Essays about: "hosting"

Showing result 1 - 5 of 265 essays containing the word hosting.

  1. 1. Dictators Without Borders: Host-Origin Relations and Transnational Repression : A qualitative case study on the causes of transnational repression in democratic host countries

    University essay from Uppsala universitet/Institutionen för freds- och konfliktforskning

    Author : Liv van der Voort; [2024]
    Keywords : Russia; Europe; Transnational Repression; Qualitative study; host country; origin country; democratic host states;

    Abstract : Past literature on transnational repression underscore the significant gap in examining how the relationship between the origin country and the host country influences instances of transnational repression. To fill this gap, this study is bringing in the neglected role of democratic host states by exploring: Why do certain democratic host states encounter significant incidents of transnational repression on their soil while others do not? This essay demystifies the concept of "relationship" and examines whether states, driven by their self-interest, tend to "overlook" transnational repression. READ MORE

  2. 2. Countering Terrorist Content Online: Removal = Success? : A Critical Discourse Analysis of the EU Regulation 2021/784

    University essay from Försvarshögskolan

    Author : Nina McCarthy Hartman; [2024]
    Keywords : Critical Discourse Analysis; Content Moderation; Counter-Terrorism; EU;

    Abstract : This thesis critically interrogates the underlying assumptions which legitimise the hard regulation of online platforms regarding terrorist content, by turning to the case of the EU Regulation 2021/784. Utilising qualitative critical discourse analysis, the study analyses how the EU's strategy against terrorist content online is discursively legitimised through the lens of Theo van Leeuwen's framework for discursive legitimisation strategies, focusing on moral and rational justifications. READ MORE

  3. 3. Evaluation of Open-source Threat Intelligence Platforms Considering Developments in Cyber Security

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Love Andrén; [2024]
    Keywords : Threat Intelligence; Open-source; Information Sharing; Cyber Security;

    Abstract : Background. With the increase in cyberattacks and cyber related threats, it is of great concern that the area still lacks the needed amount of practitioners. Open-source threat intelligence platforms are free platforms hosting related information to cyber threats. READ MORE

  4. 4. Hosting Capacity Methods Considering Complementarity between Solar and Wind Power : A Case Study on a Swedish Regional Grid

    University essay from Linköpings universitet/Energisystem

    Author : Emma Andersson; Maja Abrahamsson Bolstad; [2023]
    Keywords : hosting capacity; hosting capacity methods; renewable power generation; power grid; power system analysis; complementarity; solar power; wind power; deterministic method; time series method;

    Abstract : The demand for electrical power is growing due to factors such as population growth, urbanisation, and the transition from fossil fuels to renewable energy sources. To be able to keep up with the changes in electricity demand, the Swedish power grid must connect more renewable power generation, but also  increase its transmission capacity. READ MORE

  5. 5. Implementing a Zero Trust Environmentfor an Existing On-premises Cloud Solution

    University essay from KTH/Hälsoinformatik och logistik

    Author : Victor Pero; Linus Ekman; [2023]
    Keywords : Zero Trust; GitLab; Keycloak; OpenVPN; data protection; network security; access control; Zero Trust; GitLab; Keycloak; OpenVPN; dataskydd; nätverkssäkerhet; åtkomstkontroll;

    Abstract : This thesis project aimed to design and implement a secure system for handling and safeguarding personal data. The purpose of the work is to prevent unauthorized actors from gaining access to systems and data. The proposed solution is a Zero Trust architecture which emphasizes strong security measures by design and strict access controls. READ MORE