Essays about: "vulnerability exploitation"

Showing result 1 - 5 of 38 essays containing the words vulnerability exploitation.

  1. 1. Human Trafficking in Gauteng, South Africa : How do socio-economic factors influence the vulnerability of women to engage in sexual services and potential trafficking in Gauteng, South Africa?

    University essay from Linnéuniversitetet/Institutionen för samhällsstudier (SS)

    Author : Linnéa Lundqvist; [2024]
    Keywords : Human Trafficking; exploitation; socio-economic; GBV; corruption;

    Abstract : This research aims to investigate how socio-economic factors influence the vulnerability of women to engage in sexual services and potential trafficking in Gauteng, South Africa. This province is South Africa’s most prosperous one with an enormous flow of migrants and is therefore of interest to investigate. READ MORE

  2. 2. Syrian Refugees in Turkey: An Analysis of Role of the Labour Exploitation in their Integration into the Labour Market

    University essay from Göteborgs universitet/Institutionen för globala studier

    Author : Şebnem Çerçel; [2023-02-14]
    Keywords : Labour exploitation; vulnerability; consent; control; coercion; Syrian refugees; Turkish labour market; integration;

    Abstract : This study investigates the role of labour exploitation in the integration of Syrian refugees into the Turkish labour market. Vulnerability, control, and consent are key elements in shaping labour exploitation. Informal employment among Syrian refugees is common both within the formal and informal sectors, which makes the line between them blurry. READ MORE

  3. 3. Identifying Threat Factors of Vulnerabilities in Ethereum Smart Contracts

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Mah Noor; Syeda Hina Murad; [2023]
    Keywords : Smart contract; Blockchain; Ethereum; attacks; security vulnerabilities; security audits;

    Abstract : Ethereum is one of the top blockchain platforms that represents this second generation of blockchain technology. However, the security vulnerabilities associated with smart contracts pose significant risks to confidentiality, integrity, and availability of applications supported by Ethereum. READ MORE

  4. 4. Testing IoT Security : A comparison of existing penetration testing frameworks and proposing a generic framework

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Alva Widerberg Palmfeldt; William Mattsson; [2023]
    Keywords : Internet of Things; penetration testing; standardization; framework; vulnerability exploitation;

    Abstract : The Internet of Things (IoT) refers to the billions of physical devices linked to the Internet worldwide, integrating into various systems like healthcare, finance, and transportation. However, the rapid market expansion has led to software and hardware security shortcomings, leaving IoT devices vulnerable to cybercriminals. READ MORE

  5. 5. Female Former Child Soldiers Perception of Power : Females captured by the LRA's attitudes towards the people in power in the bush and its effects on them as women

    University essay from Linnéuniversitetet/Institutionen för samhällsstudier (SS)

    Author : Ebba Gustafsson; [2023]
    Keywords : Empowerment; female empowerment; gender equality; gender inequality; feminism; child soldier; female former child soldier; SDGs; sustainable development goals; Lord s Resistance army; LRA;

    Abstract : The research aims to understand how female former child soldiers describe the ones who had power over them in the bush of Lord’s Resistance Army (LRA) to understand how patriarchal beliefs in a society affect vulnerable women. The researcher wishes to enhance the importance of working against patriarchal beliefs and stopping child abductions for the sake of young women’s empowerment. READ MORE