Essays about: "minimizing authority"
Found 5 essays containing the words minimizing authority.
-
1. The effect of the IT/OT gap on the NIS 2 implementation
University essay from Stockholms universitet/Institutionen för data- och systemvetenskapAbstract : Cyber attacks are steadily increasing, and their impact is becoming more significant. To combat this, the European Union has created directives to enhance the cyber security in critical services in the Union, one example being the NIS 2 directive. READ MORE
-
2. Risk Communication of New Drugs : A qualitative interview study
University essay from Uppsala universitet/Institutionen för farmaciAbstract : Background: Pharmaceutical development has taken new ground in recent decades and placed new demands on the regulations. Since 2005, a risk management plan (RMP) has been required when applying for a first marketing authorization for a drug. The RMP forms the basis for how identified risks with the drug are to be managed. READ MORE
-
3. Indoor Radio Propagation Modelling with Antenna Placement Optimization
University essay from Lunds universitet/Matematisk statistikAbstract : The use of wireless communication has grown rapidly over the last three decades. The Swedish Post and Telecom Authority estimates that more than 80% of all mobile traffic is received or transmitted from within buildings and the number is expected to reach over 90% in the near future. READ MORE
-
4. How the Online Disinhibition Effect Affects the Online Video Game Industry
University essay from Uppsala universitet/Institutionen för speldesignAbstract : Extensive computer use is creating a society where its citizens are communicating outside the norm of real life. These diversions from real life communication behavior have been named the Online Disinhibition Effect (ODE). READ MORE
-
5. Vulnerability in a cyberattack : How DoS affects Swedish government authorities
University essay from Mittuniversitetet/Avdelningen för informations- och kommunikationssystemAbstract : With a growing development of technologies and the fact that many companies implements online services, an interruption in such service could cause problems for any kind of user by exploiting the vulnerabilities in these systems. The Swedish Armed Forces (SwAF) indicates that the development of the defensive ability must continue, since the vulnerability of the cyberenvironment becomes a greater interest for adversaries. READ MORE