Essays about: "rules of targeting"

Showing result 1 - 5 of 20 essays containing the words rules of targeting.

  1. 1. The immoral legality of targeting child soldiers : A humanitarian dilemma

    University essay from Försvarshögskolan

    Author : Ellen Andersson; [2023]
    Keywords : Child soliders; International Humanitarian law; rules of targeting; Direct Participation in Hostillites;

    Abstract : The thesis functions as an overview of the protection of children used in hostilities and their targetability under international law, primarly in international humanitarian law. The author questions the established presumption, that children directly participating in hostilities, shall be equally targetable as their adult colleges and counter parts. READ MORE

  2. 2. GitBark : A Rule-Based Framework for Maintaining Integrity in Source Code Repositories

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Elias Bonnici; [2023]
    Keywords : Source Code Integrity; Version Control System; Git; Threat modeling; Digital signatures; Källkodsintegritet; Versionshanteringssystem; Git; Hotmodellering; Digitala signaturer;

    Abstract : In today’s digital landscape, maintaining the integrity of source code is crucial for delivering reliable and trustworthy software solutions. However, the increasing prevalence of attacks targeting source code repositories and version control systems (VCSs) poses significant challenges to source code integrity. READ MORE

  3. 3. The COVID-19 pandemic impact on Information Security Policy compliance in regional healthcare. : An empirical study

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Melker Fält; Bartlomiej Minierski; [2022]
    Keywords : Computer Science; Information Security Policy; Information Security Policy compliance; COVID-19 pandemic; Healthcare;

    Abstract : Information Security (InfoSec) is a broad term used to describe the study of how to protect sensitive data from unauthorized access, modification, or deletion. InfoSec is commonly used within companies and organisations to facilitate the secure use of digital systems, taking its shape in the form of technical solutions as well as rules and guidelines defined in a so-called Information Security Policy (ISP). READ MORE

  4. 4. Adpocalypse : The new privacy legislations’ impact on digital advertisement in Sweden

    University essay from Luleå tekniska universitet/Institutionen för ekonomi, teknik, konst och samhälle

    Author : Rebecca Hansson; [2022]
    Keywords : Media Planning; Digital Ads; Third-party tracking; Data mining; Internet Privacy Concerns and Regulations;

    Abstract : 2020 and 2021 were shocking years for advertising and digital marketing since both Apple and Google announced that they would limit third-party tracking. Google and Apple’s news created turmoil in the marketing business sector since advertisers no longer will be able to target and track the success of their digital ads as efficiently and effectively. READ MORE

  5. 5. Web Information Extraction of Online Retailer Product Pages With Conditional Random Fields

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Patrik Svensson; [2022]
    Keywords : ;

    Abstract : Web information extraction is the process of applying techniques to automatically extract structured or unstructured information from documents on the web. This process is tedious and often associated with human-defined rules, such as targeting specific values. READ MORE