Essays about: "thesis data security"
Showing result 1 - 5 of 914 essays containing the words thesis data security.
-
1. Israel, Russia and the US: A Strange Triangular Relationship : An analysis of an unexpected alliance and its rationality
University essay from Linnéuniversitetet/Institutionen för samhällsstudier (SS)Abstract : The relationship between Israel and the US, as well as Israel and Russia are well documented, as it serves as a key aspect within the struggle for power and influence within the Middle East. However much research has been made on the topic, few have analysed how the relationship between Israel and the two others have affected the three, creating what could only be viewed as a blindspot within scholarship on the topic, as the relationships did not start in, nor are maintained within a vacuum. READ MORE
-
2. A Comparative Analysis of SecurityServices Using Identity and AccessManagement (IAM)
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background: Identity and Access Management (IAM) is a critical IT securityframework for managing digital identities and resource access. With roots datingback to ancient civilizations, IAM has evolved from basic authentication to sophisticated methods. READ MORE
-
3. Energy efficiency and fiscal incentives : A stochastic frontier analysis of Swedish manufacturing sectors 2008-2020
University essay from Umeå universitet/NationalekonomiAbstract : This thesis is a case study of the Swedish manufacturing industry in which I measure how efficiently each sector uses energy (fuel and electricity) as input goods in their production processes, and how significant the impact of Sweden’s energy tax is in regard to energy efficiency. The purpose of this is to analyze energy security and preparedness for short-term demand shocks for electricity, as many ‘mega-investments’ of industrial nature are being planned in Sweden – which are predicted to require the installed capacity of Sweden’s electricity production to almost double by 2045. READ MORE
-
4. Exploring the Dynamics of Software Bill of Materials (SBOMs) and Security Integration in Open Source Projects
University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknikAbstract : Background.The rapid expansion of open-source software has introduced significant security challenges, particularly concerning supply chain attacks. Software supply chain attacks, such as the NotPetya attack, have underscored the critical need for robust security measures. READ MORE
-
5. Linking for Peace. An affordance perspective of LinkedIn as an instrument for peace professionals to advance constructive conflict resolution and transformative efforts
University essay from Institutionen för tillämpad informationsteknologiAbstract : Has LinkedIn become the platform for a global community of practice for peace professionals? Does it have the potential to be? An inductive approach to Reflexive Thematic Analysis (RTA) following Braun and Clarke’s six-phase methodology was used as an analytic instrument on empirical data from 13 semi-structured interviews with professionals in peace mediation, using the theoretical lens of affordances. The participants in the study were found to use LinkedIn to create and sustain meaningful connections globally and across sectors, learn from empirical knowledge, stories and insights from others and explore economic opportunities. READ MORE