Sökresultat:
3198 Uppsatser om \\\\\\\\\\\\\\\'human security\\\\\\\\\\\\\\\' - Sida 4 av 214
Är handdatorer säkra nog för hälso- och sjukvården?
The aim of this report is to discuss computer security in handheld computers and to find out the appropriate security level that must be implemented to be able to use handheld computers within the Swedish healthcare system. Most healthcare centers are using some kind of electronic journals for their patient´s data today, but there are still a number of clinics that are usingthe old paper-system. On a few places in Sweden the use of handheld computers at the clinics has already started, but in the United States the use of handheld computers in the medical area is already widespread and from this we can see a lot of different situations where it is useful and effective to work with handheld computers. The security demands on patient´s journals are high and regulated in both Swedish law and regulations from the National Swedish Board of Health and Welfare. The law does not have any substantial demands, but states that there should be an adequate security level based on the nature of the information and the costs.
Technologised Parenthood: An Ethical Implacation of Human Reproductive Cloning
Science and technology has been the bedrock of human growth and dynamism. Man has over the years distinguished his existence from all other beings by his ability to champion and fashion his existence. Among his tools is biotechnology which actually attenuates the fears of aging and death.Human reproductive cloning stands out as one of the means through which biotechnology plans to achieve this perfect existence for man. Technological advancements in the field of biotechnology are now in the threshold of human procreation.Human reproductive cloning is seen as an assisted method of reproduction which creates a newborn that is genetically identical to another human being.Human reproductive cloning as a technology and as a means of reproduction is not without its pros and cons. In as much as the technology promises to mention but a few, hope for the infertile couples and single parents, as well as the hope of reproduction without passing on hereditary diseases; it at the same time beeps some flashes of worry.
Säkerhetsutvärdering certifikatserver i stället för aktiva kort
Business and organizations use computer network in a greater extension than ever before, especially for business-critical use. That increase the demand of security for all systems, both against internal and external threats. The demand on the authentication method used today increases. Today they normally uses password or some kind of smart card. I will performa literature study that will investigate the possibility to increase the security in authentication of users without the use of extra hardware.
Säkra kommunikationskanaler i en distribuerad heterogen miljö
The systems environments of today are often distributed and heterogeneous. These kind of systems have several advantages but also disadvantages. One problem is how to keep them secure.The security problems in these environments are mainly due to the communication between the connected computers. It is relatively easy to tap these communication channels from information. There is also a need for the possibility to secure these channels from modification of sent information and to be able to verify the sender and receiver of information in a secure manner.
Container Security Initiative - En diskursanalys utifrån teorier om det il/legala
Container Security Initiative was launched in 2002 by the US Customs and Border Patrol in order to secure the global flow of containers destined for USA. This thesis attempts to analyze Container Security Initiative in relation to a possible future scenario made by the weapons industry where the state's global traderoutes are being subject to militarization. A development which is partly based on the threat posed by global illegal trade. The latter is discussed and defined based on current research made by Carolyn Nordstrom, Moíses Naím and theories on the cosmopolitan perspective made by Ulrich Beck. Strategy documents concerning Container Security Initiative are then analyzed in terms of discourse to try to say something about what the program indicates.
Framtagning av en informationssäkerhetspolicy
This report was made for the company HordaGruppen AB to investigate how information security was handled. This report fits in the Master program of Internet Technology at School of Engineering in Jönköping University in Sweden.The question at issue was how you protect your information against different threats. One question was how to make an information security policy and which guidelines you can follow in the Swedish Standard, SS-ISO/IEC 17799:2000.Another question was to investigate the information sources at the company and which threats there are against it.The work begins with a presentation about information security for the chief of information and the chief of quality in the company. The next thing was to do a survey of as thing are at present with a tool from Länsteknikcentrum called ?Infosäkpulsen?.
Value creation- How can companies optimize the human capital
The thesis aims to examine how companies optimize the human capital from a value creation perspective. The value creation will be related to transfer of knowledge, recruitment, staff turnover and development. The thesis has a deductive approach and six qualitative interviews have been conducted. The results from the interviews will be strengthened with a quantitative data analysis of two measurements; value added per employee and human capital efficiency. The theoretical framework includes definitions of human capital.
WLAN : Oskyddad och okontrollerad datakommunikation
This master?s thesis investigates the technology and security awareness associated with wireless networks (WLAN). It has been stated by the media and theories that many wireless networks are unprotected. This has sparked an interest to investigate the phenomenon in the Jonkoping region. The study is based on the following research questions:- What security weaknesses are present with the WLAN-technology and how can these be avoided?- How does the wireless infrastructure in the Jonkoping region look like?- Why do companies implement the WLAN-technology?- Are the companies aware of the risks involved with WLAN?We conducted this study in three steps; the first step was to hack a wireless network in a controlled environment in order to investigate the weaknesses of the commonly used security measures.
USA:s syn på Turkiet, från 1997 fram till våren 2007
The aim of this essay is to analyze the political interests of the United States Government in Turkey, from 1997 to spring 2007, using a qualitative method. I will also analyze any strategic changes during this period, by using theories of realism, particularly Structure Realism and Rational Choice. Using the Rational Actor Model (RAM), I will analyze how nation states such as the United States act in the political arena in Turkey. How can the US Government legitimize the support to Turkey and at the same time criticize there democratic deficit and their view on human rights. Turkey has been an American Military Ally, via NATO since 1952 and its demographic situation has changed since the Cold War.
Sveriges säkerhetspolitik under 2000-talet : En analys ur ett liberalt och ett realistiskt perspektiv
The purpose of this study was to examine and explain Sweden?s defence and security policy during the twenty-first century. The method that was used in this research was a case study. The material that was used were government documents focusing on this area of policy, and numerous books concerning the theoretical perspectives on international relations and defence security policy. The study is of an explaining art and the analysis explains Sweden?s security and defence policy during the twenty-first century. The analysis explains this by testing it against a liberal and a realist view on international relations. The conclusion of the study is that Sweden?s defence and security policy has been liberal during this time period ? and still is.
Humankapitalets roll vid företagsvärdering
This study investigates a method for identifying human capital and its effect on company valuation. We devise a measure for the efficiency of human capital based on the personnel cost. We include all companies listed in the financial and industry sector on Nasdaq OMX Stockholm in an attempt to examine human capital and its effect on firm valuation. Our results indicate that a higher efficiency of human capital has a positive effect on return on assets. However, we find that our measure can be interpreted in two ways; either as a firm?s level of human capital efficiency or its dependency on human capital, to achieve its net sales and revenue.
Analys av datakommunikationssäkerhet för VoIP-protokoll
Voice over IP (VoIP) is a relatively new technology that enables voice calls over data networks.With VoIP it is possible to lower expenses, and increase functionality and flexibility. FromSwedish Armed Forces point of view, the security issue is of great importance, why the focus inthis report is on the security aspect of the two most common open-source VoIP-protocols H.323and SIP, some of the most common attacks, and counter-measures for those attacks.Because of the level of complexity with a network running H.323 or SIP, and the fact that it hasyet to stand the same level of trial as of traditional telephony, a VoIP-system includes manyknown security-issues, and probably at present many unknown security flaws.The conclusion is that it takes great knowledge and insight about a VoIP-network based onH.323 or SIP to make the network satisfyingly safe as it is today, and is therefore perhaps not asuitable solution for the Swedish Armed Forces today for their more sensitive communications..
Value creation- How can companies optimize the human capital
The thesis aims to examine how companies optimize the human capital from a value creation perspective. The value creation will be related to transfer of knowledge, recruitment, staff turnover and development. The thesis has a deductive approach and six qualitative interviews have been conducted. The results from the interviews will be strengthened with a quantitative data analysis of two measurements; value added per employee and human capital efficiency. The theoretical framework includes definitions of human capital.
En undersökning i datasäkerhet för hemanvändare - Är det nödvändigt att använda brandvägg?
The emphasize of this study is to evaluate security issues for home users
having a personal computer connected to the Internet. It focus on the usage of
advantages and disadvantages when using a firewall while connected to the
Internet.
The hypothesis is that it gives a better protection to install and use a
firewall compared not to do so, due to security flaws in the operating system.
The prediction was tested on a home user's personal computer. The testwork was
divided into two major tests, each of them performed with, respectively
without, a firewall. These major tests were divided into five smaller semi
tests. The first semitest without a firewall suffered from a virus or worm
attack resulting in loss of data and log files.
Betalningssätt via webben : En studie om konsumenters ansedda kunskap angående olika betalningssätt via webben och deras säkerhet
The e-commerce in Sweden has increased each year for the past several years, but still just over half of all the consumers feels worry about payment security. This could be the reason why over half of the consumers just shopped about one time on the Internet during the whole year of 2009. Another reason could be that the many consumers have a lack of trust to the different payment methods that are available during payment on the Internet, because they might don't possess enough knowledge regarding the payment methods and their security. If the consumers were to gain more knowledge about the payment methods and their security, it may lead to that the they would feel more comfortable when shopping online, and do it more frequently. It is this that will be investigated in this paper.The purpose of the paper is to research if consumers believed knowledge concerning the different payment methods available on the web and their security influence the consumers trust in the payment methods.