data; GDPR; PII; test data management tool; Testdata; GDPR; PII; testdatahanterare;

    Sammanfattning : Due to new regulation GDPR, a whole industry had to change its way of handling data. This industry is the test data management industry, an industry that bases its products on managing PII (Personally Identifiable Information). LÄS MER

  3. 3. Design for Addressing Data Privacy Issues in Legacy Enterprise Application Integration

    Master-uppsats, Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Författare :Kavindra Kulathilake Meddeoda Gedara; [2019]
    Nyckelord :B2B; EDI; EDIFACT; GDPR; Enterprise Application Integration; Middleware Broker; Tokenization; Data Privacy;

    Sammanfattning : Electronic message transfer is the key element in enterprise application integration (EAI) and the privacy of data transferred must be protected by the systems involved in the message transfer from origin to the destination. The recent data privacy regulation such as GDPR (General Data Protection Regulation) has enforced the organizations to ensure the privacy of the personal data handled with obligations to provide visibility and control over to the data owner. LÄS MER

  4. 4. Leveraging an Active Directory for the Generation of Honeywords

    Master-uppsats, Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Författare :Johan Lundström; [2018]
    Nyckelord :honeywords; passwords; authentication; password-based authentication; password cracking; deception techniques;

    Sammanfattning : Honeywords, fake passwords that when used by an adversary are set to trigger an alarm, is one way of detecting security breaches. For them to be effective, however, they must resemble real passwords as closely as possible and thus, the construction of the honeywords is crucial. LÄS MER

  5. 5. The Anonymous Friend: Effects of eWOM Sources' Personal Identifying Information

    C-uppsats, Handelshögskolan i Stockholm/Institutionen för marknadsföring och strategi

    Författare :Carl Saidac; Magnus Wahlström; [2014]
    Nyckelord :eWOM; Online Reviews; Personal Identifying Information PII ; Source Disclosure; Video eWOM;

    Sammanfattning : Thanks to technology development, the concept of word-of-mouth has been given a new meaning. Electronic word-of-mouth allows a single message from an unknown sender to be seen and interpreted by millions of people on the Internet. LÄS MER