Essays about: "Cyber warfare"
Showing result 1 - 5 of 20 essays containing the words Cyber warfare.
-
1. Conspiracy theories in cyberspace
University essay from Stockholms universitet/Institutionen för data- och systemvetenskapAbstract : The introduction of social media platforms influenced the social dynamics by changing the way individuals are exposed to information. The straightforwardness of social media communication resulted in an overwhelming amount of information for users, and the variety of sources of the information is limiting users’ ability to assess what information is genuine and what is disinformation. READ MORE
-
2. Digitalised Combats and Their Impact on Social Sustainability in Kenya and Nigeria
University essay from FörsvarshögskolanAbstract : In our era, digital technology is one of the fastest-changing areas. It impacts our private life, well-being, economics, politics and warfare. This essay intends to answer how digital transformation affects combats and state and non-state actors and also how these digitalised combats compromise social sustainability. READ MORE
-
3. The Erosion of Objective Truth : A Comparative Study of the War in Ukraine using Digital Humanities Methods on Russian Disinformation Campaigns and Developing Technologies
University essay from Linnéuniversitetet/Institutionen för kulturvetenskaper (KV)Abstract : This thesis shall utilise digital humanities methods via modest data-collection tools to quantify and study the online discussion involving Russia and Ukraine online. The research shall apply sentiment analysis to Twitter data to understand the general divisiveness online relating to the war in Ukraine. READ MORE
-
4. Minimator: A Serious Game on Zero-Day Markets
University essay from Stockholms universitet/Institutionen för data- och systemvetenskapAbstract : Zero-days are vulnerabilities that the software vendor does not know about and thus cannot provide a patch for. Their value has caused markets to develop, divided by the purchase intention. This thesis focuses on the white and grey markets, that is those buying to patch and those buying to exploit. READ MORE
-
5. Generic Encrypted Traffic Identification using Network Grammar : A Case Study in Passive OS Fingerprinting
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : The increase in cybercrime and cyber-warfare has spurred the cat-and-mouse game of finding and attacking vulnerable devices on government or private company networks. The devices attacked are often forgotten computers that run operating systems with known exploits. READ MORE