Essays about: "protection and security"

Showing result 1 - 5 of 422 essays containing the words protection and security.

  1. 1. "The Competition of Values in the European Arrest Warrant Tracing the Conflict and Prioritization Between Collective Security and Individual Justice Within Case Law of the CJEU"

    University essay from Göteborgs universitet/Juridiska institutionen

    Author : Nadja Nordlund; [2024-02-16]
    Keywords : European Arrest Warrant; Mutual Recognition; Effective Law Enforcement; International Cooperation; Procedural Justice; Rule of Law; Right to a Fair Trial; Proportionality;

    Abstract : The European Arrest Warrant system is built on balancing between individual justice, which safeguards the right to a fair trial of subjects to extradition, and collective security, which seeks to ensure public safety and effective law enforcement. This thesis provides for an analysis of this balance and its evolution, exploring how the prioritization of individual justice and collective security, as manifested in the EAW, have shifted through the evolutive interpretation of the Court of Justice of the European Union. READ MORE

  2. 2. A Comparative Analysis of SecurityServices Using Identity and AccessManagement (IAM)

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Nithya Sree Muddychetty; [2024]
    Keywords : Access Control Lists; Identity Access Management; Multi-Factor Authentication; One time password; Single sign on; System Usability Scale; Virtual private network;

    Abstract : Background: Identity and Access Management (IAM) is a critical IT securityframework for managing digital identities and resource access. With roots datingback to ancient civilizations, IAM has evolved from basic authentication to sophisticated methods. READ MORE

  3. 3. IT security expert’s perceptions of cybersecurity when working remotely compared to working in the office : A quality study on Swedish insurance companies

    University essay from Uppsala universitet/Informationssystem

    Author : Kristoffer Kullander; Mathilda Cselenyi; [2024]
    Keywords : Cyber security; cyber threats; cybersecurity awareness; remote work; Protection Motivation Theory; Cybersäkerhet; cyberhot; säkerhetsmedvetenhet; distansarbete; Protection Motivation Theory;

    Abstract : Teleworking has become a significant aspect of working life, especially after the outbreak of the COVID-19 pandemic, which accelerated the trend of teleworking. However, this shift has increased the risk of cyber threats and security risks. READ MORE

  4. 4. The swing of the pendulum: Sweden's pivot to NATO : A case of small states' shift in security policy

    University essay from Försvarshögskolan

    Author : Irena Bonnier; [2024]
    Keywords : Security and defence policy; Sweden; NATO; Small states studies; Deterrence; Shelter theory s political military dimension; Realism; Foreign Policy Change; Domestic determinants of small states security policy; Process-tracing; Säkerhets- och försvarspolitik; Sverige; NATO; Småstatsteori; Avskräckning; Vindskyddsteorins politiska militära dimension; Realism; Utrikespolitisk förändring; Inhemska påverkansfaktorer på småstaters säkerhetspolitik; Processpårning;

    Abstract : Sweden is the only state in the Baltic Sea region currently not under NATO protection, which puts the state in a particularly vulnerable position. On 18 May 2022, Sweden officially deemed NATO alignment a more effective option of security strategy in projecting deterrence and dealing with the security challenges the state is facing, compared to a strategy of non-alignment which has been Sweden’s security posture for over 200 years. READ MORE

  5. 5. GDPR Compliance in EU-US Data Transfers - Examining the impact of the EU Commission’s 2023 adequacy decision on surveillance risks

    University essay from Lunds universitet/Institutionen för handelsrätt

    Author : Linda Kidwell; [2024]
    Keywords : General Data Protection Regulation; Adequacy Decision; EU Commission; Surveillance law; Third country data transfers; US intelligence agencies; Law and Political Science;

    Abstract : International data transfers serve to support the global economy, facilitating international collaboration and economic expansion. However this increased productivity comes at a cost, namely amplified personal data privacy and security risks. READ MORE