Essays about: "Women s Security"

Showing result 36 - 40 of 135 essays containing the words Women s Security.

  1. 36. Deconstructing Informality: Evidence from South American Household Surveys

    University essay from Lunds universitet/Ekonomisk-historiska institutionen

    Author : Ana Maria Teresa Morales Curiel; [2021]
    Keywords : labor informality; social security; socio-economic characteristics; household surveys; South America; Social Sciences;

    Abstract : The persistence and growth of the informal economy in South America is considered one of the most relevant problems in the region. However, studying informality across countries can be a complicated task due to the lack of homogeneous concepts and measurements. READ MORE

  2. 37. Combating GBV and Building Feminist Peace in the Southern Cameroon Armed Conflict: The case of WILPF- Cameroon and SCEW.

    University essay from Lunds universitet/Graduate School

    Author : Bibiana Bienka'a Tanda; [2021]
    Keywords : Gender-Based Violence; armed conflict; cultural norms; Women’s organisations; feminist Peace.; Social Sciences;

    Abstract : Gender-based violence (GBV) be it in peace or conflict settings is a persistent problem that has gained grounds and concerns for activists, women’s organisations, Civil Society Organisations (CSOs) in general and international bodies like the United Nations. Social inequalities and cultural ideologies inform GBV and other forms of violence that are amplified in war times. READ MORE

  3. 38. Destructive Conflicts Generating Reconstructive Empowerment of Women and Opportunities for Peace?

    University essay from Lunds universitet/Statsvetenskapliga institutionen

    Author : Julia Savic; [2021]
    Keywords : WPS; Post-Conflict; Peacebuilding; sub-Saharan Africa; Economic Empowerment; Socioeconomic Development; Rwanda; Burundi; Law and Political Science;

    Abstract : Conflicts are destructive for humans and societies, but are openings for rebuilding a more inclusive and sustainable society presented in the aftermath of conflict? This paper contributes to the growing research field and examines the link between conflict and window of opportunity for development, through a gender lens. Further, this study seeks to understand how conflict affected women’s socioeconomic situation in Rwanda and Burundi. READ MORE

  4. 39. If not us, then who? - On the repatriation of Swedish women and children from the al Hol and al Roj camps in the Syrian Arab Republic

    University essay from Lunds universitet/Juridiska institutionen; Lunds universitet/Juridiska fakulteten

    Author : Aylin Volgsten; [2021]
    Keywords : public international law; international human rights law; repatriation; jurisdiction; terrorism; counter-terrorism; Syria; ISIL; Law and Political Science;

    Abstract : In the al Hol and al Roj camps in the north-eastern parts of the Syrian Arab Republic, women and children allegedly affiliated with the terrorist group the Islamic State of Iraq and the Levant are detained in precarious humanitarian and security conditions that have been equated with torture or cruel, inhuman or degrading treatment or punishment by the United Nations. In early 2021, the United Nations called upon states to repatriate their nationals from the camps. READ MORE

  5. 40. Investigating Gender Disparity within Cyber Security : Analysis of Possible Factors Through a Mixed- Method Qualitative Study and a Self- Implemented Testing Program

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Sebastian Lihammer; Linnea Hagman; [2021]
    Keywords : cyber security; gender disparity; qualitative; quantitative; interview; survey study; Datasäkerhet; könsskillnad; kvalitativ; kvantitativ; intervju; enkätundersökning;

    Abstract : The importance of cyber security is rapidly increasing. At the same time, too few cyber security professionals are educated in order to fulfill industrial needs. Women are a minority within information technology and account for an even smaller number of people within cyber security itself. READ MORE