Sök:

Sökresultat:

2177 Uppsatser om Administrative Security - Sida 13 av 146

EU som internationell aktör för demokratiska värderingar : EN beskrivande fallstudie av Ukrainas demokratiseringsprocess mellan åren 2004-2014

This study aims at examine what kind of interest the European Union (EU) have in promoting a democracy process in Eastern Europe. The study is a descriptive case study where the case Ukraine is used to draw general conclusions. The questions asked to pursue the aim are: why does the EU want to promote a democracy process in Ukraine, what kind of methods does the EU use  and why is Russia trying to prevent the EU-Ukraine development and instead supporting a Russia-Ukraine development. In this study an analytical model is created and used to analyze EU:s way in promoting democracy in Ukraine. The analyze model consists of six steps used to describe the general promotion of a democracy process and it?s applied in the empirical analysis.

Elevers motivation : en enkätstudie i år 5 och 6

The aim of this essay is to get a deeper understanding of a teachers' profession and to get knowledge of how earlier experiences can influence you as a teacher. I have interviewed a female teacher, Pia to get this understanding. As a tool to get the teacher's whole story I used the life story method. In her profession she is influenced by her own importance of security as a child.Her own needs of security has given her an deeper understanding for pupils like herself during the childhood; insecure and afraid. Her understanding for all kinds of behavior among the children has increased by her own experiences.The story shows that Pia is frustrated by the fact that she can't control her own working time.

Requirement Specification for Information Security to Health Systems, Case Study - IMIS

During 2001-2002 a prototype, IMIS (Integrated Mobile Information System) was developed at BTH (Blekinge University of Technology) to demonstrate how mobile IT-systems can be used in healthcare. The prototype was based on the activity theory of Engeström. An ongoing project started in spring 2003. The purpose of the project is further development of IMIS with special focus in the diabetes healthcare. Participants in the project are scientists and students at BTH, ALMI Företagspartner, Blekinge FoU-enhet, Barndiabetesförbundet Blekinge, Blekinge Diabetesförening, Vårdcentralen Ronneby and Vårdcentralen Sölvesborg.

Identitetskonstruktion och Säkerhetisering En diskursanalys av en västerländsk säkerhetsdiskurs

Den här uppsatsen behandlar den västerländska säkerhetsdiskursen. Syftet är att åskådliggöra den världsordning som skapas inom diskursen. Till grund för analysen ligger två säkerhetsstrategier: USA:s National Security Strategy och EU:s En Europeisk Säkerhetsstrategi.Diskursanalysen är vår metod och teori och det innebär att språket står i centrum för vår analys. Vi vill med uppsatsen lyfta fram hur diskursen konstruerar den sociala verkligheten och vilka konsekvenser det får.Vi koncentrerar oss på två områden som vi menar är centrala inom diskursen: Konstruerandet av sociala identiteter, ?de andra? och ?oss?, samt säkerhet och den ?säkerhetisering? som sker i diskursen.

Restinformation i elektroniska textdokument

Some word processing programs save information that not all users of the program are aware of. This information consists of a number of things. Example of that is who the writer of the document is, the time it took to write it and where on the computer the document is saved. Text that has been changed or removedcan also be saved. This information is not shown in the program and the user will therefore not be aware of its existence.

Cloud Computing - A Study of Performance and Security

Cloud Computing är det stora modeordet i IT-världen just nu. Det har blivit mer och mer populärt på senare år men frågor har uppstått om dess prestanda och säkerhet. Hur säkert är det egentligen och är det någon större skillnad i prestanda mellan en lokal server och en molnbaserad server? Detta examensarbete tar upp dessa frågor. En serie prestandatester kombinerat med en litteraturstudie genomfördes för att få fram ett resultatet för detta examensarbete. Denna rapport kan komma att vara till nytta för de som har ett intresse av Cloud Computing men som saknar någon större kunskap om ämnet.

Närståendes upplevelser vid akut kritisk sjukdom

AbstractBackground: When an acute illness or trauma occurs, life becomes disorganised and shattered for the critically ill person and his/her family members. The family members are confronted with thoughts about life and death which can cause stress and anxiety. How the family members cope with the crisis is individual and depending on personality and earlier experiences. Aim: The purpose of this literary review was to illustrate the family members´ experiences when dealing with a critically ill family member. Method: A literary review was made based on fifteen qualitative and quantitative scientific articles and a literary book.

Partnerskapet: trygghet eller en illusion? : En intervjustudie med lesbiska kvinnor som ingått partnerskap

I have critically examined heteronormativity as it permeates our society and questioned ?identities? as designed and constructed, leading to certain identities being seen as normal, while others are regarded as abnormal.I have had a discussion with my informants about love, monogamy, amicable and relationships. Every couple has basically isolated themselves after they became a couple and they feel secure with one another. The partnership is very important for my informants, partly because they see the partnership as a legal and economical security. However, these aspects are not crucial to the decision that they chose to marry, for the main reason is love and the desire to take the relationship one step further.

En studie om ensamkommande barns situation

In this study the semi structured interview method was used to explore what kind of knowledge one In State Authority: The Migration Board, and three Non Governmental Organisations: Red Cross, Save the Children and ISS- International Social Service have about the situation for separated children. Another purpose in this study was to explore if people who are close to the children are working for the best of the children and if their cases were treated with legal security. The result shows that the children?s cases are not treated with legal security and some of the children suffer psychologically from separations from the families and other children need new families because they were maltreated. The result also shows that there are signs that separated children are discriminated compared to children with a Swedish background..

Ett livsfarligt yrke: En studie om motivation inom yrken med risk för hot och våld

The purpose of this study is to examine what factors that motivate people to work in professions with an explicit and inherent risk of threats and violence. By using a qualitative study and conducting in-depth interviews with eight security guards and doormen with experience from working at restaurants and nightclubs, the study could conclude that the interviewed security guards and doormen were motivated mainly by economic incentives and the social interaction that the profession entails. Status and riskiness of the profession did also, to a certain extent, contribute to the motivation. The professions' lack of advancement opportunities were frequently mentioned as the main reason to why one chose to leave the position, or consider the time in the profession as limited..

Datasäkerhet : Hur man skyddar sig mot interna hot

As the companies of today are good at protecting themselves against external threats, but are having problems with internal threats, we focused on how information can be protected from ending up in the wrong hands. First and foremost to protect information from employees who might steal it and sell it to another company. Since the security investments needed are connected to the financial costs of implementing them we have tried to create a balance between the investments needed and the cost of implementing them. The different kinds of protection needed are first and foremost protection to make data less accessable, passwords and traceability. While it is hard for us to estimate the amount of money a company lose by the hour when the production stands still, we have not been able to use any of the excising models to calculate the profit of installing countermeasures.

Parental experiences when children are undergoing emergency surgery/Föräldrars upplevelser i samband med att deras barn genomgår en akut operation

When a child is hospitalized, it is usually more than one person who needs attention ? i.e. the child as well as its parents. The emergency ward environment and surgery rooms are unfamiliar and the parents feel anxious, insecure and uncertain about how to act. They are expected to participate in the child?s care, cope with their own anxiety and simultaneously convey a sense of security and stability to the child.

Kameraövervakning : En juridisk analys

Camera surveillance can provide good protection against certain types of crime, but it can also invade our privacy. The County Administrative Board monitors compliance with the rules by visiting those places to which the general public has access. They have to issue permits before general camera surveillance to those places which the general public has access. In certain cases, in stores for example, general camera surveillance is permitted only if the Country Administrative Board is notified in advance. The Data Inspection Board is a public authority and responsible for the camera surveillance for those places to which the public not has access.

My patience ran out on Hasad a long time ago? - varför blev Syrien en ondskans axelmakt?

In 2002 George W. Bush held a speech where he classified six nations as being the main threats to American security, one of them being Syria, a state with a secular constitution, no resent offence towards the US, and with an improved diplomatic relationship to the US during the Clinton years.Being an ally to the Soviet Union during the Cold War Syria was forced to redefine its role in the region. Using neorealistc theory one part conlusion is the fact that the new Syrian leader, Bashar al-Hasad, in the early 21th century determined to set higher goals for the Syrian power ambition in the Middle East, threatened to destabilize the region and leave the US and its allies in a caotic situation.In the US, however, the new administration after 11/9 sharpened its tone towards states that did not cooperate in the new ?war on terrorism? or/and were likely to harbour terrorists. Syria was accused of doing both.

Att skapa grunden tillkassasystemsapplikationer för Android : Undersökande arbete samtimplementation

This paper was made together withTechPay AB, by their request.The dissertation has been divided into two separate parts; one of which is fully theoretical, with the focus on the security requirements of a digital cash register, and how to meet these requirements.The second part covers the implementation of anAndroid-oriented Java-library,created with help from the security requirements found in the first part. The purpose of this library is to make it easier to develop a cash register that uses payment terminals from TechPay.This paper also covers different communication protocols, encryption techniques and recommendations from authorities, banks and Android. This paper also contains a small review of how users are validated in applications on the current market that handles money transactions..

<- Föregående sida 13 Nästa sida ->