Essays about: "Security Patterns"
Showing result 1 - 5 of 145 essays containing the words Security Patterns.
-
1. Constructing Capabilities : Military Strategies of Small States in an Age of Transition: Examining the Influence of Strategic Culture
University essay from FörsvarshögskolanAbstract : Scholars tend to approach small states’ military strategies in terms of restraints and opportunities in the external security environment, largely overlooking the influences of a state’s domestic particularities. This thesis aims to explore how the theory of strategic culture, regarded here as an inherent, domestic context in which strategy is formulated, can add nuance to such realist analyses of how small states build and adjust their defence capabilities. READ MORE
-
2. Groundwater Modelling in southeast Cambodia - Facing irrigation and groundwater level changes during a pandemic
University essay from Lunds universitet/Avdelningen för Teknisk vattenresursläraAbstract : In the Mekong region, sustainable water resource management is a significant challenge for all countries involved. In Cambodia, where rice production is crucial for household food security and export, groundwater is increasingly used for irrigation during the dry season, leading to higher rice yields. READ MORE
-
3. Examining Bounded Rationality Influences on Decisions Concerning Information Security : A Study That Connects Bounded Rationality and Information Security
University essay from Stockholms universitet/Företagsekonomiska institutionenAbstract : This study investigates the impact of bounded rationality on information security decisions in public Swedish authorities. The research addresses how cognitive limitations and organizational dynamics shape decisions in this area. READ MORE
-
4. Context-aware security testing of Android applications : Detecting exploitable vulnerabilities through Android model-based security testing
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : This master’s thesis explores ways to uncover and exploit vulnerabilities in Android applications by introducing a novel approach to security testing. The research question focuses on discovering an effective method for detecting vulnerabilities related to the context of an application. READ MORE
-
5. Navigating the Risks of Dark Data : An Investigation into Personal Safety
University essay from Linnéuniversitetet/Institutionen för informatik (IK)Abstract : With the exponential proliferation of data, there has been a surge in data generation fromdiverse sources, including social media platforms, websites, mobile devices, and sensors.However, not all data is readily visible or accessible to the public, leading to the emergence ofthe concept known as "dark data. READ MORE