Essays about: "Risk Mitigation"

Showing result 1 - 5 of 139 essays containing the words Risk Mitigation.

  1. 1. A lynx in a sheep's pasture : environmental factors and hunting affecting lynx depredation on domestic sheep in Sweden

    University essay from SLU/Dept. of Ecology

    Author : Marc Velling; [2021]
    Keywords : Lynx lynx; Scandinavia; conservation; human-wildlife conflict; depredation; spatial analysis; survival analysis; protective hunting; carnivore; lethal control;

    Abstract : Large predators have made a return in Europe in the past decades. In Scandinavia, the Eurasian Lynx (Lynx lynx) has expanded its distribution further south and recolonized past areas. Due to the recolonization, lynx management has become part of the public discourse in Sweden. One factor of this discourse is depredation on domestic sheep. READ MORE

  2. 2. Planning and implementing sustainable urban drainage systems in the built environment

    University essay from Luleå tekniska universitet/Arkitektur och vatten

    Author : Madeleine Hellberg; [2020]
    Keywords : stormwater; sustainable stormwater management; sustainable urban drainage systems; SUDS; green-blue infrastructure; GBI; dagvatten; hållbar dagvattenhantering; hållbara urbana dagvattensystem; grön-blå infrastruktur;

    Abstract : Our planet stands before many great challenges, where climate change and urbanization are two of the major challenges. One of the challenges due to climate change is the increased amount of precipitation and of extreme rainfall, which creates a higher amount of stormwater within the urban areas and an increased risk of urban flooding. READ MORE

  3. 3. Institutionalized Cloud Clients

    University essay from Lunds universitet/Institutionen för informatik

    Author : Niclas Körner; [2020]
    Keywords : Cloud; SaaS; Vendor lock-in; Measures; Business and Economics;

    Abstract : The paradigm of of cloud computing have brought with it the challenge of vendor lock-in, preventing customers from choose from alternative vendors and induces substantial costs for switching provider. Since only a limited number of in-depth studies who investigate the complexity of cloud lock-in problem within enterprise organizations exist, this thesis tries to describe the measures taken by companies to avoid the issue of vendor lock-in from a strategic perspective. READ MORE

  4. 4. Preventing knowable risk at the cost of long-term thinking : a critical analysis of the discursive construction of adaptation in Icelandic policies

    University essay from SLU/Dept. of Urban and Rural Development

    Author : Silja Elvarsdóttir; [2020]
    Keywords : climate change adaptation and mitigation; policy discourse; risk; problematization; What’s the Problem Represented to be?; Reykjavík municipality; Government of Iceland;

    Abstract : The discursive construction of climate change adaptation as a policy issue gives rise to material practices that have real effects on people‘s lives, and should thus be critically interrogated. In the realm of adaptation policies, the Nordic countries have been at the forefront, but for Icelandic decision-makers the topic remains relevantly novel. READ MORE

  5. 5. Tamper Protection for Cryptographic Hardware : A survey and analysis of state-of-the-art tamper protection for communication devices handling cryptographic keys

    University essay from Linköpings universitet/Informationskodning

    Author : Emil Johansson; [2020]
    Keywords : ;

    Abstract : This master's thesis was conducted at Sectra Communications AB, where the aim of the thesis was to investigate the state of the art of physical hardware tampering attacks and corresponding protections and mitigations, and finally combining this to a protection model that conforms to the FIPS 140-2 standard. The methods used to investigate and evaluate the different attacks were literature searching, looking for articles presenting different attacks that have been used against real targets, and attacks that there are no records of being attempted on a real target, but are theoretically possible. READ MORE