Essays about: "right to confidentiality"
Showing result 1 - 5 of 11 essays containing the words right to confidentiality.
-
1. The Challenges in Leveraging Cyber Threat Intelligence
University essay from Högskolan i HalmstadAbstract : Today cyber attacks, incidents, threats, and breaches continue to rise in scale and numbers, as sophisticated attackers continuously break through conventional safeguards each day. Whether strategic, operational, or tactical, threat intelligence can be defined as aggregated information and analytics that feed the different pillars of any given company’s cybersecurity infrastructure. READ MORE
-
2. Voices of Female Youths Living with HIV/AIDS on their Experiences regarding access and Utilisation of Contraceptives: A case of Kawempe Division Kampala City, Uganda.
University essay from Göteborgs universitet/Institutionen för socialt arbeteAbstract : This study aimed at documenting experiences of FYLWHA regarding their access and utilisation of contraceptives with reference to Kawempe division of Kampala city-Uganda. Basically the study was guided by three objectives i.e. READ MORE
-
3. Access control regulation in the health care sector
University essay from Stockholms universitet/Juridiska institutionenAbstract : This thesis is about access control in the health care sector. Access control is a function in It-systems that allows authorized users to access data they have right to access, prevents unauthorized users from accessing data and prevents authorized users from disclosing data unlawfully. READ MORE
-
4. The Evolution of Transparency in Investment Treaty: Is Confidentiality Death? : An ICSID Perspective
University essay from Uppsala universitet/Juridiska institutionenAbstract : The International Centre for Settlement of Investment Disputes (ICSID), has seen an increased transparency in the past couple of decades. The participation of third parties in the proceedings and the disclosure of documents or information regarding the arbitrations are some of the most important and controversial issues regarding transparency nowadays. READ MORE
-
5. Implementation and Benchmarking of a Crypto Processor for a NB-IoT SoC Platform
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : The goal of this Master’s Thesis is to investigate the implementation of cryptographic algorithms for IoT and how these encryption systems can be integrated in a NarrowBand IoT platform. Following 3rd Generation Partnership Project (3GPP) specifications, the Evolved Packet System (EPS) Encryption Algorithms (EEA) and EPS Integrity Algorithms (EIA) have been implemented and tested. READ MORE