Högskolan i Skövde

his.sePublications
Change search
Refine search result
1234567 1 - 50 of 598
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • apa-cv
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1.
    Abbasi, Muhammad Abbas Khan
    University of Skövde, School of Informatics.
    The effect of time pressure on human behavior regarding phishing susceptibility: Human aspects in information security2023Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Human errors are common in the contemporary cyber ecosystem, and in an organization’s cybersecurity chain, humans are considered the weakest link. Cybercriminals exploit human vulnerabilities using sophisticated attacks such as phishing. Human susceptibility to phishing is a persistent threat, and has a devastating effect on organizational and personal security. Previous researchers found that human susceptibility to phishing increases in presence of some factors such as organizational, individual, and environmental. Various studies highlight time pressure as one of the influencing factors that can negatively or positively impact human behavior. This research study aimed to investigate the effect of time pressure on human cybersecurity behavior regarding the ability to detect phishing. The study used quantitative research and developed a questionnaire comprising interactive phishing emails distributed online to 03 random groups having different time limits to complete the questionnaire. The study received 356 complete responses. The study's result shows a slight change in user behavior under time pressure, and the impact of time pressure can be positive or negative. However, the results are not statistically significant for all demographic groups to accept this slight change in variance. Moreover, this study's results validate previous studies on human susceptibility to phishing and found more than 50 % of respondents vulnerable to phishing.

    Thus, the results of this study indicate that the factor of time pressure itself does not significantly impact the human ability to detect phishing. However, it is essential to note that other work-related tasks or stress associated with time pressure can influence human behavior in detecting phishing attempts.

    In conclusion, the author also proposes further testing and some methodology tweaking by modifying the time given to each tested group and adding more elements to the questionnaire. Finally, the study also suggested conducting the same analysis on physically controlled groups in an organizational or institutional setting. 

    Download full text (pdf)
    fulltext
  • 2.
    Abdi, Asma Ibrahim
    University of Skövde, School of Informatics.
    Etiska och social konsekvenser av ML-modeller inom cyberbrottsbekämpning2024Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [sv]

    Denna studie syftar till att undersöka de etiska och sociala konsekvenserna av att använda maskininlärning inom cyberbrottbekämpning. Maskininlärning är en växande teknik inom cybersäkerhetsvärlden, men det finns inte tillräckligt med forskning om de utmaningar som kan uppstå vid användning av maskininlärning för cyberbrottbekämpning. För att undersöka dessa utmaningar har en kvalitativ ansats använts, där intervjuer har genomförts för att förstå vad personer som arbetar med cybersäkerhet tycker om cybersäkerhetssystem som inkorporerar maskininlärningsmodeller. 

    Resultatet av intervjuerna visar att det finns många fördelar med att använda en effektiv teknik som maskininlärning. Men det finns också många utmaningar, såsom algoritmer som är partiska och förstärker fördomar. Maskininlärning kräver stora mängder träningsdata, vilket kan leda till förlust av människors integritet. Denna studie kommer att fördjupa sig i dessa och andra utmaningar med maskininlärning.

    Download full text (pdf)
    fulltext
  • 3.
    Abdirizak, Mohamed
    et al.
    University of Skövde, School of Informatics.
    Abobaker, Ivan
    University of Skövde, School of Informatics.
    What are the gaps in teaching the cybersecurity threats landscape, and what teachers need to include the subject in their curriculum?2024Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    This thesis examines the current gaps in cybersecurity education in junior high and high schools in Sweden, with a focus on the challenges of integration and the resources required for teachers to effectively instruct on cybersecurity topics. Despite the critical importance of cybersecurity in protecting digital interactions and personal data, existing curricula often lack deep and systematic integration of this essential subject. Based on qualitative interviews with 12 teachers from junior high and high schools, the researchers’ findings underscore a significant need for structured cybersecurity curricula and enhanced teacher training. The research reveals that while students are extensively engaged with digital technologies, their vulnerability to various cybersecurity threats remains due to inadequate educational frameworks. The study highlights the urgent need for curricular improvements to include comprehensive cybersecurity courses, aligned with current technological threats and the digital behaviors of students.

    Download full text (pdf)
    fulltext
  • 4.
    Abdulhadi, Osama
    University of Skövde, School of Informatics.
    The human connection to information security: A qualitative study on policy development, communication and compliance in government agencies2023Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    The human factor and insider threats play a crucial role in information security. In today’s digital age, protecting organizational data requires a deep understanding of human behaviour and its impact on information security. The increasing volume of electronically stored data has led to a rise in cyber threats and breaches, necessitating effective information security policies and regulations.

    This study focuses on the experiences and perspectives of employees and top management in government agencies regarding the development, communication, compliance, and attitudes towards information security policies and regulations. Semi-structured interviews were conducted with participants from both top management or information security officers and regular employees, which allowed for an in-depth exploration of their experiences and perspectives.

    The findings show that government agencies systematically develop policies by engaging stakeholders, ensuring accessibility, and adhering to legal frameworks. Addressing the human factor involves training, awareness programs, and top management support. Policy development and implementation include risk assessment, stakeholder identification, objective setting, continuous review, and integration into daily operations. Communication channels such as intranets, training, coordinators, and awareness events are utilized, but their effectiveness is not directly measured. Proposed improvements include enhancing accessibility, improving policy document management, and using clearer language.

    Employees generally possess a positive attitude towards information security, though their understanding varies, and challenges to their understanding include complex language and unclear instructions. Compliance also varies, with difficulties arising from technical terminology and information overload. Enhanced compliance can be achieved through simplified language, providing better resources, and top management support. Proactive incident management focuses on learning and risk minimization. The human factor and insider threats remain significant concerns, which emphasizes the need for further education, awareness training, and motivation. 

    Download full text (pdf)
    fulltext
  • 5.
    Abdulkader, Mohamad
    University of Skövde, School of Informatics.
    Why do people use public Wi-Fi?: An investigation of risk-taking behaviour and factors lead to decisions2023Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    The usage of public Wi-Fi and hotspots has witnessed a substantial increase in recent times, providing convenient connectivity in various public areas. Public wireless networks are now widely accessible, especially in smart cities. However, utilising public Wi-Fi exposes individuals to potential threats to their privacy and security. Hackers can exploit vulnerabilities present in public Wi-Fi networks, such as the "Evil Twin" attack, to deceive users and unlawfully obtain their personal information. The main objective of the research was to investigate people's awareness of the security risks associated with public Wi-Fi usage and to identify the factors that contribute to their willingness to take such risks. The research adopted a qualitative approach, utilising semi-structured interviews with 14 participants to gain valuable insights into their understanding and knowledge of the risks connected with public Wi-Fi. The majority of respondents employed public Wi-Fi for educational purposes, browsing the Internet, and engaging with social media platforms. Additionally, the findings of the study explored the motivations and influences that lead individuals to take risks when using public Wi-Fi. Factors such as convenience, cost-effectiveness, saving mobile data usage, limited mobile network coverage, and a lack of awareness concerning privacy and security risks emerged as the most significant reasons and influences behind the utilisation of public Wi-Fi.

    Download full text (pdf)
    fulltext
  • 6.
    Abdullah, Mohammed
    University of Skövde, School of Informatics.
    Säkerhetsmedvetenhet och dess inverkan på informationssäkerhet inom hälso-och sjukvården2023Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [sv]

    Framväxten av digitalisering och skillnader i utvecklingstakt mellan digitalisering och informationssäkerhet har lett till ökade utmaningar för många sektorer i samhället, inklusive hälso- och sjukvården. En central del i att hantera dessa utmaningar är att förstå hur viktigt det är att ha en god säkerhetsmedvetenhet hos anställda. Säkerhetsmedvetenhet är därför en nödvändig komponent för att skydda och bevara informationssäkerheten i en organisation. Informationssäkerhet innefattar mer än tekniska och administrativa säkerhetsåtgärder, eftersom människor är involverade i alla aspekter av informationssäkerhet och ofta anses vara den svagaste länken i säkerhetskedjan. Till följd av detta kan ökad medvetenhet bland personalen bidra till mer effektiv informationssäkerhet. Studien fokuserade på att undersöka följande frågeställning: Hur kan IT-chefer inom hälso- och sjukvårdssektorn arbeta systematiskt för att öka personalens säkerhetsmedvetenhet?

    Resultatet visade att ledningens engagemang kan påverka personalens medvetenhet och bidra till att skapa en stark säkerhetskultur, vilket är i linje med vad litteraturen beskriver. Genom ökad medvetenhet bland personalen kan många säkerhetsincidenter relaterade till mänskliga misstag undvikas. Studien genomfördes med stöd av kvalitativa forskningsmetoder och semistrukturerade intervjuer, där ledande roller inom hälso- och sjukvården intervjuades. I nuläget visar resultatet att det finns utrymme för förbättring när det gäller personalens nuvarande medvetenhet. Dessutom visade resultatet att det inte finns en effektiv metod för att utvärdera och mäta denna medvetenhet. Däremot visar både praktiken och litteraturen att antalet ökade cyberattacker ökar och att det finns betydande utmaningar kopplade till att säkerställa informationssäkerhet. Samtidigt påvisar resultatet ett tydligt behov av ytterligare forskning samt utveckling av metoder för att mäta och förbättra personalens säkerhetsmedvetenhet.

  • 7.
    Abrahamsson, Linnea
    University of Skövde, School of Informatics.
    Challenges in designing a game for an outside client: An advergame case study2024Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Serious games are well known for their application outside the games, but how they are developed is seldom explored. This study looks at the development process for an advergame for an outside client and what challenges and opportunities presented themselves when creating it. By looking at the context of development the study finds an understanding for what affected the development and how it affected it. The results show that the development context can have varying effects on development. Part of this is the motivations and background behind the project and goals of the company. The developers’ work can become dependent on the project company and work can be halted if the connection is not maintained. Further the study proposes guidelines based on the results that developers can use when working with interdisciplinary collaboration.

    Download full text (pdf)
    fulltext
  • 8.
    Abrahamsson, Linnea
    et al.
    University of Skövde, School of Informatics.
    Almkvist, Simon
    University of Skövde, School of Informatics.
    Paratexter och spelupplevelsen: Hur kan digitala uppslagsverk påverka spelupplevelsen i överlevnadsspel?2021Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [sv]

    Paratexter är verk som ger konsumenter en uppfattning om en produkt utan att interagera med själva produkten. Denna undersökning har studerat hur spelupplevelsen kan påverkas av en viss typ av paratext, digitala uppslagsverk, i överlevnadsspel. Spelupplevelsen är ett subjektivt fenomen, vilket ligger till grund för undersökningens kvalitativa ansats. En prototyp av ett generiskt överlevnadsspel, samt ett digitalt uppslagsverk för spelet, producerades. Därefter användes observationer och semistrukturerade intervjuer för att jämföra tio respondenters handlingar med deras åsikter. Resultatet bekräftade att det finns många olika attityder gentemot digitala uppslagsverk. Bland annat påvisades att dessa paratexter aktivt bidrar till att skapa mål för spelaren, och kan komplettera eventuella brister i spelets design. Spelupplevelsen kan också försämras, eftersom spelaren redan ”upplevt spelet” genom uppslagsverket. Framtida studier bör förslagsvis utnyttja denna introducerande studie för att skapa ett paratextuellt ramverk som spelutvecklare kan använda för att skapa så genomtänkta spelupplevelser som möjligt.

    Download full text (pdf)
    fulltext
  • 9.
    Abrahamsson, Viktor
    University of Skövde, School of Informatics.
    Visualisering av geospatialdata från firms i heatmaps: En jämförelse av visualiseringstekniker med D3.js och Heatmap.js baserat på utritningstid2020Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [sv]

    Stora mängder miljödata samlas hela tiden in och för att använda all data behöver den förstås av användarna så de kan applicera kunskapen inom deras område. Visualisering skapar förståelse om data. Heatmaps kan användas för att visualisera geospatial data och interaktivitet är ett hjälpmedel för att skapa ytterligare grafiska representationer. I detta arbete evalueras JavaScript-teknikerna D3.js, Heatmap.js och Vue.js angående vad som är mest lämpligt för att visualisera geospatial data utifrån effektiviteten vid utritning av heatmaps. Ett experiment genomförs där biblioteken D3.js, Heatmap.js testas i ramverket Vue.js. Detta för att ta reda på vilket bibliotek som föredras vid utritning av heatmaps och om ett ramverk påverkar resultatet. En miljö sätts upp för att genomföra undersökningen och tester för att påvisa detta. Resultatet indikerar att Heatmap.js och mindre datamängder ger en lägre utritningstid i den tillämpning som undersökts. I framtiden är det intressant att undersöka flera bibliotek och flera datamängder.

    Download full text (pdf)
    fulltext
  • 10.
    Acarsoy, Sara Nil
    University of Skövde, School of Informatics.
    Effects of interactivity on narrative-driven games: A heuristic approach for narrative-driven games2021Independent thesis Advanced level (degree of Master (One Year)), 15 credits / 22,5 HE creditsStudent thesis
    Abstract [en]

    In narrative-driven games, the story is an essential part of the gameplay, and understanding the story is of great importance. Given that what separates this genre from other storytelling media is interactivity, this thesis focuses on the elements in narrative-driven video games that effects the players' perception of narrative through interactivity. Using players' likes and dislikes from their previous experiences in narrative-driven games, this thesis aims to develop a heuristic approach for interactive narrative elements that offer the narrative through players' input to the game's system and create an effective gameplay experience that delivers the story to the players.

    Download full text (pdf)
    fulltext
  • 11.
    Adamson, Victor
    et al.
    University of Skövde, School of Informatics.
    Bägerfeldt, Johan
    University of Skövde, School of Informatics.
    Assessing the effectiveness of ChatGPT in generating Python code2023Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    This study investigated ChatGPT’s Python code generation capabilities with a quasi-experiment and a case study, incorporating quantitative and qualitative methods respectively. The quantitative analysis compared ChatGPT-generated code to human-written solutions in terms of accuracy, quality, and readability, while the qualitative study interviewed participants with varying levels of programming experience about the usability of ChatGPT for code generation. The findings revealed significant differences in quality between AI-generated and human-written solutions but maintained overall similarities in accuracy and readability. The interviewees reported that ChatGPT showed potential for generating simple programs but struggled with complex problems and iterative development, though most participants were optimistic about its future capabilities. Future research could involve larger samples, more programming languages, and increased problem complexities. 

    Download full text (pdf)
    fulltext
  • 12.
    Aggestam, Lena
    University of Skövde, School of Humanities and Informatics.
    Towards a Maturity Model for Learning Organizations – the Role of Knowledge Management2006In: Proceedings of the 17th International Conference on Database and Expert Systems Applications (DEXA'06), IEEE, 2006, p. 141-145, article id 1698323Conference paper (Refereed)
    Abstract [en]

    Organizations of today must learn how to learn in order to become competitive. How an organization reaches maturity clearing this area is not clear. This paper presents an initial version of a maturity model aiming to set directions for how to become a learning organization, and to assist people when discussing where in this process the organization finds itself in. Future work consists of detailing the model and develops guidelines for how to measure maturity.

  • 13.
    Aggestam, Lena
    et al.
    University of Skövde, School of Business. University of Skövde, Enterprises for the Future.
    Durst, Susanne
    University of Skövde, School of Business. University of Skövde, Enterprises for the Future.
    Persson, Anne
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    Critical Success Factors in Capturing Knowledge for Retention in IT-Supported Repositories2014In: Information, ISSN 2078-2489, Vol. 5, no 4, p. 558-569Article in journal (Refereed)
    Abstract [en]

    In this paper, the authors demonstrate the suitability of IT-supported knowledge repositories for knowledge retention. Successful knowledge retention is dependent on whatis stored in a repository and, hence, possible to share. Accordingly, the ability to capture theright (relevant) knowledge is a key aspect. Therefore, to increase the quality in an IT-supported knowledge repository, the identification activity, which starts the capture process, must besuccessfully performed. While critical success factors (CSFs) for knowledge retention andknowledge management are frequently discussed in the literature, there is a knowledge gapconcerning CSFs for this specific knowledge capture activity. From a knowledge retention perspective, this paper proposes a model that characterizes CSFs for the identification activity and highlights the CSFs’ contribution to knowledge retention.

    Download full text (pdf)
    Critical Success Factors in Capturing Knowledge for Retention in IT-Supported Repositories
  • 14.
    Aggestam, Lena
    et al.
    Department of Engineering Science, University West, Trollhättan, Sweden.
    van Laere, Joeri
    University of Skövde, School of Informatics. University of Skövde, Informatics Research Environment.
    Svensson, Ann
    School of Business Economics and IT, University West, Trollhättan, Sweden.
    How to Apply and Manage Critical Success Factors in Healthcare Information Systems Development?2023In: Systems, E-ISSN 2079-8954, Vol. 11, no 9, article id 469Article in journal (Refereed)
    Abstract [en]

    Studies on Critical Success Factors (CSFs) in Healthcare Information Systems (HIS) development projects have traditionally often been limited to retrospectively identifying CSFs in a finished project. In this paper, we focus on how to prospectively apply and manage CSFs in HIS projects. Based on a holistic perspective and systems thinking, an inductive research strategy was applied and a single in-depth case study was conducted. The findings include detailed descriptions that contribute to further understanding of how to prospectively apply and manage CSFs in HIS projects. The analysis reveals that CSFs must be applied differently and managed on various system levels. Furthermore, it shows how interactions exist between different system levels, both in the case of a specific CSF and between different CSFs on various system levels. Our analysis framework and findings indicate new directions for future research: how to prospectively apply and manage CSFs in HIS development projects can now be investigated both in a more holistic way and more in detail. Finally, healthcare practitioners can use the descriptions as practical checklists for guiding them in how to realize situational adaptation of CSFs in HIS projects across different system levels.

    Download full text (pdf)
    fulltext
  • 15.
    Ahamed, A. F. M. Jalal
    University of Skövde, Organising for Sustainable Development Research Environment. University of Skövde, School of Business.
    Digital Transformation as a Means of Achieving SME Resilience During COVID-19 – A Systematic Review and Future Research Agenda2024In: Small and Medium-Sized Enterprise (SME) Resilience: Strategies for Risk and Crisis Management / [ed] Susanne Durst; Thomas Henschel, Springer Nature, 2024, 1, p. 17-32Chapter in book (Refereed)
    Abstract [en]

    The Covid-19 pandemic had devastating effects on small and medium businesses (SME). The immediate shock, uncertainty, varying restrictions, and the risk to life disoriented the small and medium industries. In the last 4–5 years, we’ve seen small and medium businesses worldwide gradually return to their former state. Digital transformation is one of the tools used in this comeback effort. This topic has been the subject of several conceptual, empirical, and review studies. However, no systematic review has been conducted that examines digital transformation enablers and how digital transformation can lead to organizational resilience. This study aims to fill the gap. I conducted this systematic review following the PRISMA guidelines. On the basis of the 37 studies that met the inclusion criteria, I identified two clusters of enablers (strategic orientations, capabilities, and capacities) as well as six mediating strategies (frugal innovation, organizational agility, strategic agile process, dynamic strategic planning, social entrepreneurship and competitive intelligence, and sustainable business processes) of digital transformation on SME resilience. A consolidated conceptual model was developed based on the findings of this review. Scholars will be able to use these results to understand the knowledge boundary and develop effective strategies for promoting the resilience of SME’s. 

  • 16.
    Ahlborg, Anton
    University of Skövde, School of Informatics.
    How mail components on the server side detects and process undesired emails: a systematic literature review2021Independent thesis Basic level (degree of Bachelor), 15 credits / 22,5 HE creditsStudent thesis
    Abstract [en]

    As the use of emails increases constantly every year, so do the reports of various victims in society, on companies and individuals who have been affected by these undesirable emails in the form of spam, spoofing and phishing in their inbox. The effect of undesirable emails are many, but in summary, they cost the society and organization immense amount of money. This study will aim to understand why these emails still make its way into a user’s inbox by identifying current existing solutions that are being used by email servers to evaluate incoming undesirable emails.

    The analysis of the study shows that there are shortcomings in the solutions that are being used today, which lead to undesirable emails reaching a user’s inbox, and it is likely to continue in the near foreseeable future, unless research and or actions are applied to some of the brought-up issues in this study, namely problems with adoption and usage rate of authentication protocols, technical issues within authentication protocols and emails being wrongly classified by today's filtering techniques.

    Download full text (pdf)
    fulltext
  • 17.
    Ahlqvist, Viktor
    University of Skövde, School of Informatics.
    Narrativ komplexitet i spel: Kan svårförstådda berättelser göra spel mer tillfredsställande?2024Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [sv]

    Sedan dataspelens begynnelse har spelen innehållit olika former av narrativ. Med tiden har dessa narrativ blivit mer komplicerade, från de tidigaste spelens påmålade teman som bakgrundsberättelser, till moderna spelberättelser vars narrativ kräver signifikant ansträngning från spelarna. Tidigare studier har visat en viss korrelation mellan spelares tillfredsställelse för spelen och deras narrativa komplexitet. Syftet med denna studie är att bidra med mer data till denna hypotes, genom att skapa två versioner av ett kort spel, med olika nivåer av just narrativ komplexitet. Frågeställningen som ämnades besvaras genom att värdera testpersoners upplevelse av de olika varianterna var följande: Kan svårförstådda berättelser göra spel mer tillfredsställande? Resultatet av de speltester som genomfördes visade på liknande resultat som de tidigare nämnda studierna, men artefakternas likhet och den begränsade mängden testdeltagare resulterade i osäkerhet kring testets reliabilitet. Framtida studier inom ämnet skulle gagnas av ett mer iterativt arbete med artefakterna samt betydligt fler speltester.

    Download full text (pdf)
    fulltext
  • 18.
    Ahlström Signal, Thea
    et al.
    University of Skövde, School of Informatics.
    Zako, Matti
    University of Skövde, School of Informatics.
    Teaching information security in preschool: Challenges with existing guidelines2024Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    The world has become more digitized, and children use digital devices daily as games or watching tools. As technology grows stronger, the use of cyberspace and the threat coming within cyberspace grow larger by the day. Today's technology makes children active users in the cyber community as many children do in fact, use digital devices to talk to strangers, play online games and so on. There has also been increased digitization within preschool. Therefore, this thesis aims to review the existing guidelines regarding digital devices in the education system from the Swedish National Agency of Education (SNAE). Furthermore, investigate how preschool teachers translate the existing guidelines into practice for children's security online and how teachers work with cyber security awareness. The authors’, therefore conducted an interview study to gather data from teachers and principals in preschools regarding the use of digital devices. The authors’ aim to understand how teachers and principals work together with the existing guidelines to further enhance cyber security awareness among children. Multiple teachers work with digital tools in preschools. However, teachers use digital tools as a supplement to teaching children. The discussion regarding the risks and how to be safe online is not discussed as much in preschool because of the children's age. Multiple participants agreed that a separate segment for cyber security awareness would be significant. 

    Download full text (pdf)
    fulltext
  • 19.
    Ahlsén, Corinne
    et al.
    University of Skövde, School of Informatics.
    Karlsson, Casper
    University of Skövde, School of Informatics.
    LEVEL DESIGNS FÖRMÅGA ATT FÖRMEDLA STÄMNING: Storlek och upplevd stämning i Bloodborne2023Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Om storleken på utrymmen i spels levlar påverkar stämningen har diskuterats av leveldesignförfattare, bland andra Totten (2019) som nämner i sin bok, An Architectural Approach to Level Design, att olika storlekar på utrymmen i spel främjar olika känslor. Denna bakgrund för studien har sedan applicerats på den data som samlats in för att svara på problemformuleringen Hur påverkas upplevd stämning av områdets storlek i Bloodbornes Forbidden Woods och Upper Cathedral Ward? Datan består av storleksmätningar av utrymmen i två av spelets områden samt kommentarer från internet. Kommentarerna granskades efter ord och uttryck kopplade till upplevd stämning och områdets storlek. Efter att ha sammanställt kommentarerna om områdena analyserades de utefter storleksmätningarna och Tottens (2019) teori. Vi fann indikation till att storlek påverkar upplevd stämning, men att mer forskning krävs för att säkerställa resultatet. Denna kunskap kan potentiellt användas av level designers för att skapa en bättre spelupplevelse. För framtida arbete föreslår författarna att skapa en egen artefakt för att bättre kunna kontrollera beroende och oberoende variabler. 

    Download full text (pdf)
    fulltext
  • 20.
    Ahmad Sheikh Sleiman, Shirin
    University of Skövde, School of Informatics.
    Aueis en ny UX-utvärderingsmetod för engagemang vid interaktion med sociala robotar2021Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    The user experience design (UX) perspective is essential when evaluating interaction with all types of robots, but especially social robots. As these are developed to perform important tasks in society such as being companion robots in geriatric care, schools and more. The User Experience Design area has a wide collection of evaluation methods that the human-robot interaction area can benefit from. This study aims to improve the experience of interacting with a social robot. For this purpose, literature studies have been conducted where UX aspects were identified that are relevant to focus on when evaluating the conditions for engagement in the interaction between human and social robot. A knowledge gap was identified of limited available analytical evaluation methods in human-robot interaction (HRI). In order to develop a new analytical evaluation method to promote engagement with a social robot, a methodological approach was used to develop evaluation methods. The design process of the new method consisted of five iterative phases that resulted in an Analytical evaluation method of engagement in interaction with social companion robots (AUEIS). AEUIS is designed to evaluate the conditions for achieving engagement when interacting with a social robot. Great focus was placed on the fifth phase where versions of AUEIS were tested by several UX designers based on the criteria that AUEIS should have high validity, be useful and have good learnability. The testing was performed with four UX designers with different experiences in HRI. The results of the testing showed that a UX designer without previous experience in evaluating HRI can use AUEIS without problems. At the same time, the aspects developed to carry out the evaluation were comprehensive to identify problems when interacting with a social robot.

    The result of this is work is a complete analytical evaluation method. AUEIS consists of seven aspects that study the conditions for engagement with a social robot. To evaluate with AUEIS, there are three phases: Preparation, evaluation, and analysis. Each phase has some activities that are followed to obtain a result about the conditions of engagement in the interaction with a social robot. The result of the evaluation with AUEIS will consist of qualitative and quantitative data. The qualitative data that is obtained can be analyzed to get a list of which aspects of engagement are not fulfilled by the social robot. The quantitative data can provide a quick overview of which aspects have the most problems and which problems are most serious. AUEIS evaluates the conditions for engagement when interacting with a social robot and is limited to this because it evaluates whether the social robot meets those conditions for engagement. Therefore, the user experience of engagement is evaluated only in a minor way based on how much the social robot meets the conditions for engagement. Future research and development of AUEIS would have been interesting and needed for AEUIS to be able to evaluate whether the user is engaged and to what extent is. Another interesting aspect to study can be the user experience of engagement whether it is during long-term interaction, short-term interaction, or different phases of an engagement. For example, how to evaluate that the user begins engagement with a social robot and how should it be evaluated that the engagement is maintained and continues or if it interrupts and why from a user perspective?

    Chapter 5 (End result the AUEIS method) presents the method and detailed instructions on implementation are presented in Appendix 7.

    Download full text (pdf)
    fulltext
  • 21.
    Ahmed, Abukar
    University of Skövde, School of Informatics.
    Jämförelse mellan Joomla och React.js utifrån svarstid på en bokhandel webbsida2021Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [sv]

    I denna studie jämförs JavaScript-biblioteket React mot Joomla på en e-commerce webbsida. Tillämpningen på e-commerce webbsidan är bokhandel. I implementationen skapades det två webbsidor. En med React och den andra med Joomla. Webbsidan använder sig även av Bootstrap som CSS-ramverk för att få samma layout. Detta är viktigt då mätningen utförs i en kontrollerad miljö där det är viktigt att allting utgår ifrån samma förutsättningar. Mätningen sker genom ett eget skript som körs genom Tampermonkey tillägget i Chrome. Resultatet av mätningarna visas senare i grafer som indikerar att React har en mycket snabbare svarstid jämfört med Joomla-webbsidan. I framtida arbeten går det att öka antalet produkter och innehåll och göra webbsidan mer verklighetsbaserat. Det går även att byta tillämpningstema till en elektronikwebbsida där det förmodligen skulle behöva innehålla fler bilder och även videoklipp.

    Download full text (pdf)
    fulltext
  • 22.
    Ahmed, Hiwa
    University of Skövde, School of Informatics.
    Exploring individual privacy concerns in mixed reality use situations: A qualitative study2024Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    This Master’s thesis explores the nuanced dimensions of privacy concerns in mixed reality (MR) environments. As MR technologies increasingly integrate into daily life, understanding how individuals perceive and navigate privacy within these contexts becomes crucial. This qualitative study employs semi structured interviews to gather insights from users actively engaged with MR, aiming to identify key privacy issues and the impact of social interactions on privacy dynamics. The research reveals that privacy concerns in MR are influenced by a complex interplay of technology features, user interactions, and contextual settings. Participants ex pressed apprehensions about data security, unauthorized information access, and a lack of control over personal data shared within MR environments. The findings highlight the need for enhanced privacy safeguards and transparent data management practices to foster trust and security in MR applications. This study contributes to the growing discourse on privacy in immersive technologies by providing empirical evidence and proposing recommendations for designing privacy aware MR systems. It aims to inform developers and policy- makers in the development of robust privacy frameworks that align with user expectations and legal standards, thereby enhancing user engagement and trust in MR technology.

    Download full text (pdf)
    fulltext
  • 23.
    Ahmed, Hiwa
    University of Skövde, School of Informatics.
    Jämförelse mellan Cakephp och Codeigniter Ramverk med/utan Model mapping (ORM)2020Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Download full text (pdf)
    fulltext
  • 24.
    Aho Lind, Hanna
    University of Skövde, School of Informatics.
    What are the needs and use of educational games in the modern workplace?: A case study on the prospects of equality, diversity, and inclusion education in a multinational business, through the use of a serious game2021Independent thesis Advanced level (degree of Master (One Year)), 15 credits / 22,5 HE creditsStudent thesis
    Abstract [en]

    Workplace diversity is an increasingly important topic for all companies who wish to stay in business. The purpose of this master’s thesis is to evaluate the needs and usage of a serious game in the form of an educational tool when teaching employees at a multinational business about equality, diversity, and inclusion topics. The study also involves an evaluation of the development of soft skills through an artificial environment offered through a team-based game experience. This was done by conducting a quasi-quantitative with a pre-test/post-test design, inspired by the work of Parker and Du Plooy (2021). The data gathered was analysed, where the results suggested that there is a growing need for serious games as an educational tool in the modern workplace, and if executed correctly, they can be of use for training soft skills regarding equality, diversity and inclusion matters in the employees. Notable connections between earlier research and this thesis’s findings arealsopresented and analysed.

    Download full text (pdf)
    fulltext
  • 25.
    Akese, Michael
    et al.
    University of Skövde, School of Informatics.
    Hussein, Omar
    University of Skövde, School of Informatics.
    Exploring vulnerabilities and mitigation strategies among high school students: A qualitative analysis study2024Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Phishing attacks have emerged as a prominent cybersecurity threat, with one demographic particularly vulnerable being high school students, who are often active on social media yet lack adequate awareness. This study aims to deepen our understanding of phishing among high school students, pinpointing their susceptibilities, mitigation approaches, and knowledge sources. Employing qualitative research methods, semi-structured interviews were conducted with 18 participants, divided into two sample groups: those enrolled in technology programs and those in non-technology programs.

    The findings revealed that while students may not be familiar with the term "phishing," they possess a basic grasp of how such attacks manifest online, including through emails, SMS, and social media. Moreover, students expressed the need for phishing awareness to be integrated into high school curricula.

    Download full text (pdf)
    fulltext
  • 26.
    Akyol, Jonatan
    et al.
    University of Skövde, School of Informatics.
    Rosenqvist, Alva
    University of Skövde, School of Informatics.
    Förarövervakningssystems roll i att främja säker bilkörning, förbättra trafiksäkerhet och öka upplevd säkerhet: En simulatorstudie med fokus på mobildistraktioner och könsskillnader2024Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Some drivers engage in secondary activities that contribute to decreased traffic safety. User Experience can inform and help people make safer and more conscious choices in traffic. Previous research on self-reported mobile phone use shows that a ban on mobile phone use while driving has not led people to completely cease the behavior. The study investigated whether a driver monitoring system contributes to safer driving when drivers are distracted by mobile phones and whether the system affected their sense of safety. An additional question examined whether there was a difference between male and female drivers' behavior and perception of the driver monitoring system. This was investigated using an experimental mixed-method design with a simulator, surveys, and an interview. The simulator study had a between-groups design where 16 participants were divided into three groups and drove three tracks in urban and city traffic: group A was a control group without mobile or driver monitoring system, group B received distracting SMS messages, and group C received distracting SMS messages and were warned by the driver monitoring system AIS12. Participants were interviewed and filled out an evaluative survey after the simulator. Another survey was sent out online to investigate driver behavior and opinions about driver monitoring systems. Although the results from the simulator were not significant, opinions about the pros and cons of the driver monitoring system emerged from the interview participants. The simulator experiment had a small sample size, which may have contributed to the result not being significant.

    Download full text (pdf)
    fulltext
  • 27.
    Al Amin, Jasin
    University of Skövde, School of Informatics.
    An investigation on personally identifiable information leakage on five different smartphone devices: A case study2021Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    The installation of bloatwares in smartphones has over the years been increasing. By having bloatwares installed on the devices it has develop monopoly for the original equipment manufacturer, but at the same time it has create problems for consumers and privacy issue. The aim of this research was to investigate in five different original equipment manufacturers devices, on how they protect users against personally identifiable information leaking from bloatware and which personally identifiable information is collected; processed; sent by bloatware with or without any interaction. The method that was selected for this study was to do an action study, where the author experimented with five different devices (Sony, Samsung, Google Pixel, Apple, Oneplus) and different software programs. To be able to conduct the data from the devices, there was a strategy process where the approach was both dynamic analysis and static analysis. The results showed that that all devices that was part of this case study are leaking some type of personally identifiable information, due to poor security or that failed to protect against leaking personally identifiable information. Furthermore, the Android operating system that was part of this study seems to be the most optimal operating system in terms of monitoring the users. Since they were transmitting out a request every minute to the same address.

  • 28.
    Al Bakkour, Abed Al Kader
    University of Skövde, School of Informatics.
    Classification of aluminium microscopic images: Leveraging domain knowledge for feature extraction2024Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    This study seeks to gain a thorough understanding of the unique features exhibited by aluminum inclusions in microscopic images. The ultimate goal is to leverage this knowledge to create a reliable machine learning-based classification system for accurately classifying these inclusions. Through a detailed methodology encompassing domain knowledge acquisition, preprocessing, feature selection, and modelling, the research investigates the performance of various classifiers, such as Support Vector Machine (SVM), Random Forest, and k-Nearest Neighbors (KNN), as well as ensemble techniques, specifically stacking. Initial results indicate suboptimal performance of traditional classifiers without domain-driven feature extraction, with SVM achieving an accuracy of 43%, Random Forest 63%, and KNN 29%. However, significant improvement in accuracy, precision, recall, and F1-score metrics was observed after employing preprocessing steps and leveraging domain knowledge. Specifically, SVM achieved 80% accuracy, KNN 75%, and Random Forest 78% accuracy after preprocessing. Further refinement through hyperparameter tuning and cross-validation led to SVM achieving 90% accuracy, KNN 82%, and Random Forest 90%. Finally, the stacking classifier, combining predictions from diverse base models with a logistic regression meta-learner, demonstrated superior performance with an accuracy of 93.4%. These findings underscore the critical role of domain knowledge in enhancing machine learning-based classification systems for microscopic image analysis, offering valuable insights applicable beyond aluminum manufacturing.

    Download full text (pdf)
    fulltext
  • 29.
    Al Salek, Aous
    University of Skövde, School of Informatics.
    Exploring cybercrime victimization among Swedish adults: A cross-sectional study on prevalence and risk factors2024Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Cybercrime victimization is a pervasive and evolving threat in the digital age, necessitating a comprehensive understanding of its underlying dynamics and risk factors. This cross-sectional study explores the prevalence and risk factors of cybercrime victimization among Swedish adults, drawing insights from a diverse sample of 384 participants. The study examines demographic characteristics, educational backgrounds, financial circumstances, computer skills, protective measures, and victimization experiences through a combination of descriptive statistics, Fisher’s Exact Test, and logistic regression analysis. Key findings reveal significant correlations between gender, age, education level, income, computer skills, protective measures, and specific types of cybercrime victimization. Malware infection emerges as the most prevalent form of victimization, followed by sexual harassment, hacking, general harassment, and fraud. The study highlights the complex interplay between socioeconomic factors and victimization risk, and emphasizes the need for tailored interventions to enhance digital resilience and mitigate cybervictimization threats among Swedish adults. Future research directions include conducting larger-scale studies, exploring the effectiveness of protective measures, investigating polyvictimization, and examining age-related differences in cybercrime vulnerability.

    Download full text (pdf)
    fulltext
  • 30.
    Al Shakosh, Suhel
    University of Skövde, School of Informatics.
    Cybersecurity awareness among Swedish young adults in usage of public Wi-Fi networks2024Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    The widespread availability of public Wi-Fi has significantly impacted how young adults in Sweden access the Internet for various purposes, including social interactions, academic activities, and entertainment. However, this convenience comes with substantial cybersecurity risks.

    This study aims to explore and understand the awareness level among young adults regarding cybersecurity threats when utilizing public Wi-Fi and to delve into the measures and strategies employed by young adults to safeguard themselves from these identified threats. The root problem addressed in this study is the potential gap in cybersecurity awareness and protective behaviors among young adults who frequently use public Wi-Fi. Understanding this gap is crucial for developing effective educational initiatives and security practices that can mitigate the risks involved. To investigate this issue, a qualitative research method was employed, involving semi-structured interviews with ten participants, balanced in gender. The interviews aimed to gather in-depth insights into the participants' motivations for using public Wi-Fi, their awareness of cybersecurity risks, and the measures they take to protect themselves.

    Utilizing semi-structured interviews with ten participants, the study reveals a diverse range of awareness and behaviors. While some participants demonstrate a strong understanding of cyber threats and employ proactive measures such as using VPNs and antivirus software, others show only a cursory awareness and engage in risky behaviors due to a lack of knowledge or disregard for potential threats. This variation highlights a disparity in how young adults approach cybersecurity when using public Wi-Fi.

    The study underscores a need for targeted educational initiatives to enhance protective practices among this demographic, which could inform future cybersecurity policies and educational programs. By focusing on increasing cybersecurity awareness and promoting better security habits, the risks associated with public Wi-Fi usage can be better managed, thereby helping to protect the digital lives of young individuals in Sweden.

    Download full text (pdf)
    fulltext
  • 31.
    Alaaraj, Aiham
    et al.
    University of Skövde, School of Informatics.
    Yassin, Ali
    University of Skövde, School of Informatics.
    Investigating cybersecurity response strategies: Measures to responding to successful spear phishing attacks2024Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Spear phishing attacks pose an ongoing threat to organizational cybersecurity, requiring effective response measures. This study examines measures that can be implemented by Swedish organizations to respond to successful spear phishing attacks, focusing on technical solutions and cybersecurity frameworks. Through 14 semi-structured interviews with incident response teams and cybersecurity professionals, insights were gathered on the effectiveness of these measures as well as the challenges that may be faced in complying with them. The results indicate the presence of two primary response measures: technical solutions used during and after the successful attack. In addition, cybersecurity frameworks play a critical role in guiding organizations in countering successful spear phishing attacks. While the results provide valuable insight, their effectiveness varies depending on the challenges the organization may face in complying with measures. This study underscores the importance of comprehensive and effective measures to respond to successful spear phishing attacks and improve organizational resilience to evolving cyber threats.

    Download full text (pdf)
    fulltext
  • 32.
    Alenljung, Zackarias
    University of Skövde, School of Informatics.
    Användarupplevelse i förstärkt verklighet: En holistisk utvärdering av en AR prototyp för monteringsinstruktioner2020Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    The manufacturing industry is important to the societies economy and therefore needs to function as flawlessly and efficiently as possible to benefit the companies, because the manufacturing process is expensive. The most expensive part of the process is the assembly, which can cost between 25-50 % of the total manufacturing cost, and in particular manual assembly work is expensive. Assembly is carried out using assembly instructions on paper or in the computer. A new technology that has the potential to further streamline the work of assemblers which is called AR (augmented reality) is under development. There are no clear design guidelines for what works or not when developers should design instructions in AR. A further difficulty is the demands that are made when using new technology for safety-critical systems. New research in safety-critical systems shows that user experience design can help achieve a safer work environment and more efficient work. This thesis explores assembly instructions in AR through the development of a prototype, which is then evaluated with the help of assemblers, to create a better understanding of the possibilities of implementing AR-based instructions when assembling from a user experience perspective. To achieve this, an interview was conducted with an external company that previously investigated the possibilities of implementing AR in its production. Subsequently, a prototype was created that was evaluated with a user experience test in which both hedonic and pragmatic qualities were investigated. The prototype achieved three out of the nine set goals. Based on the result, five recommendations were made for how instructions should be presented in AR.

    Download full text (pdf)
    fulltext
  • 33.
    Algeborg, Andreas
    University of Skövde, School of Informatics.
    Data driven storytelling inom SME: Studie kring hur Svenska SME ligger iförhållande mot data storytelling2024Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Companies tend to work extensively with data, and SMEs constitute 99% of businesses in Europe. Utilizing data storytelling connects the entire journey from data coming in to insights being implemented. Having the right data foundation is crucial for making decisions that can lead to actionable insights. Visualization is widely used in various ways to support the insights that data should present. With a narrative component, it's possible to increase the interest of the recipients and reinforce the message around insights. Currently, there is some research on the subject, but there is a lack of engagement from SMEs to adopt the technology.

    The study has been conducted using a qualitative method in the form of semi-structured interviews with SMEs in Sweden. This interview format is used to gain a deeper understanding of how SMEs utilize the different components - data, visualization, and narrative - within data storytelling. The results of the study indicate which of the parts companies have adapted to more and less based on data storytelling.

    Download full text (pdf)
    fulltext
  • 34.
    Alid, Hani
    University of Skövde, School of Informatics.
    Experience with users about the various GDPR provisions available through the services2023Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    This thesis discusses the General Data Protection Regulation (GDPR) and its impact on individuals since the GDPR became effective in May 2018. The regulation has had significant implications for companies and organizations that handle user data as it provides fines if they are non-compliance. However, the GDPR was created to protect individuals' privacy and personal data in the European Union (EU), which has added many complexities to companies and individuals. This study aims to provide an experiment with individuals in Sweden to document their knowledge of the regulations and their ability to exercise the rights granted and to know their opinions through interviews with 19 samples of individuals. The research deals with the third chapter more than other chapters of the GDPR. The results revealed a lack of awareness among the participants, with only a small percentage having prior knowledge of the GDPR and lacking a clear understanding of the implications and practical implementation of these rights, despite the participants' enthusiasm when explaining the rights to them. Participants acknowledged the importance of their data and assessed the provisions of the GDPR. They emphasized rights such as access, rectification, and erasure as necessary to protect privacy. After obtaining nearly complete knowledge, the participants could exercise and find the GDPR rights entirely on Swedish sites, except those who were able to find the rights with only a little knowledge. The study highlights the need to enhance individuals' awareness of the GDPR and improve transparency and accessibility of privacy policies.

    Download full text (pdf)
    fulltext
  • 35.
    Alkhed, Johannes
    University of Skövde, School of Informatics.
    Nordamerikanska urfolk och stereotyper: En analys av karaktärsdesign i fyra västerländska äventyrsspel2023Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Minoriteter avbildas ofta på negativa sätt och det kan ha verkliga konsekvenser för de som identifierar sig med dessa minoritetsgrupper. Den här studien var intresserad av att se hur ursprungsamerikaner skildrades i spel i förhållande till verkliga motsvarigheter från historia. Arbetet tog sig an frågan genom en komparativ analys av kvalitativ natur för att kunna upptäcka större sociokulturella mönster. Fyra karaktärer analyserades i flera steg efter stereotyper, karaktärsdesignsprinciper och motsvarande historiska exempel. Arbetet såg ett visst samband mellan hur stereotyp en karaktär var och hur trovärdigt den gestaltade ursprungsamerikaner.

    Download full text (pdf)
    fulltext
  • 36.
    Alklind Taylor, Anna-Sofia
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    The active instructor: Benefits and barriers to instructor-led serious gaming2015In: VS-Games 2015: 7th International Conference on Games and Virtual Worlds for Serious Applications, IEEE conference proceedings, 2015, p. 8-15Conference paper (Refereed)
    Abstract [en]

    While there is a wealth of studies on the subject of serious games, the same cannot be said on the issue of teaching with games, especially in game-based learning settings with adult learners. Over the years, most research in this area has been focused on the ‘active substance(s)’ of games for learning, focusing mainly on characteristics of games, but often failing to take the whole context of game-based learning into consideration, such as the role(s) of the teacher. However, the past two or three years has seen a shift in focus from merely the game as an isolated artefact, to also include more discussions on how games can successfully be integrated into an educational setting, as well as challenges as pitfalls of which instructors need to be aware. This paper aims to outline the contemporary research on instructor-led serious gaming and its implications for the design of serious gaming environments.

    Download full text (pdf)
    fulltext
  • 37.
    Alloh, Daniel
    University of Skövde, School of Informatics.
    Förtroende inom e-handel: En checklista för utvecklingen av förtroendeingivande e-handelswebbplatser2020Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Trust in e-commerce is one of the most important factors for a business to succeed online. For successful sales between company and consumer, the website requires trust in different ways. The scientific literature that has been examined in the background chapter shows a need for categorization of aspects regarding trust in e-commerce as well as a checklist that can support the development of trustworthy e-commerce sites. To get further understanding of this area, articles that examine trust in e-commerce have been collected. The gathering of articles was done by a systematic literature study in relevant journals and databases. An analysis and summary of the aspects were made and divided into categories. The categorization of the aspects resulted in a checklist that can help a user experience designer to develop trustworthy e-commerce websites. For future studies, the checklist can either be tested by a UX designer in his work or by an empirical study to validate whether the checklist needs to be changed or expanded with more aspects.

    Download full text (pdf)
    fulltext
  • 38.
    Alndawi, Tara
    University of Skövde, School of Informatics.
    Clarifying roles and responsibilities in information security: A case study of policy implementation in high-stakes environments2024Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    In information security, the success of security policies is critically dependent on their implementation in organizations. This thesis explores the gap between formal definitions and the actual implementation of security policies, focusing on roles within a Swedish defense company. Using a qualitative research approach, this study employs semi-structured interviews to gather in-depth insights from individuals directly involved in security management, with the aim of uncovering the real-world complexities and challenges faced in policy implementation. This study identifies several core issues that affect policy implementation: ambiguity in role definitions, inconsistencies in policy communication at different organizational levels, and the frequent need for individuals to adapt policies to practical and situational needs. These factors contribute to the risk of security breaches by creating conditions in which policies are misunderstood or incorrectly applied. The findings highlight a significant discrepancy between how policies are intended to function and how they are implemented in daily operations, revealing a critical vulnerability in organizational security frameworks. This thesis contributes to the existing body of knowledge by mapping the landscape of security policy implementation within the context of the highly regulated defense industry. The results provide empirical evidence that improves the understanding of the interaction between policy, practice and the human element in security regimes with the aim of improving clarity and reducing the incidence of human error in security practices. 

    Download full text (pdf)
    fulltext
  • 39.
    Amanuel, Meron Abraham
    University of Skövde, School of Informatics.
    Hämtningstid i relationsdatabaser och dokumentdatabaser för fordonsskulder data2023Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [sv]

    Syftet med denna studie är att undersöka vilken av databaserna MySQL och MongoDB som utför hämtning av fordonsrelaterade skulder data på kortaste tiden. För att undersöka prestanda gällande hämtningstiden utvecklades en webbapplikation som visualiserar datan i form av diagram med hjälp av Javascript biblioteket Chart.js. Experimentet genomfördes fem gånger med olika mängder data och mätningspunkter för att se hur det kan påverka svarstiden hos databasen. Resultaten visade att MySQL var snabbare än MongoDB oavsett datamängden eller mätningspunkter. Framtida arbete kan bland annat hämta data slumpmässigt från databaserna och öka mängden data till en stor del samt användning av olika webbläsare för att undvika bias i studien. 

    Download full text (pdf)
    fulltext
  • 40.
    Ameel, Hans
    et al.
    Howest University of Applied Sciences, Kortrijk, Belgium.
    Decavele, Tom
    Howest University of Applied Sciences, Kortrijk, Belgium.
    Eeckhout, Claudia
    Howest University of Applied Sciences, Kortrijk, Belgium.
    van der Heide, Josha
    Windesheim University of Applied Sciences, Zwolle, The Netherlands.
    Lohner, Daniela
    St. Pölten University of Applied Sciences, St. Pölten, Austria.
    van der Ploeg, Bram
    Windesheim University of Applied Sciences, Zwolle, The Netherlands.
    Rietberg, Wim
    Windesheim University of Applied Sciences, Zwolle, The Netherlands.
    Steiner-Cardell, Andrea
    St. Pölten University of Applied Sciences, St. Pölten, Austria.
    Tjoa, Simon
    St. Pölten University of Applied Sciences, St. Pölten, Austria.
    Kochberger, Patrick
    St. Pölten University of Applied Sciences, St. Pölten, Austria.
    Kävrestad, Joakim
    University of Skövde, School of Informatics. University of Skövde, Informatics Research Environment.
    Luh, Robert
    St. Pölten University of Applied Sciences, St. Pölten, Austria.
    Experiences From a Multi-National Course in Cybersecurity Awareness Raising2023In: International Journal of Information Security and Cybercrime (IJISC), ISSN 2285-9225, Vol. 12, no 1, p. 18-22, article id 2Article in journal (Refereed)
    Abstract [en]

    The European Union (EU), as well as the entire world, is facing emerging challenges in the cybersecurity domain. Two of the most prominent challenges are citizens’ cybersecurity awareness which is the first line of defense against cybersecurity incidents, and the cybersecurity skill gap expected to lead to a future shortage of cybersecurity professionals. This paper presents an effort to combat those issues through the implementation of an intra-European course on cybersecurity awareness. The course engages university students from four EU member states who learn about increasing cybersecurity awareness while practically developing cybersecurity awareness activities for preadolescents. The paper provides an overview of the course and lessons learned from implementing it in international cooperation. The intention is to provide a guide for the development of such courses and outline success factors others can adopt and pitfalls that should be avoided.

  • 41.
    Ameri, Haydar
    University of Skövde, School of Informatics.
    Exploring information security culture within Swedish municipalities: A qualitative study2023Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    The human aspect in the context of security has been a well-debated topic over the last two decades among researchers and practitioners. It has been recognized that technology alone cannot provide full protection, but should be combined with information security culture. This thesis explored how Swedish municipalities address the cultural aspects of information security. In addition, several important aspects and challenges were identified. Interviews were conducted as a data collection method with nine respondents from nine municipalities to gather their insights and experiences on the topic. The material from the interviews was then analyzed by applying thematic analysis.

    The results of this thesis have shown that most municipalities used what was feasible from the standards for the protection of information. One challenge was finding a balance between security measures and the various operations of the various entities to avoid hindrances to service delivery. With respect to training and awareness, initiatives employed diverse approaches, in some cases customized while in others not. The follow-up on information security culture was con[1]ducted using the tool Information Security Check provided by the Swedish Civil Contingencies Agency, along with measurements of security awareness through questionnaires, in some cases customized while in others not.

    Involving top management included diverse activities with support taking various forms beyond financial and human resources. However, the degree of follow-up, top management involvement, and support exhibited variations and in some cases were lacking. One notable discovery was the importance of educating not only the network of champions but also managers in information security, fostering a symbiotic relationship between the two. With respect to the lacking aspects, another finding was the importance of leadership and management knowledge/skills, not only essential for people in the security domain but also for other managerial roles in maintaining a positive information security culture.

    Download full text (pdf)
    fulltext
  • 42.
    Andemariam, Mikias
    University of Skövde, School of Informatics.
    Self-service business intelligence: Hur kan användarrelaterade utmaningar hanteras vid implementering av SSBI2022Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [sv]

    Self-Service Business Intelligence är en business intelligence-trend som uppstått som ett resultat av företagens växande oro för icke-tekniska användare som kräver mer och mer information från tekniska användare för att kunna fatta rätt beslut. SSBI fokuserar på att göra beslutsfattare mer självständiga genom att låta dem delta i data och analysera data utan hjälp av en IT-avdelning för att kunna fatta bästa möjliga beslut. Organisationer lyckas inte alltid med att implementera SSBI. De möter en mängd olika användarrelaterade utmaningar vid implementering av SSBI. Om dessa svårigheter inte åtgärdas på lämpligt sätt kan dåliga beslut fattas. De användarrelaterade utmaningarna som ofta följer på antagandet av SSBI har undersökts i denna forskning, såväl som hur dessa utmaningar kan lösas. För att hantera dessa utmaningar uppstod följande frågeställning,

    “Hur kan användarrelaterade utmaningar hanteras vid implementering av SSBI?”

    För att ytterligare förstå hur utmaningarna kan hanteras effektivt hölls fem intervjuer på olika företag med respondenter som har en bra förståelse för ämnet och relation till införandet av SSBI. Rapportens slutsats är att många av dessa utmaningar hänger ihop, men att var och en måste hanteras korrekt för att en organisation ska blomstra i SSBI implementation. Studiens resultat inkluderar en modell av användarrelaterade utmaningar vid implementering av SSBI, samt rekommendationer för hur de kan åtgärdas. Företager kan skapa perfekta situationer för konsumenter genom att dra fördel av dessa problem när de etablerar SSBI, vilket ökar chanserna att implementera en effektiv och hållbar SSBI.

  • 43.
    Andersson, Anton
    et al.
    University of Skövde, School of Informatics.
    Carlsson, Joel
    University of Skövde, School of Informatics.
    Navier-Stokes-baserad eld i Unity: Prestanda hos tvådimensionell eldsimulering i Unity2024Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    I det här arbetet undersöks prestandapåverkan från en tvådimensionell Eulersk eldsimulering i screen-space i spelmotorn Unity. I simuleringen imiteras rörelser i den tredje dimensionen genom en uppskalning av tryckgradienten. Därefter utvärderas den prestandamässiga lämpligheten för metoden vid eventuell användning i datorspel. En artefakt utvecklades för att kunna utforma ett experiment där genomsnittlig beräkningstid för simulering av en bildruta mäts på GPU:n.

    Studien visar att det finns en avsevärd negativ prestandapåverkan, men att denna påverkas till stor del av simuleringens upplösning samt antal iterationer i ett av simuleringsstegen, och slutsatsen dras att metoden i många fall kan vara lämplig för användning i datorspel beroende på dessa faktorer.

    Vidare forskning föreslås där undersökningar görs på de visuella och estetiska implikationerna av metoden där fokus ligger på att redogöra för visuella artefakter beroende på kontexten för eldsimuleringen.

    Download full text (pdf)
    fulltext
  • 44.
    Andersson, David
    University of Skövde, School of Informatics.
    En studie om kritiska faktorer vid implementering av E-förvaltning inom skolan.: En internanvändares perspektiv.2019Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    In recent years, many of the services run by governments around the world have begun to become more and more digitilized. This means that many processes that required manual / physical handling have become possible to do in the comfort of your home without having to face the company/organization directly. Many of these services include healthcare, the tax office and the school. These systems aim to serve the residents, but also to streamline the work for the internal users within the municipality or government.

    During these developments and implementation processes, there are usually factors that developers or organizations should try to achieve if the system or service being developed is to succeed. There are many of these factors that have been documented in previous studies. Napitupulu (2014) is one of these researchers who collected and documented these factors. Examples of these factors are Training, top managers support, User participation and strong leadership.

    These factors, however, have never been centered on the internal end-users of these systems and it has often not been emphasized in previous research on factors for e-government about which of these factors have the most significant impact if these were to be achieved.

    This study therefore focused on finding the most important factors when implementing internal end users. The work has focused on interviewing internal users of E-administration whom have been implemented in schools around the local municipality of Skövde and other neighboring municipalities. Where they recently had a new E-administration system implemented. The responses will then be compared to previous focuses that have been found to see which of these factors are most important when a system is to be implemented. The results that come from this study hope that municipalities and companies can learn which areas should be focused on when implementing new systems in the school. The study also hopes to provide a good basis for future research to continue on the future. This study was conducted at a municipal level, but more data and factors can be assured if this study is done at national level.

    Keywords: eGovernment, Factors, Implementation

    Download full text (pdf)
    fulltext
  • 45.
    Andersson, Emma
    University of Skövde, School of Informatics.
    Sociotekniska utmaningar och möjligheter med att implementera elektroniska patientjournaler i Bosnien & Hercegovina2023Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    The implementation of E-health innovations varies between countries. An E-health innovation that has had a big impact on healthcare is the electronic patient medical record. Electronic patient medical records contribute to better communication between caregivers and to a better operation by providing caregivers the right information at the right time. The European Commission writes that digital solutions in healthcare can improve the overall health for European citizens. E-health innovations and the access to Electronic Patient Medical Records differs in Europe. While some countries have fully developed Electronic Patient Medical Records, some have not even started. Bosnia & Herzegovina is striving for EU-membership and is yet under implementation of Electronic patient medical records. The aim of this study is to improve the understanding of what socio-technical challenges and opportunities Bosnia and Herzegovina is facing when implementing electronic patient medical records.

    The method used to answer the research question is a qualitative method using a purposeful sampling by interviewing healthcare professionals in Bosnia & Herzegovina. Six semi-structured interviews were carried out with the help of a translator. The data was analyzed using an inductive content analysis enabling to distinguish challenges and possibilities with the implementation of electronic patient medical records at the hospital in Bosnia and Herzegovina.

    The result of the study indicates that Bosnia & Herzegovina are facing challenges such as lack of IT-skills, troubles with accessing the electronic patient medical records during power outs or system crashes and the system not fully supporting the way the doctors want to document. The opportunities listed are a better ability to provide patients with quality care, a greater access to information and the possibility to further implement E-health innovations.

    Download full text (pdf)
    fulltext
  • 46.
    Andersson, Filip
    University of Skövde, School of Informatics.
    Cloud-native storage solutions for Kubernetes: A performance comparison2023Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Kubernetes is a container orchestration system that has been rising in popularity in recent years. The modular nature of Kubernetes allows the usage of different storage solutions, and for cloud environments, cloud-native distributed storage solutions maybe attractive due to their redundant nature. There are many tools for cloud-native distributed storage available on the market today with differing features and performance. Choosing the correct one for an organisation can be difficult.

    Organisations utilising Kubernetes in cloud environments would like to be as performance efficient as possible to save on costs and resources. This study aims to offer a benchmark and analysis for some of the most popular tools, to help organisations choose the ‘best’ solution for their operational needs, from a performance perspective.

    The benchmarks compare three cloud-native distributed storage solutions, OpenEBS, Portworx, and Rook-Ceph on both Amazon Elastic Kubernetes Service (EKS) and Azure Kubernetes Service (AKS). For a baseline comparison, the study will also benchmark the cloud providers own solutions; Azure Disk Storage, and Amazon Elastic Block Storage. The study compares these solutions from three key metrics; bandwidth, latency, and IOPS, in both read and write performance.

    Download full text (pdf)
    fulltext
    Download (zip)
    programvara
    Download (zip)
    programvara
  • 47.
    Andersson, Filip
    University of Skövde, School of Informatics.
    Implementation challenges in cloud services certification: ENISA cloud services scheme2024Independent thesis Advanced level (degree of Master (Two Years)), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    While still being a relatively new are in the field of information security, cloud computing has steadily increased its relevancy over the last 20 years. Cloud computing proposes unique information security requirements and a variety of frameworks have been developed to mitigate risks. Under the Cybersecurity Act, The European Union Agency for Cybersecurity has been set out to create the Cloud Services Scheme targeting cloud service providers certification in information security. 

    The research uses a qualitative content analysis method with six semi-structured interviews for data collection. The study explores implementation challenges against the Cloud Services Scheme, by investigating a supply chain for one established cloud service provider operating in Sweden. The study highlights the perceived the respondents perceived challenges in implementing information security within cloud computing, and relates it to the Cloud Services Scheme. 

    The results suggest that cloud service providers find it challenging to determine what an appropriate level information security implementation. Additionally the cloud service provider do not have full insight on what type of data is handled on their infrastructure, which makes a risk assessment more difficult. Furthermore the proposed Cloud Services Scheme work has three assurance levels, chosen based on a risk assessment. The findings suggest it would be difficult for an organisation to choose which level is appropriate to adhere and certify itself against. 

    The study highlights a lack in formalized risk assessment for cloud computing, and suggests a need for further research. Additionally the findings suggest a need for further cloud compliance challenges research.  

    Download full text (pdf)
    fulltext
  • 48.
    Andersson, Martin
    University of Skövde, School of Engineering Science. University of Skövde, The Virtual Systems Research Centre.
    A bilevel approach to parameter tuning of optimization algorithms using evolutionary computing: Understanding optimization algorithms through optimization2018Doctoral thesis, comprehensive summary (Other academic)
    Abstract [en]

    Most optimization problems found in the real world cannot be solved using analytical methods. For these types of difficult optimization problems, an alternative approach is needed. Metaheuristics are a category of optimization algorithms that do not guarantee that an optimal solution will be found, but instead search for the best solutions using some general heuristics. Metaheuristics have been shown to be effective at finding “good-enough” solutions to a wide variety of difficult problems. Most metaheuristics involve control parameters that can be used to modify how the heuristics perform its search. This is necessary because different problems may require different search strategies to be solved effectively. The control parameters allow for the optimization algorithm to be adapted to the problem at hand. It is, however, difficult to predict what the optimal control parameters are for any given problem. The problem of finding these optimal control parameter values is known as parameter tuning and is the main topic of this thesis. This thesis uses a bilevel optimization approach to solve parameter tuning problems. In this approach, the parameter tuning problem itself is formulated as an optimization problem and solved with an optimization algorithm. The parameter tuning problem formulated as a bilevel optimization problem is challenging because of nonlinear objective functions, interacting variables, multiple local optima, and noise. However, it is in precisely this kind of difficult optimization problem that evolutionary algorithms, which are a subclass of metaheuristics, have been shown to be effective. That is the motivation for using evolutionary algorithms for the upper-level optimization (i.e. tuning algorithm) of the bilevel optimization approach. Solving the parameter tuning problem using a bilevel optimization approach is also computationally expensive, since a complete optimization run has to be completed for every evaluation of a set of control parameter values. It is therefore important that the tuning algorithm be as efficient as possible, so that the parameter tuning problem can be solved to a satisfactory level with relatively few evaluations. Even so, bilevel optimization experiments can take a long time to run on a single computer. There is, however, considerable parallelization potential in the bilevel optimization approach, since many of the optimizations are independent of one another. This thesis has three primary aims: first, to present a bilevel optimization framework and software architecture for parallel parameter tuning; second, to use this framework and software architecture to evaluate and configure evolutionary algorithms as tuners and compare them with other parameter tuning methods; and, finally, to use parameter tuning experiments to gain new insights into and understanding of how optimization algorithms work and how they can used be to their maximum potential. The proposed framework and software architecture have been implemented and deployed in more than one hundred computers running many thousands of parameter tuning experiments for many millions of optimizations. This illustrates that this design and implementation approach can handle large parameter tuning experiments. Two types of evolutionary algorithms, i.e. differential evolution (DE) and a genetic algorithm (GA), have been evaluated as tuners against the parameter tuning algorithm irace. The as pects of algorithm configuration and noise handling for DE and the GA as related to the parameter tuning problem were also investigated. The results indicate that dynamic resampling strategies outperform static resampling strategies. It was also shown that the GA needs an explicit exploration and exploitation strategy in order not become stuck in local optima. The comparison with irace shows that both DE and the GA can significantly outperform it in a variety of different tuning problems.

  • 49.
    Andersson, Towe
    University of Skövde, School of Informatics.
    Menydesign för mobila handelswebbplatser: En jämförande studie av två hierarkiska menystrukturer2021Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [sv]

    Denna studie jämför två olika menytyper samt deras position på mobila pekskärmar. I en problemformulering lyfts problem med bristande navigering samt element som är utanför tummens räckvidd på skärmen upp. Ett experiment genomfördes där 41 anonyma personer deltog. I experimentet ingick fyra stycken test för två versioner av de båda menyerna. Deltagarnas uppgift var att navigera till fyra förbestämda produkter (en produkt per meny/test). Tiden för deltagarna att nå rättprodukt i menyn mättes. De två menyerna hade samma innehåll men skiljde sig frånvarandra i och med att den ena visade den hierarkiska strukturen och den andra visade inte den hierarkiska strukturen. Resultatet visade att menytypen där den hierarkiska strukturen inte var synlig hade bäst svarstid. Slutsatsen som drogs var att hypotesen inte kunde bevisas. I det sista kapitlet diskuteras potentiella framtida arbeten där det bland annat talas om att skapa fler webbstandarder för menyer.

    Download full text (pdf)
    fulltext
  • 50.
    Andersson, Ulf
    et al.
    School of Business, Economics and IT, University West, Trollhättan, Sweden.
    Arvemo, Tobias
    School of Business, Economics and IT, University West, Trollhättan, Sweden.
    Gellerstedt, Martin
    School of Business, Economics and IT, University West, Trollhättan, Sweden.
    Can Measurements of Online Behavior Predict Course Performance?2016In: Proceedings of the 7th International Multi-Conference on Complexity, Informatics and Cybernetics: IMCIC 2016 and the 7th International Multi-Conference onSociety and Information Technologies: ICSIT 2016: Volume II (Post-Conference Edition) / [ed] M Savoie; N C Callaos; B Sanchez; A Tremante; J Horne, International Institute of Informatics and Systemics, 2016, p. 4-9Conference paper (Refereed)
    Abstract [en]

    This article is a pilot study on the relationship between performance in online classes and behavior in online discussion forums. Measuring student activity on the discussion forum, the collected data is then analyzed and mapped to the performance of the students on the course. The student activity was dividedinto a number of parameters, and during the study these parameters were compared to the performance of the students.The significance of each parameter was also analyzed through a Kruskall-Wallis-test Overall there was a strong tendency thatstudents with more activity and engagement received higher grades. This is in the future useful for developing some kind of monitoring to identify and support students on the verge of failing the course.

1234567 1 - 50 of 598
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • apa-cv
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf