Essays about: "vulnerability exploitation"
Showing result 1 - 5 of 38 essays containing the words vulnerability exploitation.
-
1. Human Trafficking in Gauteng, South Africa : How do socio-economic factors influence the vulnerability of women to engage in sexual services and potential trafficking in Gauteng, South Africa?
University essay from Linnéuniversitetet/Institutionen för samhällsstudier (SS)Abstract : This research aims to investigate how socio-economic factors influence the vulnerability of women to engage in sexual services and potential trafficking in Gauteng, South Africa. This province is South Africa’s most prosperous one with an enormous flow of migrants and is therefore of interest to investigate. READ MORE
-
2. Syrian Refugees in Turkey: An Analysis of Role of the Labour Exploitation in their Integration into the Labour Market
University essay from Göteborgs universitet/Institutionen för globala studierAbstract : This study investigates the role of labour exploitation in the integration of Syrian refugees into the Turkish labour market. Vulnerability, control, and consent are key elements in shaping labour exploitation. Informal employment among Syrian refugees is common both within the formal and informal sectors, which makes the line between them blurry. READ MORE
-
3. Identifying Threat Factors of Vulnerabilities in Ethereum Smart Contracts
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : Ethereum is one of the top blockchain platforms that represents this second generation of blockchain technology. However, the security vulnerabilities associated with smart contracts pose significant risks to confidentiality, integrity, and availability of applications supported by Ethereum. READ MORE
-
4. Testing IoT Security : A comparison of existing penetration testing frameworks and proposing a generic framework
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : The Internet of Things (IoT) refers to the billions of physical devices linked to the Internet worldwide, integrating into various systems like healthcare, finance, and transportation. However, the rapid market expansion has led to software and hardware security shortcomings, leaving IoT devices vulnerable to cybercriminals. READ MORE
-
5. Female Former Child Soldiers Perception of Power : Females captured by the LRA's attitudes towards the people in power in the bush and its effects on them as women
University essay from Linnéuniversitetet/Institutionen för samhällsstudier (SS)Abstract : The research aims to understand how female former child soldiers describe the ones who had power over them in the bush of Lord’s Resistance Army (LRA) to understand how patriarchal beliefs in a society affect vulnerable women. The researcher wishes to enhance the importance of working against patriarchal beliefs and stopping child abductions for the sake of young women’s empowerment. READ MORE