Essays about: "vulnerable environments"

Showing result 11 - 15 of 81 essays containing the words vulnerable environments.

  1. 11. BIM and GIS Integration for Disaster-Prone Environments: The Case Study of Post-Earthquake Reconstruction in Mexico City

    University essay from Jönköping University/JTH, Byggnadsteknik och belysningsvetenskap

    Author : Andrea Jazmin Diaz Guzman; [2023]
    Keywords : ;

    Abstract : Disasters are happening all around the world on multiple scales and intensities. Some countries are more vulnerable than others and they are forced to be resilient in this scenario. Nowadays, it has been proven the importance of digital tools for risk prevention. BIM and GIS are digital tools that have been used for diverse purposes. READ MORE

  2. 12. The CPTED principles in physical planning in Vivalla : An analysis of how safety and security can be improved through the design of urban environments in a particularly vulnerable area in Sweden

    University essay from KTH/Skolan för arkitektur och samhällsbyggnad (ABE)

    Author : Massara Sameer; Mathilda Brolin; [2023]
    Keywords : Broken Window; CPTED; Crime; Safety; Security; Situational Crime Prevention; Social sustainability; Rutin activity; Vivalla; Broken Window; Brott; CPTED; Rutinaktivitetsteorin; Situationell brottsprevention; Social hållbarhet; Säkerhet; Trygghet; Vivalla;

    Abstract : This study aims to investigate how physical planning can prevent crime and increase safety in an urban environment, with the theoretical starting point in Crime prevention through environmental design, CPTED, and the Vivalla area. Vivalla is located in Örebro and was chosen because it is a particularly vulnerable area. READ MORE

  3. 13. Supply Chain Incentive Alignment in Bottom of the Pyramid environments

    University essay from Lunds universitet/Teknisk logistik

    Author : Rawan Yacoub; [2023]
    Keywords : Supply chain incentive alignment; Supply chain incentives; Bottom of the pyramid; Base of the pyramid; Multinational Corporations; Technology and Engineering;

    Abstract : Background: Alleviating poverty is critical for achieving sustainability (Zomorrodi et al., 2019). READ MORE

  4. 14. HackerGraph : Creating a knowledge graph for security assessment of AWS systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Alexios Stournaras; [2023]
    Keywords : Cloud security; Knowledge graph; Attack graph; Vulnerability ssessment; Attack paths; Vulnerable-by-design systems; Cloudgoat; Molnsäkerhet; Kunskapsgraf; Attackgraf; Sårbarhetsanalysis; Sårbara miljöer; Cloudgoat;

    Abstract : With the rapid adoption of cloud technologies, organizations have benefited from improved scalability, cost efficiency, and flexibility. However, this shift towards cloud computing has raised concerns about the safety and security of sensitive data and applications. READ MORE

  5. 15. Visualization Of Cyber Threats : Visualization To Leading Operatives During Cybersecurity exercises

    University essay from Uppsala universitet/Institutionen för samhällsbyggnad och industriell teknik

    Author : Gustaf Tysk; [2023]
    Keywords : Situational Awareness; Common operational picture; Perception; Comprehension; Projection; Cybersecurity; Defense; Visualization;

    Abstract : The increasing dependence on digital infrastructure leaves individuals, societies and even nations vulnerable in the case of a cyberattack. To prepare for threats and attacks, cyberattacks be simulated in environments called cyber ranges. CYBER RANGE AND TRAINING ENVIRONMENT (CRATE), Sweden's cyber range, is an example of such an environment. READ MORE