35 resultados para log server normativa garante privacy


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis introduces heat demand forecasting models which are generated by using data mining algorithms. The forecast spans one full day and this forecast can be used in regulating heat consumption of buildings. For training the data mining models, two years of heat consumption data from a case building and weather measurement data from Finnish Meteorological Institute are used. The thesis utilizes Microsoft SQL Server Analysis Services data mining tools in generating the data mining models and CRISP-DM process framework to implement the research. Results show that the built models can predict heat demand at best with mean average percentage errors of 3.8% for 24-h profile and 5.9% for full day. A deployment model for integrating the generated data mining models into an existing building energy management system is also discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This document is focused on studying privacy perception and personality traits of users in the context of smartphone application privacy. It is divided into two parts. The first part presents an in depth systematic literature review of the existing academic writings available on the topic of relation between privacy perception and personality traits. Demographics, methodologies and other useful insight is extracted and the available literature is divided into broader group of topics bringing the five main areas of research to light and highlighting the current research trends in the field along with pinpointing the research gap of interest to the author. The second part of the thesis uses the results from the literature review to administer an empirical study to investigate the current privacy perception of users and the correlation between personality traits and privacy perception in smartphone applications. Big five personality test is used as the measure for personality traits whereas three sub-variables are used to measure privacy perception i.e. perceived privacy awareness, perceived threat to privacy and willingness to trade privacy. According to the study openness to experience is the most dominant trait having a strong correlation with two privacy sub-variables whereas emotional stability doesn’t show any correlation with privacy perception. Empirical study also explores other findings as preferred privacy sources and application installation preferences that provide further insight about users and might be useful in future.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Modern automobiles are no longer just mechanical tools. The electronics and computing services they are shipping with are making them not less than a computer. They are massive kinetic devices with sophisticated computing power. Most of the modern vehicles are made with the added connectivity in mind which may be vulnerable to outside attack. Researchers have shown that it is possible to infiltrate into a vehicle’s internal system remotely and control the physical entities such as steering and brakes. It is quite possible to experience such attacks on a moving vehicle and unable to use the controls. These massive connected computers can be life threatening as they are related to everyday lifestyle. First part of this research studied the attack surfaces in the automotive cybersecurity domain. It also illustrated the attack methods and capabilities of the damages. Online survey has been deployed as data collection tool to learn about the consumers’ usage of such vulnerable automotive services. The second part of the research portrayed the consumers’ privacy in automotive world. It has been found that almost hundred percent of modern vehicles has the capabilities to send vehicle diagnostic data as well as user generated data to their manufacturers, and almost thirty five percent automotive companies are collecting them already. Internet privacy has been studies before in many related domain but no privacy scale were matched for automotive consumers. It created the research gap and motivation for this thesis. A study has been performed to use well established consumers privacy scale – IUIPC to match with the automotive consumers’ privacy situation. Hypotheses were developed based on the IUIPC model for internet consumers’ privacy and they were studied by the finding from the data collection methods. Based on the key findings of the research, all the hypotheses were accepted and hence it is found that automotive consumers’ privacy did follow the IUIPC model under certain conditions. It is also found that a majority of automotive consumers use the services and devices that are vulnerable and prone to cyber-attacks. It is also established that there is a market for automotive cybersecurity services and consumers are willing to pay certain fees to avail that.