Essays about: "protection of data"
Showing result 1 - 5 of 861 essays containing the words protection of data.
-
1. Provisions of social workers to victims of internal child trafficking in Uganda: A case study of children living on the streets of Kampala City
University essay from Göteborgs universitet/Institutionen för socialt arbeteAbstract : Human trafficking has become a serious global challenge in the recent past. Regarded as a global epidemic, it has triggered an increase in numbers of children living on the streets especially in countries where internal trafficking in children is a common social vice. READ MORE
-
2. Force Type ID, a Two-Factor-Authentication based on force sensitive keys and password
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : The conventional computer keyboard keys work as binary switch systems and have stayed the same since the invention of typewriters. With the accelerated progress in forcesensing technology, force-sensitive keyboards have become viable consumer products due to advancements in manufacturing. READ MORE
-
3. Peak Load Shaving Strategies of an Office Building : A Case Study at AirSon
University essay from Högskolan i Halmstad/Akademin för företagande, innovation och hållbarhetAbstract : Introduction: The global demand for renewable energy is expected to grow annually due to rising electricity consumption and economic and regulatory incentives. Efficient consumption and management of electricity consumption can support this trend (shifting from fossil resources to renewable resources) and benefit companies economically by reducing peak loads, reducing subscription costs, and protecting companies' power systems and networks. READ MORE
-
4. A Comparative Analysis of SecurityServices Using Identity and AccessManagement (IAM)
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background: Identity and Access Management (IAM) is a critical IT securityframework for managing digital identities and resource access. With roots datingback to ancient civilizations, IAM has evolved from basic authentication to sophisticated methods. READ MORE
-
5. Dynamic Risk Management in Air Traffic Management System Failures
University essay from Lunds universitet/Avdelningen för Riskhantering och SamhällssäkerhetAbstract : Context This research looks at managing uncertainty and recovery processes following failure of a sociotechnical system. The provision of Air Traffic Services (ATS) is an essential service that must continue to function supporting at a minimum; medical flights, search and rescue operations, humanitarian aid, State and military flights (as demonstrated during the recent global pandemic). READ MORE