Essays about: "information security review"
Showing result 21 - 25 of 154 essays containing the words information security review.
-
21. Climate Refugees in International Law
University essay from Stockholms universitet/Juridiska institutionenAbstract : Climate change is today the most widespread concern and pressing issue facing humanity globally. It is humanity's most significant challenge in the last decade, and its impact on the environment is causing severe changes that force people to migrate from one place to another. READ MORE
-
22. Life experiences of long-term hemodialysis patients : A descriptive review
University essay from Högskolan i Gävle/Avdelningen för vårdvetenskapAbstract : Background : Hemodialysis improved quality of life and reduced morbidity andmortality in patients with end-stage renal disease. At the same time, contemporarysociety was increasingly concerned about the life experience and needs of patientsduring the treatment phase. READ MORE
-
23. A study of information security awareness on teleworking security risks and recommendations since Covid19 pandemic
University essay from Luleå tekniska universitet/Informationsresurser, publicering och system; Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : This study is looking at “the changed” world for employees that were lucky and could continue their work from places other than the office since the Covid-19 pandemic outbreak using teleworking tools. Their numbers grew exponentially and while they still had to perform their duties as usual, they could not rely on the security infrastructure built at the office. READ MORE
-
24. Data mining in healthcare : A security and privacy perspective
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : Data mining has become an essential tool in various domains, including healthcare, for finding patterns and relationships in large datasets to solve business issues. However, given the sensitivity of healthcare data, safeguarding confidentiality and privacy to protect patient information is highly prioritized. READ MORE
-
25. Method of finding the minimum number of sources of indicators of compromise to cover the maximum set
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. With the increasing demand for cybersecurity, there is a growing interest in understanding cyber-attack surfaces and vectors. READ MORE