Sök:

Sökresultat:

2177 Uppsatser om Administrative Security - Sida 10 av 146

Genus i förvaltningsrätten : En diskursanalys av LVM-domar

Gender in Administrative Court of Appeal - A discourse analysis of verdicts concerning compulsory drug treatmentThe purpose of this study was to examine gender discourses that could be identified inverdicts concerning compulsory drug treatment. A discourse analysis was conducted of 46verdicts from an administrative court of appeal, located in central Sweden. The main findingsof the study was that the descriptions of women, more often than men, are based on factorsother than their addiction, such as appearance and social environment. Men are in all casesdescribed by their addiction and on their own behavior. Women are presented as they riskvulnerability, while men are presented already suffer from vulnerability.

Den europeiska arresteringsordern : ett rättssäkert förfarande?

The European union started as an area of economic cooperation, but has developed into an area of cooperation in many legal fields. There are these days even cooperation when it comes to dealing with criminals. There is a new procedure called the European arrest warrant which goal is to make the extradition of criminals between the different member states in the European union more efficient. Sometimes when a state receives a European arrest warrant they have to extradite the person in question without doing any investigation of their own. The procedure is based on the principle of mutual recognition.

Bristfällig säkerhet inom trådlösa routrar med fokus på WPS

I denna rapport undersöks WPS-funktionen då det uppmärksammats säkerhetshåli den. Intervjuer, tester och observationer har gjorts för att undersöka problemenmed WPS. De tester och intervjuver som gjorts indikerar att säkerhetsbristen i WPS-funktionen har säkrats upp med extra funktioner..

Engångshjältar - Hur myter och symboler konstruerar nationalism på Balkan

This thesis is about how nationalism is constructed from two competing groups, Kosovo Albanian and Serbs. Kosovo for Serbs is a deep symbolic value that continues to be a Serbian identification. This is one of the main reasons why no Serbian politician has the courage to give it up. On the other side of the coin we have the Kosovo Albanians that only settles for independence. To recognize the independence for Kosovo could jeopardize the security for the Serbian minority living in Kosovo.

En jämförelse av krypteringsalgoritmer

Today the Internet is used more and more as a transportation for information. Much of the information is confidential and should not be read by those not privileged. To protect the information from unauthorized access cryptography can be applied. The cryptography algorithms in use today all have their pros and cons. They are therefore suited for different applications.

Gatuprostitution, varför där? - Fysisk planering och social säkerhetspåverkan på lokaliseringen av gatuprostitution i Göteborg

?Street prostitution, why there?? is about how the physical planning and physical environment affect the localization of street prostitution in Gothenburg. The aim is to increase the understanding of how social security is linked to man's immediate environment and are influenced by the physical environment. Important concepts that are explained in the paper are social security, prostitution, and physical planning.This study deals with theories about the factors that may influence why criminality localized to a specific area, such as legislation, urban planning and community. The study conducted interviews with the Gothenburg Police, Västra Götaland County Administrative Board, Gothenburg City, Stadsmissionen and Mikamottagningen.

Säkerhetshot och lösningar för privatpersoner med bredband

As more and more people gain access to broadband in their properties, the security threats get bigger. A lot more people also have computers that they carry home from work where they store important information concerning the company. The information stored on theese computers can be very easy to retrieve if you have the will and the skill to do it. Very few people have any knowledge how to protect themselves from theese threats..

I händelse av kris. Så arbetar Halland, Jönköping och Kronobergs länsstyrelser med kriskommunikation. En kvalitativ jämförelse av Länsstyrelserna i Halland, Jönköping och Kronobergs kriskommunikationsplaner och strategier.

The purpose of the essay was to examine the way the SwedishCounty Administrative Board works with crises communicationbefore, during and after a disaster. A qualitative comparisonbetween the County Administrative Board in the Swedish regionsHalland, Jönköping and Kronoberg has been made in order to seeinequalities and simmulariteies in their strategies and policies forcommunication. In order to fulfill the purpose two main questionswere asked:? How does the County Administrative Board in Halland,Kronoberg and Jönköping work with crises communicationbefore, during and after a disaster?? In what way does the three County Administrative Boardsco-operate with other organizations before, during and aftera disaster regarding crises communication?The theoretical base of the essay was classical and postmodernstrategic communication. I interviewed communicators at theboards and took part of their communication plans and strategies toseek answers to my questions.

Privilegierad mobilitet? : Flygplatser, resande och säkerhet

Never before have so many moved so frequently as now. Mobility lies at the centre for the concern ofstates, business and technological development. Some even claim that we are witnessing a mobility turn inthe social sciences. However, as the capacity to move has increased so too has the control and surveillanceof mobility become more extensive. Since September 11, 2001 security has been the defining paradigm fora variety for actors.

En jämförelse av krypteringsalgoritmer

Today the Internet is used more and more as a transportation for information. Much of the information is confidential and should not be read by those not privileged. To protect the information from unauthorized access cryptography can be applied. The cryptography algorithms in use today all have their pros and cons. They are therefore suited for different applications.

Säkerhet i öppna WiFi-nätverk. En studie om hur användares medvetenhet om säkerhetsrisker vid interaktion med öppna WiFi-nätverk kan ökas

Public WiFi networks is one of the dominant technologies for users to get public internet access. The problem is that the networks are designed for accessability rather than security ? a problem users seldom are aware of. Users who carelessly access WiFi networks may reveal sensitive information which, among other things, can lead to an identity theft. Previous research suggests that users must be educated and informed about the risks they incur, but not how this should be done.

NATO 1989-2015 : NATO:s säkerhetpolitiska arbetsprocessfrån 1989 till 2015 sett utifrån Berlinmurensfall och konflikten i Afghanistan

The main purpose with the essay is to look into NATO and annalise how the organisation haschanged it´s security policy work process today 2015, seen from two different world eventsduring the period 1989-2015, the collapse of the Berlin wall and war in Afghanistan. Purposeand issuses also apply based on two theories Anarchymodel and World society model. In orderto highlight two different ways to see NATO:s security policy work process over time untilthe present day.Issues:? How did the fall of Berlin wall in 1989 change NATO:s security policy work process?? How did the war in Afghanistan in 2001 change NATO:s security policy work process?The essay is a qualitative method literature review describing NATO as an organisation andworld events that had impact on NATO over time.The result show that NATO has shifled it´s borders further fast because ?new? membercountries from the former Soviet Union are party members. NATO has moved closer toRussia, and increased in momentum.

Säkerheten i trådlösa nätverk

The number of wireless networks has increased rapidly among both home users and companies in just a few years. That has brought a lot of good things with it, for example the possibility to connect wireless equipment to the network or Internet from an arbitrary position within range of the accesspoint. But since the transmissions take place through the air some new security risks appear. It?s difficult to restrict the signals to a specific space and thereby a lot easier for unauthorized to eavesdrop or disturb the signals compared to a traditional wired network.

USA:s officiella säkerhetsstrategi : Vad ligger bakom?

The purpose of this study is twofold: First, to inquire how the George W. Bush administration plans to keep America safe from external threats and second ? based on the assumption that neoconservatives have influenced the Bush administration ? examine how neoconservative ideas have influenced this strategy to protect America. The research questions are as follows:What is the content of the Bush administration?s security strategy?How are neoconservative ideas reflected in this security strategy?To answer the first question, the main points of two studied documents were summarized.

Ukraina: Realismens återkomst? : En kvalitativ textanalys om hur fred och säkerhet bör skapas i Europa utifrån teorierna realism och liberalism

Ukraine shares a long history with Russia. In the early 21th century, Ukrainians wanted a freer Ukraine. Therefore the orange revolution started in 2004 by the Ukrainians and had a positive outcome. The situation later became worse because of the economic crisis in 2008 and a corrupt president. The pro-western politician Petro Poroshenko was elected to become president in 2014.

<- Föregående sida 10 Nästa sida ->