3 resultados para Key privacy

em Doria (National Library of Finland DSpace Services) - National Library of Finland, Finland


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Modern automobiles are no longer just mechanical tools. The electronics and computing services they are shipping with are making them not less than a computer. They are massive kinetic devices with sophisticated computing power. Most of the modern vehicles are made with the added connectivity in mind which may be vulnerable to outside attack. Researchers have shown that it is possible to infiltrate into a vehicle’s internal system remotely and control the physical entities such as steering and brakes. It is quite possible to experience such attacks on a moving vehicle and unable to use the controls. These massive connected computers can be life threatening as they are related to everyday lifestyle. First part of this research studied the attack surfaces in the automotive cybersecurity domain. It also illustrated the attack methods and capabilities of the damages. Online survey has been deployed as data collection tool to learn about the consumers’ usage of such vulnerable automotive services. The second part of the research portrayed the consumers’ privacy in automotive world. It has been found that almost hundred percent of modern vehicles has the capabilities to send vehicle diagnostic data as well as user generated data to their manufacturers, and almost thirty five percent automotive companies are collecting them already. Internet privacy has been studies before in many related domain but no privacy scale were matched for automotive consumers. It created the research gap and motivation for this thesis. A study has been performed to use well established consumers privacy scale – IUIPC to match with the automotive consumers’ privacy situation. Hypotheses were developed based on the IUIPC model for internet consumers’ privacy and they were studied by the finding from the data collection methods. Based on the key findings of the research, all the hypotheses were accepted and hence it is found that automotive consumers’ privacy did follow the IUIPC model under certain conditions. It is also found that a majority of automotive consumers use the services and devices that are vulnerable and prone to cyber-attacks. It is also established that there is a market for automotive cybersecurity services and consumers are willing to pay certain fees to avail that.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Tutkimuksen tarkoituksena oli tunnistaa nykyiset sekä potentiaaliset avainasiakkaat case yritykselle. Avainasiakkaat tunnistettiin Chevertonin tunnistamis- ja valintamatriisin avulla, jossa asiakkaan sijoittumista matriisiin arvioidaan asiakkaan houkuttelevuuden sekä toimittajan suhteellisten vahvuuksien avulla. Kriteereiksi avainasiakkaiden tunnistamiseen valittiin asiakkaan vuotuinen ostovolyymi, asiakkaan business-potentiaali sekä case-yrityksen toimittajaosuus. Asiakkaat luokiteltiin avainasiakkaisiin, kehitettäviin avainasiakkaisiin, ylläpidettäviin asiakkaisiin sekä satunnaisiin asiakkaisiin. Tutkimus tarjosi lähtökohdan case-yrityksen uusille avainasiakaspäälliköille sekä osoitti suunnan tulevaisuuden tutkimustarpeille. Aktiivisen tiedonvaihdannan kautta eri myyntikonttoreiden johtohenkilöstön sekä myös yrityksen eri funktionaalisten divisioonien välillä voidaan saavuttaa kilpailuetua kun lähestytään asiakasta toimintojaan järkiperäisesti koordinoineena toimittajana samalla kun asiakkaat keskittävät ostojaan. Jotta yrityksen tavoitteet, markkinamahdollisuudet sekä resurssit olisivat hyvin tasapainossa, tulisi myös asiakaskannattavuutta sekä asiakkaiden strategista merkittävyyttä arvioida ja mitata säännöllisesti tässä tutkimuksessa käytettyjen tunnistuskriteereiden lisäksi.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Data management consists of collecting, storing, and processing the data into the format which provides value-adding information for decision-making process. The development of data management has enabled of designing increasingly effective database management systems to support business needs. Therefore as well as advanced systems are designed for reporting purposes, also operational systems allow reporting and data analyzing. The used research method in the theory part is qualitative research and the research type in the empirical part is case study. Objective of this paper is to examine database management system requirements from reporting managements and data managements perspectives. In the theory part these requirements are identified and the appropriateness of the relational data model is evaluated. In addition key performance indicators applied to the operational monitoring of production are studied. The study has revealed that the appropriate operational key performance indicators of production takes into account time, quality, flexibility and cost aspects. Especially manufacturing efficiency has been highlighted. In this paper, reporting management is defined as a continuous monitoring of given performance measures. According to the literature review, the data management tool should cover performance, usability, reliability, scalability, and data privacy aspects in order to fulfill reporting managements demands. A framework is created for the system development phase based on requirements, and is used in the empirical part of the thesis where such a system is designed and created for reporting management purposes for a company which operates in the manufacturing industry. Relational data modeling and database architectures are utilized when the system is built for relational database platform.