Sökresultat:
2177 Uppsatser om Administrative Security - Sida 11 av 146
Svenskt utrikespolitiskt beslutsfattande : Flernivåanalys av Sveriges beslut att bli en del av den europeiska säkerhets- och försvarspolitiken (ESFP).
In 1998 Sweden accepted the Treaty of Amsterdam which contained a development of the common foreign and security policy (CFSP) towards a European security and defense policy (ESDP). This thesis aims at studying the decision making process behind the Swedish foreign policy decision to further develop its security policy within the European Union. The purpose is to explain which factors and conditions that did affect and influence the Swedish foreign policy decision. The research applies foreign policy analysis, a theoretical perspective that analyzes both domestic and international conditions using different levels of analysis. The research methods being used has been qualitative as well as quantitative, complemented by interviews, since the research is a process tracing case study.The thesis conclusion is that the Swedish decision is explained by several factors.
Alliansformation - relationen mellan Israel och USA
The special relationship between Israel and the US has been subject to questioning, and good many theories have tried to explain why it is so strong. The most common explanation is rooted in the school of realism, where strategy and national interest decide who one's ally is. This essay aspires to examine another possible reason for allianceformation; identity. Several books, which make for the theoretical backbone of this study, have been written on the subject of sharing beliefs, identifying with others and the consequences of this. The question being asked is whether Israel and the US actually share beliefs and, if so, which ones.
DDoS : -Vad är det och går det att skydda sig?
This paper will expose the serious phenonomen Distributed Denial of Service (DDoS). Businesses without a good security policy are easy targets for attackers. We will cover why its hard to protect yourself, present previous attacks and ways for individuals and businesses to secure themselves. We have based our paper on previous cases and done intervjues with companies who specialize in dealing with these kind of threats. Then come up with guidelines wich will be helpful for businesses when they want to strengthen there security against Distributed Denial of Service-attacks..
MIGRATIONSSTYRNING I EUROPA: MAKT, KV?VNING OCH KONTROLL En kritisk maktanalys av migrationsstyrning i Europa genom utrikes f?dda kvinnors arbetsmarknadsintegration i Sverige
In today?s Europe, migration has become a security issue rather than a humanitarian issue.
Previous research highlights how migrants have become prisoners of bureaucracy in Europe
by their mobility being hindered. The present study critically analyses the migration
governance in Europe by highlighting labour market integration in Sweden. The study
highlights migrants with a specific focus on foreign-born women. The research questions
chosen to examine this phenomenon is: How does migration governance in Europe affect
member states' policies for labour market integration, with a particular focus on Sweden?
How do foreign-born women in Sweden experience labour market integration processes
within the framework of the governance mechanisms that exist in Europe? Foucault?s theory
of power and the theoretical concept of choking composes a theoretical framework which is
used to analyse focus group data and text analysis data.
Kulturell, administrativ eller funktionell region? : En analys av Region Skåne och Västra Götalandsregionen
The Swedish regions are new phenomena, from the start from the new regionalism which started in the 1980´s. The purpose of the thesis is to analyze Region Skåne and Västra Götalandsregionen to come to a conclusion which model of region they are and want to be by using theories of regional identity and identity of politics and see similarities and differences. My research question is: Which of cultural, administrative and functional region are Region Skåne and Västra Götaland striving to construct? The methods I have used are qualitative text- and content analysis to analyze the regions, by using theories about regional identity and identity of politics. Furthermore, I am using some statistic from SOM-institutet to analyze the regional identity in the regions. The result show that Region Skåne is constructing a cultural region, because of their strong regional identity and that the politicians are using identity of politics to combine the citizens.
Kända Varumärke - Större, Starkare, Säkrare
In todays high-technological society where the Internet plays a central role in our day-to-day life, many e-retailers are not able to attract customers to complete a transaction on their website. In order to succeed, many e-commerce sites must improve several safety aspects regarding online payment, in order to be perceived as a reliable and secured retailer. The purpose of this paper is to investigate if increment in various combinations and aspects in online payment will in fact improve the customer's perception of the e-retailer and result in completed transactions. In order to investigate this aspect, an experiment was conducted to be able to compare eight independent groups, that each had been exposed to a different security scenario on the online payment website of either a known or unknown retailer. Our results clearly prove that perceived security of the retailer's payment website increases willingness to purchase from the retailer.
Folkpartiets syn på svensk säkerhets- och utrikespolitik 1956-1974 : En jämförande analys av Folkpartiets syn på svensk säkerhets- och utrikespolitiska frågor i förhållande till regeringen
The socialdemokrats? long possession of government power from the 1930?s to 1976 gave them the opportunity to put their stamp on Swedish domestic and foreign affairs in the shadow of the cold war. The government policy in security and foreign affairs, therefore, was that of the socialdemokratic party. The stance of the government has been researched, but it lacks focus on the opposition. The purpose of this paper is to analyse Folkpartiet´s view of security and foreign affairs in comparison with government policy.
Libyenkrisen ? en humanitär intervention? : En kvalitativ textanalys som syftar till att förklara motiven bakom NATO:s och FN:s beslut att intervenera Libyen
Humanitarian intervention is a concept that generates several problems in our time. The idea of humanitarian intervention concerns the modern norms of sovereignty and noninterventional principals. It also concerns the conventional norm, which declares that states are not allowed to interfere in other states? internal affairs. The use of military force to implement humanitarian intervention is restricted according to international law.
Att färdas i symbios : ett gång -och cykelstråk anpassat efter trafikanternas rörelsemönster och behov
The aim of this paper is to examine the layout of public spaces and its effect on human behavior with focus on the relation between pedestrians and cyclists movement patterns in a specific path. The study emanates from the security aspect of pedestrians and cyclists, and builds upon previous theories and empirical studies about perception, security, information design, environmental psychology and behavior. The result shows that individual behavior and movement pattern differs with age, purpose, physical- and other conditions, and layout of the surroundings. A design proposal for improved layout of a path and a node between different oncoming paths has been developed to aid the users? needs, where a separation of walkways and bike lanes forms zones of security for the purpose of better orientation and a better flow between the users..
Bluetooth and security
Detta arbete behandlar hur Bluetooth fungerar samt säkerheten kring Bluetooth
och några allmänt tillgängliga attack verktyg.
Syftet med uppsatsen är att försöka fastställa hur säkert Bluetooth är i dagens
läge. Bluetooth har länge varit tillgängligt för att utbyta data över korta
avstånd. Därför har man valt att implementera det i kommunikationsenheter som
mobiltelefoner och laptops med mera. Det har funnits en debatt om hur säkert
Bluetooth är. För att kunna genomföra denna undersökning så har vi satt oss in
i hur Bluetooth fungerar, vilka allmänt tillgängliga attacker och
implementationer av dessa, som finns.
Säkerhet och integritet i närfältskommunikation
Context. In today?s society we use smart cards in many areas, NFC is a smart
card technology that allows contactless interaction between a reader and the
tag, the tag is often in the form of a card. NFC can be used for various
payment methods or as access card to a building which makes life easier. In
previous studies, the technique has proven to be weak to attacks using an NFC
reader connected to a computer.
Säkerhetshot och lösningar för privatpersoner med bredband
As more and more people gain access to broadband in their properties, the
security threats get bigger. A lot more people also have computers that they
carry home from work where they store important information concerning the
company. The information stored on theese computers can be very easy to
retrieve if you have the will and the skill to do it. Very few people have any
knowledge how to protect themselves from theese threats..
Rysslands politiska utveckling : En fallstudie över svensk säkerhetspolitik
The Swedish security policy has changed from stressing neutrality to embrace co-operation within the EU and other organisations. New threats like terrorism, boarder-crossing criminality and natural disasters require new ways to deal with this type of problems to protect the society. Since the beginning of 21st century the high Russian economic growth has made it possible for the country to play an increasingly role as a superpower on the international political stage. In the same time the democratic development has been replaced by an autocratic rule which has obstructed the Russian- European relations. From a Swedish security policy view the Russian political development is of importance and the picture of Russian as a threat has changed from 1996 to 2008/09.
HFDs hantering av regelkollision mellan intern rätt och skatteavtal : En analys av RÅ 2010 ref. 112
The OMX-case entailed considerable uncertainty about the relationship between tax treaties and Swedish domestic law. Previous approaches to handle rule conflict between them was put out of action for the first time when an internal rule took precedence over tax treaties. The Greece-case came a few years later where there were hopes that it would be decided in plenary session to return to the view that prevailed before the OMX-case, which did not happen. Instead the Supreme Administrative Court ruled that the tax treaties shall in principle be given preference, but that in exceptional situations tax treaties can be infringed to an internal rule's benefit, so called tax treaty override. Such procedure is acceptable if the legislature gives "clear expression" of the intention of a certain type of income is to be taxed in Sweden, or that a particular new rule applies regardless of the provisions in tax treaties.The purpose of this thesis is to analyze the supreme administrative courts management of rule collision between domestic law and tax treaties in the Greece-case.
Hur används vetenskap och forskning i den politiska debatten? : Idéanalys av debatten kring försäkringsmedicinskt beslutsstöd
How is research and science being used in political debate? An idea analysis of the debate about försäkringsmedicinskt beslutsstöd (decision tool in healthcare security)This is a case study on different types of research use (utilization) The aim of this paper is to examine how the politicians make use of expertise and research in the parliamentary debate surrounding the decision tool in healthcare security (försäkringsmedicinskt beslutsstöd). The aim is also to find out to what extent different types of research use are present in this debate. In this case study the qualitative method of idea analysis is being used on the empirical material. The tool of analysis is based upon the theories of research use by Amara et al.