Essays about: "what is information strategy"

Showing result 6 - 10 of 473 essays containing the words what is information strategy.

  1. 6. Financial Technology's effect on the Swedish banking Industry - A study on competition and competitive strategies

    University essay from Lunds universitet/Produktionsekonomi

    Author : Douglas Wilsby; Knut Winström; [2023]
    Keywords : FinTech; competition; competitive strategy; digitalisation; technology; Open Banking; Strategy; Business model; Digital.; Technology and Engineering;

    Abstract : Titel: Financial Technology's effect on the Swedish banking Industry - A study on competition and competitive strategies Authors: Douglas Wilsby, Industrial Engineering 2018, LTH; Knut Winström, Mechanical Engineering 2018, LTH Supervisor: Ingela Elofsson, Division of Production Management at Faculty of Engineering LTH Background: The rapid advancement of technology has the potential to disrupt established industries, including the banking sector. Companies that fail to adapt to technological shifts risk losing their competitive advantage and face challenges. READ MORE

  2. 7. On the strategic abilities gained by using knowledge-based strategies for multi-agent teams playing against nature

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Sam Maltin; Simon Rosén; [2023]
    Keywords : ;

    Abstract : Analogous to how the Knowledge-Based Subset Construct (KBSC) can transform games of imperfect information against nature into games of perfect information, making it easier to find winning strategies for objectives in these games, the multi-agent knowledge-based subset construct (MKBSC) can be used to find winning strategies in multi-agent games of imperfect information. The difference between the two algorithms is that the generalized version can be applied multiple times, which is interpreted as the agent’s considering not just their own knowledge of the game, but also their knowledge of the other agents, and the knowledge of the other agent’s knowledge about their own knowledge, etc. READ MORE

  3. 8. Towards Building Privacy-Preserving Language Models: Challenges and Insights in Adapting PrivGAN for Generation of Synthetic Clinical Text

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Atena Nazem; [2023]
    Keywords : Generative Adversarial Networks; privacy-preserving language models; clinical text data; reinforcement learning; synthetic data;

    Abstract : The growing development of artificial intelligence (AI), particularly neural networks, is transforming applications of AI in healthcare, yet it raises significant privacy concerns due to potential data leakage. As neural networks memorise training data, they may inadvertently expose sensitive clinical data to privacy breaches, which can engender serious repercussions like identity theft, fraud, and harmful medical errors. READ MORE

  4. 9. The granddaddy of underreaction events: Post-earnings announcement drift and information noisiness on the Swedish market

    University essay from Handelshögskolan i Stockholm/Institutionen för redovisning och finansiering

    Author : Sofia Berlin; Gustav Sandelin; [2023]
    Keywords : Post-earnings announcement drift; market efficiency; earnings surprises; information noisiness; stock price synchronicity;

    Abstract : This paper aims to answer the question of whether there is an existence of post-earnings announcement drift on the Swedish stock market and to what extent it can be explained by information noisiness. A sample of publicly listed firms on the Swedish stock market from 2002 to 2019 is used and the research design includes four different approaches to estimating earnings surprises which is a crucial step in investigating PEAD. READ MORE

  5. 10. Masking revealing hardware attributes in the source code of a hypervisor : A study exploring strategies to hide the identity of virtual environments during malware analysis

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Kevin Engström; Robin Lenz; [2023]
    Keywords : Sandbox detection; analysis evasion; virtual environment; masking;

    Abstract : Background: Malware is responsible for a significant part of the ever increasing cost of cyberattacks. Malware analysis is an important part in minimizing these costs. READ MORE