Essays about: "Information Sharing"

Showing result 1 - 5 of 829 essays containing the words Information Sharing.

  1. 1. Station-level demand prediction in bike-sharing systems through machine learning and deep learning methods

    University essay from Lunds universitet/Institutionen för naturgeografi och ekosystemvetenskap

    Author : Nikolaos Staikos; [2024]
    Keywords : Physical Geography; Ecosystem Analysis; Bike-sharing demand; Machine learning; Deep learning; Spatial regression; Graph Convolutional Neural Network; Multiple Linear Regression; Multilayer Perceptron Regressor; Support Vector Machine; Random Forest Regressor; Urban environment; Micro-mobility; Station planning; Geomatics; Earth and Environmental Sciences;

    Abstract : Public Bike-Sharing systems have been employed in many cities around the globe. Shared bikes are an efficient and convenient means of transportation in advanced societies. Nonetheless, station planning and local bike-sharing network effectiveness can be challenging. READ MORE

  2. 2. Cooperative Sustainability : a study of Arla’s Sustainable Incentive Model

    University essay from SLU/Dept. of Economics

    Author : Martin Söderlund; [2024]
    Keywords : Arla foods; Agricultural Cooperatives; Cooperative Sustainability; Incentive Models; Sustainable Incentive Models; Organizational Change; Agency Relationship;

    Abstract : The agricultural industry is a large contributor to greenhouse emissions and therefore faces new challenges to implement sustainable practices. The rising societal demand for sustainability makes the agricultural sector dependent on working towards environmentally friendly practices. READ MORE

  3. 3. Evaluation of Open-source Threat Intelligence Platforms Considering Developments in Cyber Security

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Love Andrén; [2024]
    Keywords : Threat Intelligence; Open-source; Information Sharing; Cyber Security;

    Abstract : Background. With the increase in cyberattacks and cyber related threats, it is of great concern that the area still lacks the needed amount of practitioners. Open-source threat intelligence platforms are free platforms hosting related information to cyber threats. READ MORE

  4. 4. Risky Business: Quantitative Risk Assessments as Enabling Devices in Cybersecurity

    University essay from Lunds universitet/Avdelningen för Riskhantering och Samhällssäkerhet

    Author : Colette Alexander; [2024]
    Keywords : Quantitative risk assessment; cybersecurity; enabling device; Technology and Engineering;

    Abstract : Quantitative risk assessment (QRA) is a growing practice in the cybersecurity field. This paper examines QRA the use in various industries and the problems with its use. The focus of the qualitative research is to understand why cybersecurity organizations might want to use QRA even if it produces untrue and potentially problematic results. READ MORE

  5. 5. Adaptive Tactics in Software Operations: How People Manage Complexity by Asking for Help

    University essay from Lunds universitet/Avdelningen för Riskhantering och Samhällssäkerhet

    Author : Michael Vincent Wettick; [2024]
    Keywords : Recruitment; Software Operations; Anomaly Response; Incident Response; Escalation; Adaptive Capacity; Decision Making; Tacit Knowledge; Complexity; Technology and Engineering;

    Abstract : Society relies on the continued operation of software systems, from healthcare to social media platforms. These systems can be engineered to be highly reliable, but complexity assures surprise. People have the ability to manage this complexity, filling gaps in design by recognizing, diagnosing and correcting anomalies. READ MORE