Essays about: "security light"

Showing result 1 - 5 of 278 essays containing the words security light.

  1. 1. Israel, Russia and the US: A Strange Triangular Relationship : An analysis of an unexpected alliance and its rationality

    University essay from Linnéuniversitetet/Institutionen för samhällsstudier (SS)

    Author : Alfred Lovnér; [2024]
    Keywords : International Relations; Political Influence; Security; Peace; Development;

    Abstract : The relationship between Israel and the US, as well as Israel and Russia are well documented, as it serves as a key aspect within the struggle for power and influence within the Middle East. However much research has been made on the topic, few have analysed how the relationship between Israel and the two others have affected the three, creating what could only be viewed as a blindspot within scholarship on the topic, as the relationships did not start in, nor are maintained within a vacuum. READ MORE

  2. 2. IT security expert’s perceptions of cybersecurity when working remotely compared to working in the office : A quality study on Swedish insurance companies

    University essay from Uppsala universitet/Informationssystem

    Author : Kristoffer Kullander; Mathilda Cselenyi; [2024]
    Keywords : Cyber security; cyber threats; cybersecurity awareness; remote work; Protection Motivation Theory; Cybersäkerhet; cyberhot; säkerhetsmedvetenhet; distansarbete; Protection Motivation Theory;

    Abstract : Teleworking has become a significant aspect of working life, especially after the outbreak of the COVID-19 pandemic, which accelerated the trend of teleworking. However, this shift has increased the risk of cyber threats and security risks. READ MORE

  3. 3. The swing of the pendulum: Sweden's pivot to NATO : A case of small states' shift in security policy

    University essay from Försvarshögskolan

    Author : Irena Bonnier; [2024]
    Keywords : Security and defence policy; Sweden; NATO; Small states studies; Deterrence; Shelter theory s political military dimension; Realism; Foreign Policy Change; Domestic determinants of small states security policy; Process-tracing; Säkerhets- och försvarspolitik; Sverige; NATO; Småstatsteori; Avskräckning; Vindskyddsteorins politiska militära dimension; Realism; Utrikespolitisk förändring; Inhemska påverkansfaktorer på småstaters säkerhetspolitik; Processpårning;

    Abstract : Sweden is the only state in the Baltic Sea region currently not under NATO protection, which puts the state in a particularly vulnerable position. On 18 May 2022, Sweden officially deemed NATO alignment a more effective option of security strategy in projecting deterrence and dealing with the security challenges the state is facing, compared to a strategy of non-alignment which has been Sweden’s security posture for over 200 years. READ MORE

  4. 4. The Advent of ChatGPT and its Technological Integration in Education

    University essay from Malmö universitet/Institutionen för kultur, språk och medier (KSM)

    Author : Denial Brkic; Ioana-Raluca Johansson; [2024]
    Keywords : ChatGPT; didactic tool; EFL; GenAI; supporting tool; Swedish upper-secondary school;

    Abstract : Our study investigates the possibility of integrating ChatGPT, an AI text generative tool, as a didactic supporting tool within the Swedish upper-secondary school curricula. Particularly, it takes interest in the English foreign language teaching context and examines eight peer reviewed articles on the matter. READ MORE

  5. 5. Case Study: Assessing the Security of a ZigBee Smart HomeNetwork

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Robal Saker; Obaida Abu Issa; [2024]
    Keywords : ZigBee; vulnerabilities; smart home; technical user; non-technical user;

    Abstract : Utilizing the ZigBee protocol is pervasive in the context of smart homes, offering substantial convenience to individuals. However, smart home devices commonly handle significant quantities of real-world information, potentially giving rise to concerns related to information leakage. READ MORE