Essays about: "IT Security"
Showing result 21 - 25 of 3455 essays containing the words IT Security.
-
21. Nurses' experiences of providing person-centered care for older people with dementia : A meta-synthesis of qualitative studies
University essay fromAbstract : Aims: This literature review aimed to synthesize nurses’ experiences of providing person-centered care for older people with dementia. Background: Life radically changes for people with health problems, especially dementia. The number of people with dementia is increasing due to the rapid increase of the aging population. READ MORE
-
22. NATO or Not
University essay from Lunds universitet/Statsvetenskapliga institutionenAbstract : Using a framework for analyzing security policy consisting of a synthesis of the Multiple Streams Framework by Kingdon (2014) and Securitization theory as described by Balzacq (2010), this study aims to explain the process of Sweden’s national security policy between 2014 and 2022. Such an investigation has relevance particularly for studies of peace, security and policy processes, since it relates to the broader question of what conditions make military alignment possible or impossible. READ MORE
-
23. GDPR Compliance in EU-US Data Transfers - Examining the impact of the EU Commission’s 2023 adequacy decision on surveillance risks
University essay from Lunds universitet/Institutionen för handelsrättAbstract : International data transfers serve to support the global economy, facilitating international collaboration and economic expansion. However this increased productivity comes at a cost, namely amplified personal data privacy and security risks. READ MORE
-
24. An American story of hope : A narrative analysis on the role of hope within the Biden administration's biographical narrative after January 6th
University essay from FörsvarshögskolanAbstract : This thesis explores the role of hope within the Biden administration’s biographical narrative during the year after the Capitol attack on January 6th. The thesis provides for both an exploration of the case and how hope within national identity representations can be analyzed, as well as the value of hope after a disruptive event with consequences for the nation’s self-understanding. READ MORE
-
25. Exploring the Dynamics of Software Bill of Materials (SBOMs) and Security Integration in Open Source Projects
University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknikAbstract : Background.The rapid expansion of open-source software has introduced significant security challenges, particularly concerning supply chain attacks. Software supply chain attacks, such as the NotPetya attack, have underscored the critical need for robust security measures. READ MORE