Essays about: "Cyberspace thesis"

Showing result 1 - 5 of 19 essays containing the words Cyberspace thesis.

  1. 1. Cyber Attacks as Armed Attacks? : The Right of Self-Defence When a Cyber Attack Occurs

    University essay from Stockholms universitet/Juridiska institutionen

    Author : Mikaela Nyman; [2023]
    Keywords : public international law; cyber attack; the right of self-defence; armed attack; cyber operation; UN Charter; self-defence;

    Abstract : This thesis examined the relationship between cyber operations and armed attacks to determine when the right of self-defence is triggered by cyber operations. The research question for this thesis was under what circumstances a cyber operation is considered a cyber attack and what kind of self-defence the targeted victim State can use. READ MORE

  2. 2. How are Cybersecurity Threats, in the Form of Disinformation Campaigns, Reflected on the Security Measures They Inspire? : A Case Study of the Responses to Russian Election Meddling in Mexico, Brazil and Spain

    University essay from Malmö universitet/Institutionen för globala politiska studier (GPS)

    Author : Ailyn Christiansen; [2023]
    Keywords : disinformation campaigns; Russian election meddling; electoral security;

    Abstract : The contemporary topic and fear of information attacks making their way and altering the course of democratic elections is a common one for many nations at current times. New technologies, cyberspace, and the increasing risk of hybrid warfare, as well as the little and vague regulation present to manage these, pose an intimidating threat to nations trying to uphold their liberal democratic values; and the nations taking advantage of this new-found form of influence are well aware of this. READ MORE

  3. 3. Amplifying heap overflow vulnerability detection with reinforcement learning

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Erik Thomasson; Ludwig Wideskär; [2023]
    Keywords : ;

    Abstract : The extensive development of cyberspace and the increasing potential for cybersecu-rity vulnerabilities demand the constant production of improved methods for detect-ing and mitigating vulnerabilities in software. In a perfect world, there would be atool that detects and mitigates all types of vulnerabilities in all types of software, butunfortunately, that is not the reality. READ MORE

  4. 4. “God Speaks to Me Through the App” : A Digital Ethnographic Study of Religious Practices Through the YouVersion Bible App

    University essay from Malmö universitet/Institutionen för konst, kultur och kommunikation (K3)

    Author : Elizaveta Grozman; [2022]
    Keywords : digital religion; affect in religion; YouVersion Bible App;

    Abstract : The present thesis analyses the online religious practices of Christians through the mobile app YouVersion Bible. Particularly, it explores the ways in which Christians interact with sacred texts online and the phenomenon of a digital Bible. READ MORE

  5. 5. Cyber Warfare in Ukraine and Beyond – Jus in Bello and Its Application to Wartime Cyber Operations

    University essay from Lunds universitet/Juridiska institutionen; Lunds universitet/Juridiska fakulteten

    Author : Demi Bylon; [2022]
    Keywords : Public international law; Jus in Bello; International Humanitarian Law; Wartime Cyber Operations; Cyber Warfare; Russia; Ukraine; Cyber; Folkrätt; Law and Political Science;

    Abstract : Internationell humanitär rätt, även kallad jus in bello, utgör de lagar som reglerar parters uppförande under en väpnad konflikt. Under de senaste decennierna har framväxten av cyberrymden som en domän för krigföring gett upphov till diskussioner om tillämpningen av internationell humanitär rätt vid krigstida cyberoperationer. READ MORE