Advanced search

Showing result 1 - 5 of 105 essays matching the above criteria.

  1. 1. Supplementing Dependabot’svulnerability scanning : A Custom Pipeline for Tracing DependencyUsage in JavaScript Projects

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Isak Karlsson; David Ljungberg; [2024]
    Keywords : Vulnerability scanning; Software Dependencies; JavaScript; TypeScript; Dependabot; Vulnerability Scanning Tools; Software Security; Pipeline; GitHub; Dependency Management;

    Abstract : Software systems are becoming increasingly complex, with developers frequentlyutilizing numerous dependencies. In this landscape, accurate tracking and understanding of dependencies within JavaScript and TypeScript codebases are vital formaintaining software security and quality. READ MORE

  2. 2. Examining Bounded Rationality Influences on Decisions Concerning Information Security : A Study That Connects Bounded Rationality and Information Security

    University essay from Stockholms universitet/Företagsekonomiska institutionen

    Author : Oskar Malm Wiklund; Caroline Larsson; [2024]
    Keywords : Decision-making; Rationality; Bounded Rationality; Information Security; Public Authority; Organizational Culture; Information Systems;

    Abstract : This study investigates the impact of bounded rationality on information security decisions in public Swedish authorities. The research addresses how cognitive limitations and organizational dynamics shape decisions in this area. READ MORE

  3. 3. HL-DRIP: A Blockchain-based Remote Drone ID Protocol registry management : Evaluation of a Hyperledger Fabric-based solution to manage DRIP registries

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Juan Basaez Serey; [2023]
    Keywords : DRIP; Drone Remote ID; Hyperledger-Fabric; IPFS;

    Abstract : On January 15, 2021, the Federal Aviation Administration published the Unmanned Aircraft System Remote Identification rule with the intention of improving airspace security regarding the use of Unmanned Aircraft. According to the rule, UAs in flight must provide the public with information such as their identification, location, and altitude. READ MORE

  4. 4. Third-party risks in industrial control systems: : A case study in the wind power sector

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : Abdullahi Ahmed; [2023]
    Keywords : Supply chain security; Wind power; Risk management; Third-party risk management; SCADA-system; Säkerhetshantering för försörjningskedjan; Vindkraft; Riskhantering; Tredjeparts riskhantering; SCADA-system;

    Abstract : This report investigates third-party risk for SCADA systems, using Swedish wind power as an empirical case study. Supervisory, Control, and Data Acquisition (SCADA) systems are used in the wind power industry to monitor and control the operational process. The paper also proposed potential strategies for reducing third-party risks and exposures. READ MORE

  5. 5. A sustainability-focused innovation management and product development framework - Based on current practices at Mips

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : Nathapong Khumhongsa; Deva Pérez Orviz; [2023]
    Keywords : ;

    Abstract : Mips is a growing, ingredient brand that develops security systems for helmets. Their continuous growth has led to the need to define the Innovation Management and Product Development processes. READ MORE