Essays about: "Data security"
Showing result 11 - 15 of 1808 essays containing the words Data security.
-
11. Groundwater Modelling in southeast Cambodia - Facing irrigation and groundwater level changes during a pandemic
University essay from Lunds universitet/Avdelningen för Teknisk vattenresursläraAbstract : In the Mekong region, sustainable water resource management is a significant challenge for all countries involved. In Cambodia, where rice production is crucial for household food security and export, groundwater is increasingly used for irrigation during the dry season, leading to higher rice yields. READ MORE
-
12. Classifying femur fractures using federated learning
University essay from Linköpings universitet/Statistik och maskininlärningAbstract : The rarity and subtle radiographic features of atypical femoral fractures (AFF) make it difficult to distinguish radiologically from normal femoral fractures (NFF). Compared with NFF, AFF has subtle radiological features and is associated with the long-term use of bisphosphonates for the treatment of osteoporosis. READ MORE
-
13. Linking for Peace. An affordance perspective of LinkedIn as an instrument for peace professionals to advance constructive conflict resolution and transformative efforts
University essay from Institutionen för tillämpad informationsteknologiAbstract : Has LinkedIn become the platform for a global community of practice for peace professionals? Does it have the potential to be? An inductive approach to Reflexive Thematic Analysis (RTA) following Braun and Clarke’s six-phase methodology was used as an analytic instrument on empirical data from 13 semi-structured interviews with professionals in peace mediation, using the theoretical lens of affordances. The participants in the study were found to use LinkedIn to create and sustain meaningful connections globally and across sectors, learn from empirical knowledge, stories and insights from others and explore economic opportunities. READ MORE
-
14. Ensuring the Security of PyPI Packages
University essay from Göteborgs universitet/Institutionen för data- och informationsteknikAbstract : Developers often use open-source code libraries in order to achieve desired functionalities without needing to re-implement existing code. Python developers are no exceptions here, and frequently use the Python Package Index, PyPI, to download the specific code packages they want to use. READ MORE
-
15. A Case Study: Human Rights Violations in Gaza: A qualitative analysis of the UN’s responsibility under the principle of R2P to combat the violations of articles 3 & 13 of the UDHR in Gaza
University essay from Göteborgs universitet/Institutionen för globala studierAbstract : This case study examines how the United Nations (UN) is responsible, in accordance with the concept of the Responsibility To Protect (R2P), for combating the violations of articles 3 and 13 of the Universal Declaration of Human Rights (UDHR) in Gaza. These articles entail the right to life, liberty and security of person (article 3) and the right to freedom of movement and residence (article 13). READ MORE