Essays about: "cyber regulation"

Showing result 1 - 5 of 8 essays containing the words cyber regulation.

  1. 1. Cyber Supply Chain Security and the Swedish Security Protected Procurement with Security Protective Agreement

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Carina Dios Falk; [2023]
    Keywords : Cyber Security; Protective Security; Public Procurement; Cyber Supply Chain Security; Swedish National Security; Risk Management; Cyber Security Risk Management; NIST 800-161; ISO IEC 27036; NISTIR 8276;

    Abstract : Digitalisation and globalisation are increasing the number of integrated and interconnected information technology (IT) systems worldwide. Consequently, these relationships and dependencies develop technological relationships through their services. READ MORE

  2. 2. Digital Repression: Backlash or Deterrence of Dissent? : A quantitative analysis of the Middle East and North Africa region during 2000-2020

    University essay from Uppsala universitet/Institutionen för freds- och konfliktforskning

    Author : Perla Toubia; [2022]
    Keywords : MENA; state repression; digital repression; cyber regulation; dissent; mass mobilization; protest; information and communication technology ICT ; repression-dissent puzzle; backlash; deterrence;

    Abstract : Digital Repression: Backlash or Deterrence of Dissent? is a quantitative analysis of the MENA region between the years 2000 and 2020. By distinguishing, theoretically as well as empirically, between nonphysical and physical aspects of state repression, this study aims to fill an identified research gap and contribute to the literature on the repression-dissent puzzle. READ MORE

  3. 3. Users Awareness of Cyber threats and Consequences in Social Media

    University essay from Uppsala universitet/Institutionen för informatik och media

    Author : Dhimitris Brace; [2020]
    Keywords : ;

    Abstract : Year 2013, the year that the world faced one of the most critical whistleblower cases in the last decades. A government that was accused that intercepted personal information of many users. Nowadays people are using the internet, and many provided services such as emailing and social media. READ MORE

  4. 4. The Regulation of Cyber Operations Below the Threshold of Article 2(4) of the Charter : An Assessment of Rule 4 of the Tallinn Manual 2.0

    University essay from Uppsala universitet/Juridiska institutionen

    Author : Caroline Nordström; [2019]
    Keywords : International law; cyber; cyberspace; cyberlaw; Tallinn Manual; sovereignty; use of force; Folkrätt; Tallinnmanualen; cyber;

    Abstract : The cyber domain poses great challenges to the existing international law framework, resulting in the international community's frustration in finding sustainable long-term solutions to the international regulation of cyberspace. This thesis reflects upon foundational concepts of the jus ad bellum framework, such as State sovereignty and the use of force. READ MORE

  5. 5. Insider Threat detection using Isolation Forest

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Maja Scherman; Joakim Bülow; [2018]
    Keywords : MSc; Insider Threats; Isolation Forest; Machine Learning; Security; Technology and Engineering;

    Abstract : In contrast to the need for companies to get real time information about insider threats, there is a privacy and integrity based limitation of what the individual accepts as acceptable surveillance. This creates a problem since performing online surveillance would pose an infringement on the employees privacy and integrity. READ MORE