Essays about: "security behavior"
Showing result 1 - 5 of 211 essays containing the words security behavior.
-
1. The PKK impasse: Traversing the complex nature of Turkish-Swedish relations.
University essay from Lunds universitet/Statsvetenskapliga institutionenAbstract : This thesis delves into the complex nature of Swedish-Turkish relations in the context of Sweden’s NATO-application, focusing primarily on the presence of the PKK in the bilateral relations. The dynamics of this framework, highlighted by Turkey’s veto to the Swedish NATO-application, signifies a trajectory where security is increasingly a prioritized domain in political agendas globally. READ MORE
-
2. A Seed has been Planted : Examining public-private cooperation in the civil preparedness sector of food supply and drinking water
University essay from FörsvarshögskolanAbstract : The resurgence and increased use of the total defense concept in the political landscape of Sweden comes in a time of global geopolitical uncertainties and multifaceted security crises. Despite its stated importance, how the private sector should be incorporated into this structure remains somewhat unclear. READ MORE
-
3. Examining Bounded Rationality Influences on Decisions Concerning Information Security : A Study That Connects Bounded Rationality and Information Security
University essay from Stockholms universitet/Företagsekonomiska institutionenAbstract : This study investigates the impact of bounded rationality on information security decisions in public Swedish authorities. The research addresses how cognitive limitations and organizational dynamics shape decisions in this area. READ MORE
-
4. Gaining Social Power In a Time of Conflict : A case study on how the two superpowers China and the US are using security branding on Twitter to gain social power during an ongoing war.
University essay from Högskolan Väst/Institutionen för ekonomi och itAbstract : How are the two superpowers of the world using Twitter as a platform for gathering global support for their policies when tweeting about an ongoing international conflict? That is the question that is answered in this thesis through a small-N case study. A mixed-method content analysis, based on security branding and generic framing, was applied to the data to determine how security branding is used by the actors to acquire social power. READ MORE
-
5. Investigations and Development in the Area of Automated Security Evaluation of Android Devices with Focus on Bluetooth
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Bluetooth is a technology that has been implemented in over 5 billion devices and therefore has a considerable impact. It is the dominant technology for shortrange wireless communication. READ MORE