Essays about: "Meta organizations"

Showing result 1 - 5 of 26 essays containing the words Meta organizations.

  1. 1. The Overlooked Puppeteer - A case study on how LALIGA controls and manages its member clubs' institutional logics through alterations of their performance measurement systems

    University essay from Handelshögskolan i Stockholm/Institutionen för redovisning och finansiering

    Author : Peter Hamra; Lucas Halef; [2024]
    Keywords : Performance measurement system; Meta-organization; Hybrid organization; Institutional complexity; Collective objective;

    Abstract : This thesis explores the influence of LALIGA, a renowned football league operating as a meta-organization, on the operational priorities of its member clubs. More specifically, it examines the impact on performance measurement systems and outlines the challenges and tensions arising from the complex meta-organizational structure. READ MORE

  2. 2. Judgment and Data-Driven Decision Making : A scoping meta-review and bibliometric analysis of the implementations of data-driven approaches to judgment and decision making and across other fields of research

    University essay from Linnéuniversitetet/Institutionen för psykologi (PSY)

    Author : Natalie Hyltse; [2023]
    Keywords : scoping review; meta-review; bibliometrics; interdisciplinary research; judgment and decision making JDM ; data-driven decision making DDDM ;

    Abstract : Data-driven approaches to decision making are today applied far and wide. With origins in the field of judgment and decision making (JDM), data-driven decision making (DDDM) has become an emergent topic within I-O psychology, especially within the fields of people analytics and human resource analytics. READ MORE

  3. 3. WebLang: A Prototype Modelling Language for Web Applications : A Meta Attack Language based Domain Specific Language for web applications

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Mille af Rolén; Niloofar Rahmani; [2023]
    Keywords : Meta Attack Language; Domain Specific Language; OWASP; Attack Simulations; Cyber Attacks; Threat Modelling; OWASP Juice Shop; Broken Access Control; Meta Attack Language; Domän Specifikt Språk; OWASP; Attack Simuleringar; Cyber Attacker; Hotmodellering; OWASP Juice Shop; Broken Access Control;

    Abstract : This project explores how a Meta Attack Language based Domain Specific Language for web applications can be used to threat model web applications in order to evaluate and improve web application security. Organizations and individuals are targeted by cyberattacks every day where malicious actors could gain access to sensitive information. READ MORE

  4. 4. StrideLang : Creation of a Domain-Specific Threat Modeling Language using STRIDE, DREAD and MAL

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Lazar Cerovic; [2022]
    Keywords : Meta attack language; Domain specific language; Attack graphs; Threat modeling; STRIDE; DREAD; Attack simulation; Cyber defence; Meta attack language; Domänspecifika språk; Attack grafer; Hotmodellering; STRIDE; DREAD; Attack simulering; Cyberförsvar;

    Abstract : Cybersecurity is still one of the main challenges of the digital era for organizations and individuals alike. Threat modeling is an important tool for building systems that are reliable and secure. The research question for this study is to create a domain specific language (DSL) with the Meta Attack Language (MAL), STRIDE and DREAD. READ MORE

  5. 5. Cyber resilience for critical infrastructure : A systematic review

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Vahid Naserinia; [2021]
    Keywords : Cyber resilience; critical infrastructures; systematic review;

    Abstract : Critical infrastructure is a term to define the network of crucial assets for the functioning of a society and modern economies. The complexity of critical infrastructures and the ability to connect smart devices to these networks make them more vulnerable to cyberattacks. READ MORE