Essays about: "Trojan"

Showing result 6 - 10 of 17 essays containing the word Trojan.

  1. 6. Between System Hackers and Trojan Horses: How Entrepreneurs Drive Paradigmatic Change Towards a More Sustainable Economy

    University essay from Handelshögskolan i Stockholm/Institutionen för företagande och ledning; Handelshögskolan i Stockholm/Institutionen för marknadsföring och strategi

    Author : Daniel Wallinger; [2020]
    Keywords : Post-capitalist entrepreneurship; Entrepreneurs transforming capitalism; Sustainable transformation of economy; Institutional entrepreneurs;

    Abstract : To combat global challenges such as climate change or social inequalities, more and more voices are calling for a transformation of today's capitalist economies. However, without outlining how actors can enact change from within the current setting, visions of a fundamentally different and more sustainable economy may not become reality. READ MORE

  2. 7. Recording and amplifying of the accordion : What is the best way to capture the sound of the acoustic accordion?

    University essay from Kungl. Musikhögskolan/Institutionen för klassisk musik

    Author : Milan Řehák; [2019]
    Keywords : Accordion; recording; amplifying; microphones; studio; live music;

    Abstract : In this thesis I discuss, analyse and intend to answer the question: What is the best way to capture the sound of the acoustic accordion? It was my desire to explore this theme that led me to this research, and I believe that this question is important to many other accordionists as well. From the very beginning, I wanted the thesis to be not only an academic material but also that it can be used as an instruction manual, which could serve accordionists and others who are interested in this subject, to delve deeper into it, understand it and hopefully get answers to their questions about this subject. READ MORE

  3. 8. You Wanna Be on Top? : A Narrative Career Study of Women’s Experiences and Strategies

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : Alice Åslander; Joel Gedin; [2019]
    Keywords : Gender; Gender Equality; Organisation; Critical Incidents; Exit; Discrimination; Female Manager; Career; Sweden; Minority Position; Coping strategy; Mentor; Sponsor; Leadership; Narrative; Genus; Jämställdhet; Organisation; Kritiska incidenter; Utträde; Diskriminering; Kvinnliga chefer; Karriär; Sverige; Minoritetsposition; Överlevnadsstrategi; Ledarskap; Narrativ;

    Abstract : In Sweden, the statistics show how women are underrepresented in organisational hierarchies; as managers, executive managers, CEOs and board of directors. Qualitative research reveals that women in management positions perceive the working life in Sweden as unequal and how men and women have different terms for making a career. READ MORE

  4. 9. Hur gör man offentliga grönområden i Malmö tryggare för befolkningen?

    University essay from SLU/Dept. of Landscape Architecture, Planning and Management (from 130101)

    Author : Laura Trojan; [2018]
    Keywords : trygghet; grönområden; Malmö; utemiljö; trygghetsfaktorer; stadsmiljö; vegetation;

    Abstract : Vad är det som gör att utemiljön kan upplevas som otrygg i Malmö och vilka faktorer kan motverka otryggheten? Kan staden ändras så att alla känner sig bekväma med att röra sig utomhus, även kvällstid? Detta examensarbete beskriver och undersöker olika faktorer som kan vara till hjälp på vägen till en tryggare stad ur ett utemiljöperspektiv. Studien har visat att det finns många orsaker till otrygghet. READ MORE

  5. 10. Patterns of malware and digital attacks : A guideline for the security enthusiast

    University essay from

    Author : Wolf Güven; [2018]
    Keywords : malware; ransomware; keylogger; virus; antivirus; encryption; infection; protection; user guideline; digital attack;

    Abstract : Context: In today’s era, many things are dependent on the internet thus the devices and applications that are using it proliferates. Every day, many devices are getting targeted by malevolent virus authors. To protect the data from malicious factors becomes a preposterous dispute. READ MORE