Search for dissertations about: "Threat"

Showing result 11 - 15 of 679 swedish dissertations containing the word Threat.

  1. 11. When water becomes a threat : Risk assessment and risk management plans for floods and drinking water in Swedish practice

    Author : Viveca Norén; Kevin Bishop; Beatrice Hedelin; Lars Nyberg; Sven Halldin; Kurt Petersen; Uppsala universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Flood; Drinking water supply; Risk management; Risk assessment; Flood risk management plan FRMP ; Integrated flood management IFM ; Tools and methods; Practice compared to theory; Sweden; Municipalities; Interview study; Document study; Earth Science with specialization in Environmental Analysis; Geovetenskap med inriktning mot miljöanalys;

    Abstract : Water is an essential but vulnerable resource. A shortage of good quality drinking water is a threat to human health and society as a whole. Abundance of water in the form of floods can also be a serious threat which can have consequences for the drinking water supply. To reduce these risks there is a need for systematic risk reduction. READ MORE

  2. 12. On Privacy and Security in Smart Connected Homes

    Author : Joseph Bugeja; Andreas Jacobsson; Paul Davidsson; Marc Langheinrich; Malmö universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; smart connected homes; Internet of Things; smart homes devices; smart home data; threat identification; risk analysis; privacy; security; vulnerability assessment; mitigations; threat agents;

    Abstract : The growth and presence of heterogeneous sensor-equipped Internet-connected devices inside the home can increase efficiency and quality of life for the residents. Simultaneously, these devices continuously collect, process, and transmit data about the residents and their daily lifestyle activities to unknown parties outside the home. READ MORE

  3. 13. International Humanitarian Law and Influence Operations : The Protection of Civilians from Unlawful Communication Influence Activities during Armed Conflict

    Author : Pontus Winther; Inger Österdahl; Jann Kleffner; Kjetil Mujezinović Larsen; Uppsala universitet; []
    Keywords : SAMHÄLLSVETENSKAP; SOCIAL SCIENCES; International Humanitarian Law; IHL; Geneva Conventions; Laws of Armed Conflict; LoAC; International Law; Armed Conflict; International Armed Conflict; IAC; Non-international Armed Conflict; NIAC; Occupation; Civilians; Civilian Population; Communication Influence Activities; Influence Operations; Psychological Operations; Threat; Coercion; Compulsion; Humane Treatment; Outrages Upon Personal Dignity; Cruel Treatment; Inhuman Treatment; Mental Torture; Public International Law; Folkrätt; Juridik med inriktning mot folkrätt;

    Abstract : Contemporary armed conflicts are not only fought with physical means and methods. Increasingly, in order to achieve military and political objectives, parties to armed conflicts use communication activities to influence individuals. Armed groups such as ISIS use online propaganda to instil terror and recruit new fighters to their cause. READ MORE

  4. 14. On Threat Assessment and Decision-Making for Avoiding Automotive Vehicle Collisions

    Author : Mattias Brännström; Chalmers tekniska högskola; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; collision avoidance; decision-making; active safety; intersection collisions; rear-end collisions; collision mitigation; threat assessment; autonomous braking; automotive safety;

    Abstract : Road traffic accidents are one of the world’s largest public health problems. In the EU alone, traffic accidents cause approximately 1.8 million injuries and 43.000 fatalities each year. READ MORE

  5. 15. Efficiency and Automation in Threat Analysis of Software Systems

    Author : Katja Tuma; Göteborgs universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Automation; Secure Software Design; Security Compliance; Threat Analysis Modeling ; Secure Software Design; Threat Analysis Modeling ; Automation; Security Compliance;

    Abstract : Context: Security is a growing concern in many organizations. Industries developing software systems plan for security early-on to minimize expensive code refactorings after deployment. In the design phase, teams of experts routinely analyze the system architecture and design to find potential security threats and flaws. READ MORE