Essays about: "Critical Security"

Showing result 1 - 5 of 528 essays containing the words Critical Security.

  1. 1. The crisisification of the European Single Market : A study investigating how changes to governance of the Single Market can be understood through crisisification

    University essay from Försvarshögskolan

    Author : Julia Linder; [2024]
    Keywords : crisisification; Single Market; European crises; institutional changes; security and risk;

    Abstract : The European Single Market (SM) has typically been a symbol of economic integration and multilateralism within the European Union (EU). It operates within a robust regulatory framework aimed at ensuring the free movement of goods, services, people, and capital. READ MORE

  2. 2. Countering Terrorist Content Online: Removal = Success? : A Critical Discourse Analysis of the EU Regulation 2021/784

    University essay from Försvarshögskolan

    Author : Nina McCarthy Hartman; [2024]
    Keywords : Critical Discourse Analysis; Content Moderation; Counter-Terrorism; EU;

    Abstract : This thesis critically interrogates the underlying assumptions which legitimise the hard regulation of online platforms regarding terrorist content, by turning to the case of the EU Regulation 2021/784. Utilising qualitative critical discourse analysis, the study analyses how the EU's strategy against terrorist content online is discursively legitimised through the lens of Theo van Leeuwen's framework for discursive legitimisation strategies, focusing on moral and rational justifications. READ MORE

  3. 3. A Comparative Analysis of SecurityServices Using Identity and AccessManagement (IAM)

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Nithya Sree Muddychetty; [2024]
    Keywords : Access Control Lists; Identity Access Management; Multi-Factor Authentication; One time password; Single sign on; System Usability Scale; Virtual private network;

    Abstract : Background: Identity and Access Management (IAM) is a critical IT securityframework for managing digital identities and resource access. With roots datingback to ancient civilizations, IAM has evolved from basic authentication to sophisticated methods. READ MORE

  4. 4. Securing the Arctic : An analysis of Sweden's construction of security in the Arctic (2020-2023)

    University essay from Försvarshögskolan

    Author : Lovisa Sand; [2024]
    Keywords : Arctic; securitization; Sweden; Arctic security;

    Abstract : This thesis examines how the Arctic region is portrayed and constructed as a security matter within Swedish state discourses from 2020 to 2023. Focused on the escalating geopolitical significance and the transformative impact of climate change in the Arctic, the thesis scrutinizes Sweden's portrayal of security in the region. READ MORE

  5. 5. Supplementing Dependabot’svulnerability scanning : A Custom Pipeline for Tracing DependencyUsage in JavaScript Projects

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Isak Karlsson; David Ljungberg; [2024]
    Keywords : Vulnerability scanning; Software Dependencies; JavaScript; TypeScript; Dependabot; Vulnerability Scanning Tools; Software Security; Pipeline; GitHub; Dependency Management;

    Abstract : Software systems are becoming increasingly complex, with developers frequentlyutilizing numerous dependencies. In this landscape, accurate tracking and understanding of dependencies within JavaScript and TypeScript codebases are vital formaintaining software security and quality. READ MORE