Essays about: "methodology legal research"

Showing result 11 - 15 of 88 essays containing the words methodology legal research.

  1. 11. Integrating Trust-Based Adaptive Security Framework with Risk Mitigation to enhance SaaS User Identity and Access Control based on User Behavior

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Johnson Akpotor Scott; [2022]
    Keywords : Risk Assessment; Security countermeasure; Risk Management; Risk Mitigation; Adaptive Security Controls; Threats; Risk; Vulnerabilities; User Behavior Trust Degree; User Behavior Risk Rating; Policy Decision Point; Policy Enforcement Point; User Behavior Trust Model; Adaptive Security Architecture; SaaS; Public Cloud.;

    Abstract : In recent years, the emerging trends in cloud computing technologies have given rise to different computing services through the Internet. Organizations across the globe have seized this opportunity as a critical business driver for computing resource access and utilities that will indeed support significant business operations. READ MORE

  2. 12. The Rights of Nature in the Scandinavian Wilderness : the case of Fulufjället National Park

    University essay from Högskolan Dalarna/Institutionen för kultur och samhälle

    Author : Emese Annabella Boda; [2022]
    Keywords : human rights; Nature’s rights; sustainability; intergenerational equity; environmental protection; conservation; biodiversity; intrinsic value; interconnectedness;

    Abstract : The idea of recognizing the Rights of Nature has emerged as a response and an alternative source of stimulus to tackle today’s environmental problems causing eco-anxiety. This study intends to give insight on how a high level of environmental awareness can contribute substantially to a balanced relationship with Nature. READ MORE

  3. 13. Cybersecurity Ontology - The relationship between vulnerabilities, standards, legal and regulatory requirements,

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Olov Wicklund Lindroth; [2022]
    Keywords : Vulnerabilities; Standards; Legal and Regulatory Requirements; Compliance; Semantic Mapping; Ontology;

    Abstract : Since information technology has become a central part of businesses and organizations, the move to the cyber domain has benefitted them and endangered them with new threats through vulnerabilities. To minimize risks and prevent and alleviate cyber-attacks, using standards is common to ensure an organization's cybersecurity. READ MORE

  4. 14. Corporate Sustainability Strategy: From Formulation to Implementation - A Single-Case Study of the Manufacturing Industry Examining Strategy Implementation Tools And Influences of Contextual Factors

    University essay from Lunds universitet/Företagsekonomiska institutionen

    Author : Oriane Marina Rütsche; Jakob Krenn; [2022]
    Keywords : Corporate Sustainability Strategy; Strategy Formulation; Strategy Implementation; Contextual Factors; Business and Economics;

    Abstract : Title: Corporate Sustainability Strategy: From Formulation to Implementation – A Single-Case Study of the Manufacturing Industry Examining Strategy Implementation Tools And Influences of Contextual Factors Seminar date: June 3, 2022 Authors: Jakob Paul Leopold Krenn & Oriane Marina Rütsche Supervisor: Magnus Johansson Course: BUSN09 – Degree Project in MSc International Strategic Management Purpose: This thesis aims at analyzing the process from corporate sustainability strategy formulation to implementation in the EU manufacturing industry exemplified by eight companies of different countries of registration, size, legal forms, and industry sectors. Theoretical framework: While the emphasis in the literature is placed on strategy formulation, implementation has received less attention. READ MORE

  5. 15. The E-krona and Traceability of Your Payment Data : An analysis of the fundamental differences and privacy-related impacts of the Riksbank’s e-krona pilot in comparison with card-based transactions

    University essay from Uppsala universitet/Juridiska institutionen

    Author : Lovisa Stenbacka; [2022]
    Keywords : e-krona; traceability; payment data; data protection; law; financial secrecy; AML; rule of law; democracy; technology; legal informatics; legal policy; law and technology; constitutional provisions; DLT; blockchain; wallet-id; information security; fintech; financial technology; the Riksbank; central bank; money; Riksbanken; finansiell teknologi; e-kronan; digital centralbanksvaluta; statlig kontroll; centralbank; konstitutionella förpliktelser; demokrati; skydd för betaldata; skydd för personuppgifter; finansiell sekretess; banksekretess; penningtvätt; informationsteknologi; rättsinformatik; rättspolitik;

    Abstract : The Riksbank is currently investigating the possibility of producing a Central Bank Digital Currency in Sweden, called “e-krona”, implemented through an “e-krona network” on a platform based on Distributed Ledger Technology. By applying the methodology of legal dogmatics, legal informatics, and a legal policy perspective, this thesis examines and analyses some of the fundamental differences in Sweden’s current payment system for transactions at the point of sale, comparing debit card-based transactions with payments using the model of the Riksbank’s e-krona pilot. READ MORE