Search for dissertations about: "data science in public policy"
Showing result 11 - 15 of 85 swedish dissertations containing the words data science in public policy.
-
11. Adult Education at Auction : On Tendering-Based Procurement and Valuation in Swedish Municipal Adult Education
Abstract : Our understanding of adult education’s purpose and value is linked to how we think ‘good’ education should be organised and provided. This thesis explores the interplay between organisation and values by looking at how conceptualisations and valuations of adult education are affected when private providers become involved in public education. READ MORE
-
12. Handling severe uncertainty in strategic project appraisal : Methods and applications of context analysis
Abstract : The long-term success or failure of a strategic project is largely shaped by its context. Therefore, the assessment of the external factors influencing the fulfilment of project long-term goals is vital for the effective project appraisal and planning. READ MORE
-
13. Disease surveillance systems
Abstract : Recent advances in information and communication technologies have made the development and operation of complex disease surveillance systems technically feasible, and many systems have been proposed to interpret diverse data sources for health-related signals. Implementing these systems for daily use and efficiently interpreting their output, however, remains a technical challenge. READ MORE
-
14. Towards sustainable development : Indicators as a tool of local governance
Abstract : Beginning in the 1990s, sustainability indicators have rapidly been developed in different political contexts to measure progress towards reaching sustainable development. Previous research has largely focused on developing models and criteria for defining indicators in order to identify scientifically sound systems. READ MORE
-
15. Understanding Certificate Revocation
Abstract : Correct certificate revocation practices are essential to each public-key infrastructure. While there exist a number of protocols to achieve revocation in PKI systems, there has been very little work on the theory behind it: Which different types of revocation can be identified? What is the intended effect of a specific revocation type to the knowledge base of each entity?As a first step towards a methodology for the development of reliable models, we present a graph-based formalism for specification and reasoning about the distribution and revocation of public keys and certificates. READ MORE