Essays about: "thesis in securing data"

Showing result 11 - 15 of 71 essays containing the words thesis in securing data.

  1. 11. Playing the game of law and healthcare – Non-binary people's access to and experiences of trans-specific healthcare in Finland

    University essay from Lunds universitet/Rättssociologiska institutionen

    Author : Emma Liimatta; [2022]
    Keywords : non-binary; trans; gender reaffirmation; trans-specific healthcare; legal gender recognition; Social Sciences;

    Abstract : For non-binary people the law is not securing trans-specific healthcare in Finland. The current regulation is built on understanding of gender as binary and according to the Act on Legal Recognition of the Gender of Transsexuals (563/2002) a person can be confirmed to belong to the “opposite gender” if she/he fulfils the preconditions. READ MORE

  2. 12. Deal or no deal: A qualitative study examining how the entrepreneur's gender affects business angels' willingness to invest during the initial interaction

    University essay from Handelshögskolan i Stockholm/Institutionen för företagande och ledning

    Author : Emma Dubo; Isabelle Norberg; [2022]
    Keywords : Business angel; Equity financing; Gender; Self-disclosure; Signaling;

    Abstract : Securing external equity financing from business angels (BAs) has been considered to be more difficult for female entrepreneurs in comparison to men and the underlying mechanisms for the disparity have been discussed. Some scholars argue that structural dissimilarities serve as one of the possible explanations, while others argue that female founders experience discrimination. READ MORE

  3. 13. "What if someone steals it?" - Hands-on evaluation of the software security work of a networked embedded system

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Adina Borg; Hedda Klintskog; [2022]
    Keywords : Technology and Engineering;

    Abstract : As information technology has grown and evolved, so has the need of securing the information. It is important to evaluate both the security of systems and the methods which are used for the evaluation. One method for finding security vulnerabilities in a system is penetration testing. READ MORE

  4. 14. The DAC and primary law: effectiveness of taxpayer’s rights to privacy and personal data protection

    University essay from Lunds universitet/Institutionen för handelsrätt

    Author : Jacopo Varallo; [2022]
    Keywords : Tax; Tax Law; EU Tax Law; EU Law; European Union; DAC; DAC7; Administrative Cooperation; Privacy; Data Protection; Exchange of Information; Reporting Obligation; Digital Platforms; Law and Political Science;

    Abstract : In a time where it is believed that the administrative cooperation between the Members States, in the form of exchange of information and, in particular, thought the mandatory automatic exchange of information without preconditions, is the most effective means of enhancing the correct assessment of taxes in cross-border situations, the bulk of information exchanged increased enormously. As the European Union took the lead in securing the creation of a legal ecosystem where the rights to privacy and personal data protection are effectively safeguarded, this trend poses significant concerns. READ MORE

  5. 15. Opportunity framing - Critical junctures and tough choices in the MedTech industry in Sweden

    University essay from Lunds universitet/Produktionsekonomi

    Author : Axel Åkeson; [2022]
    Keywords : Critical junctures; Financing; Innovation; MedTech; Start-up; Technology strategies; University spinout. ; Technology and Engineering;

    Abstract : Background: In today’s competitive market, renewal through innovation is of utmost importance to stay relevant. Creating a start-up is associated with great uncertainty and doing so within the heavily regulated MedTech industry, puts even higher demands on a start-up. READ MORE