Essays about: "Trojan Horse"
Found 5 essays containing the words Trojan Horse.
-
1. Diverse Double-Compiling to Harden Cryptocurrency Software
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : A trusting trust attack is a special case of a software supply-chain attack. The project in this report, named diverse double-compiling for cryptocurrency (DDC4CC), demonstrates and explains a defense for cryptocurrency software against trusting trust attacks. READ MORE
-
2. Democracy - the Trojan horse or Achilles heel? : The Legal Challenges of the Far-Right in European Constitutional Democracies
University essay from Umeå universitet/Juridiska institutionenAbstract : This thesis explores the influence of far-right parties on constitutional democracies in Europe, focusing on their adherence to human rights standards and state obligations within the European legal framework. Against the backdrop of rising electoral support for far-right parties across Europe, this thesis aims to examine the common features of far-right party programs and assess the potential consequences of their actions on human rights and democratic values. READ MORE
-
3. You Wanna Be on Top? : A Narrative Career Study of Women’s Experiences and Strategies
University essay from KTH/Skolan för industriell teknik och management (ITM)Abstract : In Sweden, the statistics show how women are underrepresented in organisational hierarchies; as managers, executive managers, CEOs and board of directors. Qualitative research reveals that women in management positions perceive the working life in Sweden as unequal and how men and women have different terms for making a career. READ MORE
-
4. Patterns of malware and digital attacks : A guideline for the security enthusiast
University essay fromAbstract : Context: In today’s era, many things are dependent on the internet thus the devices and applications that are using it proliferates. Every day, many devices are getting targeted by malevolent virus authors. To protect the data from malicious factors becomes a preposterous dispute. READ MORE
-
5. Management Accounting Change through Pilots: A case study on Accelerated Change and Trojan Horse Mechanisms
University essay from Handelshögskolan i Stockholm/Institutionen för redovisning och finansieringAbstract : This paper explores evolutionary management accounting change (MAC) and is aligned with the previous perception of MAC being an evolutionary phenomenon. However, we also share recent criticism that evolutionary MAC has not been described in its entirety, implying that the definition of evolutionary MAC has to be extended beyond being seen as merely gradual and slow. READ MORE