Search for dissertations about: "Threat"
Showing result 11 - 15 of 679 swedish dissertations containing the word Threat.
-
11. When water becomes a threat : Risk assessment and risk management plans for floods and drinking water in Swedish practice
Abstract : Water is an essential but vulnerable resource. A shortage of good quality drinking water is a threat to human health and society as a whole. Abundance of water in the form of floods can also be a serious threat which can have consequences for the drinking water supply. To reduce these risks there is a need for systematic risk reduction. READ MORE
-
12. On Privacy and Security in Smart Connected Homes
Abstract : The growth and presence of heterogeneous sensor-equipped Internet-connected devices inside the home can increase efficiency and quality of life for the residents. Simultaneously, these devices continuously collect, process, and transmit data about the residents and their daily lifestyle activities to unknown parties outside the home. READ MORE
-
13. International Humanitarian Law and Influence Operations : The Protection of Civilians from Unlawful Communication Influence Activities during Armed Conflict
Abstract : Contemporary armed conflicts are not only fought with physical means and methods. Increasingly, in order to achieve military and political objectives, parties to armed conflicts use communication activities to influence individuals. Armed groups such as ISIS use online propaganda to instil terror and recruit new fighters to their cause. READ MORE
-
14. On Threat Assessment and Decision-Making for Avoiding Automotive Vehicle Collisions
Abstract : Road traffic accidents are one of the world’s largest public health problems. In the EU alone, traffic accidents cause approximately 1.8 million injuries and 43.000 fatalities each year. READ MORE
-
15. Efficiency and Automation in Threat Analysis of Software Systems
Abstract : Context: Security is a growing concern in many organizations. Industries developing software systems plan for security early-on to minimize expensive code refactorings after deployment. In the design phase, teams of experts routinely analyze the system architecture and design to find potential security threats and flaws. READ MORE