Essays about: "IT Defense"

Showing result 1 - 5 of 308 essays containing the words IT Defense.

  1. 1. In Defense of Consuming Animal Products : How Human Suffering Can Justify the Consumption of Animal Products in Developed Countries

    University essay from Uppsala universitet/Filosofiska institutionen

    Author : Dennis Magyari Djerdj; [2024]
    Keywords : Animal Ethics; Applied Ethics; Ethics; Veganism; Eating Meat; Animal Products; Consuming; Against Veganism; Defending Meat Consumption; Animal Welfare;

    Abstract : Within the area of animal ethics, there has been ongoing discussion around whether people in developed countries are justified in consuming animal based products or not, some argue that we are, and some argue that we aren't. In this paper I present a kind of middle-way position in response to the ongoing discussion, in which I argue that a decent chunk of a population in developed countries are justified in consuming certain animal products, but only so far as the exclusion of these animal based products would cause harm to the boycotter. READ MORE

  2. 2. Heathcliff’s Complex Character : Psychoanalytic Theory of Personality and Reader-response Theory to Understand Heathcliff

    University essay from

    Author : Mohamed Ashmawi; [2024]
    Keywords : ;

    Abstract : Emily Brontë’s novel, Wuthering Heights, presents Heathcliff as a complicated character that makes it hard for readers to declare him a victim or a villain, hence leaving them with questions about his morality. This work looks deep into Heathcliff’s tough character by integrating the view of psychoanalysis with reader-response theory. READ MORE

  3. 3. A Seed has been Planted : Examining public-private cooperation in the civil preparedness sector of food supply and drinking water

    University essay from Försvarshögskolan

    Author : Gustaf Stövling; [2024]
    Keywords : Civil preparedness; crisis management; public-private cooperation; rationalist organizational; social-psychological; total defense;

    Abstract : The resurgence and increased use of the total defense concept in the political landscape of Sweden comes in a time of global geopolitical uncertainties and multifaceted security crises. Despite its stated importance, how the private sector should be incorporated into this structure remains somewhat unclear. READ MORE

  4. 4. Early-Stage Validation of Autonomous Vehicles in Ambiguous Environments : A Systems-Theoretic Process Analysis (STPA) of an Autonomous Military Defense Industry Vehicle

    University essay from Linköpings universitet/Fordonssystem

    Author : Maria Axelsson; [2024]
    Keywords : STPA; System Safety; AFRY; Milrem Robotics; Safety Analysis; Autonomous Vehicles; Control Structure; Control Model; NGV; THeMIS; themis; THEMIS;

    Abstract : This report delves into the early developmental phase of an autonomous vehicle designed for defense applications. Navigating diverse terrains, this unmanned ground vehicle (UGV) poses unique challenges, particularly in the absence of clearly defined directives found in typical traffic scenarios. READ MORE

  5. 5. Literature review on trustworthiness of Signature-Based and Anomaly detection in Wireless Networks

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Josephine Spångberg; Vainius Mikelinskas; [2023]
    Keywords : Cyber threats; Malware; Cyber attacks; Signature Based Detection; Anomaly Detection; Cyber defense; Sophisticated attacks; Modern cyberattacks; malware detection in wireless network; IoT;

    Abstract : The internet has become an essential part of most people's daily lives in recent years, and as more devices connect to the internet, the risk of cyber threats increases dramatically. As malware becomes more sophisticated, traditional security prevention measures are becoming less effective at defending from cyber attacks. READ MORE