Essays about: "peer to security"

Showing result 1 - 5 of 51 essays containing the words peer to security.

  1. 1. NATO and their gold card holders : An entanglement analysis of Sweden and Finland's decision to apply for membership in NATO

    University essay from Försvarshögskolan

    Author : Emelie Moregård; [2024]
    Keywords : Strategic culture; Sweden; Finland; NATO; entanglement analysis; strategic behaviour; security policy; foreign policy;

    Abstract : The aim of this paper is to gain a greater understanding of the meaning-making process behind Finland and Sweden’s decision to join NATO in 2022, and by so, deviate from their long-standing tradition of military non-alignment. Instead of solely pointing to the Russian invasion of Ukraine as the official reason for NATO membership this paper suggests that the concept of strategic culture can provide one with a greater understanding of their decision to join NATO. READ MORE

  2. 2. The Advent of ChatGPT and its Technological Integration in Education

    University essay from Malmö universitet/Institutionen för kultur, språk och medier (KSM)

    Author : Denial Brkic; Ioana-Raluca Johansson; [2024]
    Keywords : ChatGPT; didactic tool; EFL; GenAI; supporting tool; Swedish upper-secondary school;

    Abstract : Our study investigates the possibility of integrating ChatGPT, an AI text generative tool, as a didactic supporting tool within the Swedish upper-secondary school curricula. Particularly, it takes interest in the English foreign language teaching context and examines eight peer reviewed articles on the matter. READ MORE

  3. 3. Can Developer Data Predict Vulnerabilities? : Examining Developer and Vulnerability Correlation in the Kibana Project

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Johan Lövgren; [2023]
    Keywords : Open-Source; Vulnerability Identification; High-Risk Developers; Öppen Källkod; Identifiering av Sårbarheter; Högriskutvecklare;

    Abstract : Open-source software is often chosen with the expectation of increased security [1]. The transparency and peer review process of open development offer advantages in terms of more secure code. However, developing secure code remains a challenging task that requires more than just expertise. READ MORE

  4. 4. Attachment to parent among donor conceived teenagers

    University essay from Umeå universitet/Institutionen för psykologi

    Author : Jonathan Tuukkanen; Victor Dackland; [2023]
    Keywords : Donor conception; teenagers; non-genetic parent s ; attachment; Donationsbehandling; tonåringar; icke-genetiska föräldrar; anknytning;

    Abstract : Donor conceived (DC) teenagers are of interest as they are brought up in families where they have a genetic bond to one parent and lack a genetic bond to the other. The aim of this study was to investigate the attachment of DC teenagers to their genetic and non-genetic parent and whether the genetic link affects the attachment. READ MORE

  5. 5. Can Developer Data Predict Vulnerabilities? : Examining Developer and Vulnerability Correlation in the Kibana Project

    University essay from Uppsala universitet/Datalogi

    Author : Johan Lövgren; [2023]
    Keywords : open-source; vulnerability identification; high-risk developers; öppen källkod; identifiering av sårbarheter; högriskutvecklare;

    Abstract : Open-source software is often chosen with the expectation of increased security. The transparency and peer review process of open development offer advantages in terms of more secure code. However, developing secure code remains a challenging task that requires more than just expertise. READ MORE