Sökning: "Privacy by design"

Visar resultat 16 - 20 av 235 uppsatser innehållade orden Privacy by design.

  1. 16. Det trötta samtycket — ett användarperspektiv om cookie-notisers användbarhet : Undersökning av vilka faktorer som påverkar användares upplevelse, uppfattning och slutgiltiga val i en cookie-notis

    Kandidat-uppsats, Högskolan i Borås/Akademin för bibliotek, information, pedagogik och IT

    Författare :Sebastian Björk; Debora Jansson; Anna Larsson; [2023]
    Nyckelord :Cookie-notiser; design; informationsarkitektur; integritetsparadox; samtyckeströtthet; GDPR; nudging; fear of missing out;

    Sammanfattning : This thesis aims to investigate the effectiveness and significance of cookie notifications for users from a consent perspective. Specifically, the study seeks to answer the following research questions: 1) What types of cookie notifications can be identified on websites? 2) What factors influence the perception, experience, and final decision of tech-savvy users when it comes to cookie notifications? The implementation of the General Data Protection Regulation (GDPR) in 2018 has required websites to inform users about the collection, processing, and use of personal data, as well as request their consent. LÄS MER

  2. 17. Confidential Federated Learning with Homomorphic Encryption

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Zekun Wang; [2023]
    Nyckelord :Cloud Technology; Confidential Computing; Federated Learning; Homomorphic Encryption; Trusted Execution Environment; Molnteknik; Konfidentiell databehandling; Federerad inlärning; Homomorfisk kryptering; Betrodd körningsmiljö;

    Sammanfattning : Federated Learning (FL), one variant of Machine Learning (ML) technology, has emerged as a prevalent method for multiple parties to collaboratively train ML models in a distributed manner with the help of a central server normally supplied by a Cloud Service Provider (CSP). Nevertheless, many existing vulnerabilities pose a threat to the advantages of FL and cause potential risks to data security and privacy, such as data leakage, misuse of the central server, or the threat of eavesdroppers illicitly seeking sensitive information. LÄS MER

  3. 18. Design of AI to prevent and counteract work-related mental illness

    Master-uppsats, Lunds universitet/Ergonomi och aerosolteknologi; Lunds universitet/Certec - Rehabiliteringsteknik och Design

    Författare :Jessica Chen; Emma Malmström Englund; [2023]
    Nyckelord :Artificial Intelligence; mental illness; user experience; human-AI interaction; psychosocial work environment; Demand-Control-Support model; design thinking; interaction design; Technology and Engineering;

    Sammanfattning : Artificial intelligence (AI) is an emerging technology with the potential to revolutionize the field of mental health. As the prevalence of mental health issues continues to rise, there is a growing need for effective and accessible interventions. This master’s thesis is done in collaboration with Prevas South in Malmö at the UX department. LÄS MER

  4. 19. Primary Care in the Digital Age: is mHealth the answer? : A Quantitative Study Assessing Factors Influencing Young Elderly Swedes' Attitudes Towards mHealth for Primary Healthcare

    Kandidat-uppsats,

    Författare :Sanna Göransson; Nelli Hajdu; [2023]
    Nyckelord :eHealth; mHealth; young elderly; Sweden; digital healthcare;

    Sammanfattning : The combination of declining birth rates and an aging Swedish population presents challenges for the government in terms of accommodating and providing for the needs of a larger and older population. This demographic shift will exert significant pressure on the public sector, particularly the healthcare system. LÄS MER

  5. 20. Integration of Attribute-Based Encryption and IoT: An IoT Security Architecture

    Master-uppsats, Stockholms universitet/Institutionen för data- och systemvetenskap

    Författare :Ziyad Elbanna; [2023]
    Nyckelord :Internet of things; Attribute based encryption; Fine-grained access control; Key revocation; Proxy re-encryption;

    Sammanfattning : Services relying on internet of things (IoTs) are increasing day by day. IoT makes use of internet services like network connectivity and computing capability to transform everyday objects into smart things that can interact with users, and the environment to achieve a purpose they are designed for. LÄS MER