Advanced search

Showing result 1 - 5 of 963 essays matching the above criteria.

  1. 1. Closing loops, opening minds. The role of social capital for knowledge sharing relationships in circular value networks.

    University essay from Handelshögskolan i Stockholm/Institutionen för företagande och ledning

    Author : Jacopo Angeloni; Isak Axelson; [2024]
    Keywords : Social capital; Knowledge sharing; Circular economy; Value networks; Glass recycling;

    Abstract : In the wake of the threats of climate change and natural resource depletion, an increasing number of companies are aligning their strategies and operations with the concept of the circular economy. The circular economy transition can be enabled by companies adopting novel circular business models, embracing collaboration and knowledge sharing between partners in broad circular value networks. READ MORE

  2. 2. Evaluation of Open-source Threat Intelligence Platforms Considering Developments in Cyber Security

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Love Andrén; [2024]
    Keywords : Threat Intelligence; Open-source; Information Sharing; Cyber Security;

    Abstract : Background. With the increase in cyberattacks and cyber related threats, it is of great concern that the area still lacks the needed amount of practitioners. Open-source threat intelligence platforms are free platforms hosting related information to cyber threats. READ MORE

  3. 3. Competition of Interest: Rebel Group Rivalry in Intrastate Conflict : A Qualitative Study of Colombia and Algeria 1994-1999

    University essay from Uppsala universitet/Institutionen för freds- och konfliktforskning

    Author : Vilhelm Hayen; [2024]
    Keywords : Rebel governance; Inclusive service provision; rebel; rebels; Algeria; Colombia; ELN; GIA; civil war; Colombian conflict; Algerian civil war; 1990s;

    Abstract : Although a relatively new research field, many quantitative studies have over the past decade been undertaken examining rebel governance as an insurgent practice in intrastate conflicts around the globe. Nevertheless, gaps persist in the understanding of how common aspects of rebel governance, such as inclusive service provision, affect competing non-state actors in multi-rebel group conflict landscapes. READ MORE

  4. 4. Risky Business: Quantitative Risk Assessments as Enabling Devices in Cybersecurity

    University essay from Lunds universitet/Avdelningen för Riskhantering och Samhällssäkerhet

    Author : Colette Alexander; [2024]
    Keywords : Quantitative risk assessment; cybersecurity; enabling device; Technology and Engineering;

    Abstract : Quantitative risk assessment (QRA) is a growing practice in the cybersecurity field. This paper examines QRA the use in various industries and the problems with its use. The focus of the qualitative research is to understand why cybersecurity organizations might want to use QRA even if it produces untrue and potentially problematic results. READ MORE

  5. 5. Onboarding New Users for Initial Creation of Photo Book in Mobile Application

    University essay from Umeå universitet/Institutionen för tillämpad fysik och elektronik

    Author : Ida Aavik; [2024]
    Keywords : Onboarding; User experience; Photo book; Usability; Interaction design; Onboarding; Användarupplevelse; Fotobok; Användbarhet; Interaktionsdesign;

    Abstract : Photography holds great significance by capturing memories and sharing stories. Today, the average user has around 2,000 photos on their smartphone, many of which go unnoticed. Once Upon is a mobile application launched in 2017, where users can create photo books to collect their memories in a physical book. READ MORE