Sökning: "mobile penetration"

Visar resultat 1 - 5 av 60 uppsatser innehållade orden mobile penetration.

  1. 1. Exploring the influence of ICT on Financial Inclusion and Mobile Money Services in Sub-Saharan Africa

    Kandidat-uppsats, Göteborgs universitet/Institutionen för nationalekonomi med statistik

    Författare :Noa Almfors; Klara Stenman; [2023-07-10]
    Nyckelord :Sub-Saharan Africa; Financial Inclusion; Information and Communication Technology; Internet; Mobile Money;

    Sammanfattning : This thesis investigates the influence of two types of Information and Communication Technologies (ICT), internet and mobile phones, on Financial Inclusion (FI) and Mobile Money Mobile Money (MM) adoption in 24 Sub-Saharan African countries in the last decade. A unique feature of this research is the incorporation of an index measuring financial inclusion, developed specifically for this study. LÄS MER

  2. 2. Are Children Safe with Smart Watches? : Security Analysis and Ethical Hacking on Children’s Smart Watches

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Yaqi Tian; [2023]
    Nyckelord :Security analysis; Penetration testing; Smart watches; Mobile Applications; Säkerhetsanalys; Penetrationstestning; Smarta klockor; Mobilapplikationer;

    Sammanfattning : There are more and more parents that are considering to purchase smart watches for their kids. The children’s smart watches on the market are usually equipped with many practical functions like the GPS positioning, the camera and the messaging. LÄS MER

  3. 3. Ethical Hacking of a Smart IoT Camera : A Penetration Test on D-Link DCS 8515-LH Smart Camera

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Chunyu Zhuang; [2023]
    Nyckelord :Cybersecurity; IoT security; IoT camera; IoT devices; Penetration testing; Ethical hacking; Threat modeling; Cybersäkerhet; IoT säkerhet; IoT Kamera; Penetrationstestning; Etisk hacking; Hotmodellering;

    Sammanfattning : The trending usage of IoT devices raises serious security concerns. IoT devices have complete access to users’ network environments. In the eyes of hackers, the value of IoT devices is exceptionally high. From minor disturbances to major crimes, all could happen in no time with compromised IoT devices. LÄS MER

  4. 4. Security evaluation of ten Swedish mobile applications

    Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Jens Ekenblad; Stefan Andres Garrido Valenzuela; [2022]
    Nyckelord :Black-box testing; Penetration testing; Mobile applications; Android; Exploit; Vulnerability Evaluation; OWASP; MSTG; Black-box testning; Penetrations testning; Mobila applikationer; Android; Exploatering; Sårbarhetsutvärdering; OWASP; MSTG;

    Sammanfattning : The widespread usage of smartphones and mobile applications in Sweden exposes the users to potential risks if not adequate security standards are implemented. An insecure application that is exploited by an adversary could potentially compromise the users private data and integrity. LÄS MER

  5. 5. Penetration Testing Ten Popular Swedish Android Applications

    Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Alexander Astély; Johan Ekroth; [2022]
    Nyckelord :Penetration testing; Android; vulnerabilities; exploitation; mobile security; penetrationstest; Android; sårbarheter; exploatering; mobilsäkerhet;

    Sammanfattning : As more services previously conducted physically are being conducted on mobiles, the security of mobile applications has become a more important part of the development. These mobile applications may handle sensitive information for the user such as payment data, health data, and other information that can have value for malicious actors. LÄS MER