Sökresultat:
2177 Uppsatser om Administrative Security - Sida 8 av 146
Utvärdering av Near Field Communication och Certified Wireless USB : Säkerhet vid utveckling av applikationer
Today?s society is one where technological advances are made daily, which increases the need to stop and assess the risks against users? integrity when integrating new technology in contemporary systems all the greater. We have taken two technologies, Near Field Communication and Certified Wireless USB, whose envisioned area of use is to be integrated into mobile phones, and evaluated what security threats are revealed for the respective technologies. The threats against security have been identified through research of the standards and existing reports for each technology. Practical experiments have not been conducted on account of us not having access to any equipment to run such trials.
En undersökning i datasäkerhet för hemanvändare : Är det nödvändigt att använda brandvägg?
The emphasize of this study is to evaluate security issues for home users having a personal computer connected to the Internet. It focus on the usage of advantages and disadvantages when using a firewall while connected to the Internet. The hypothesis is that it gives a better protection to install and use a firewall compared not to do so, due to security flaws in the operating system. The prediction was tested on a home user's personal computer. The testwork was divided into two major tests, each of them performed with, respectively without, a firewall.
Resolution 1325, lidandet i Liberia och kvinnors rättigheter
AbstractBetween 1989-1996 and 2000-2003 a civil war took place in Liberia. During the war many, many people were killed or were forced to flee. Another of the war's characteristics was the high number of women being sexually abused and beaten by the soldiers. The aim of this thesis is to analyze to what degree the peacekeeping personnel in Liberia, foremost staff working for the UN and agencies related to the UN, have implemented Resolution 1325 in their work. Resolution 1325 was adopted by the members of the United Nations Security Council in year 2000 and aims to increase the efforts made to secure women's rights and security in parts of the world where war and crisis prevail.
Somaliska pirater - ett mycket litet problem: En undersökning av Sveriges arbete gällande frågan om somaliska pirater under 2009-2010.
During 2009-2010 Sweden participated in an international military operation whose intention, according to the Swedish news media, was to fight Somali pirates. The purpose of this thesis is to study various decisions and documents behind the Swedish efforts, both military and foreign aid, regarding the matter of Somali pirates during the years 2009-2010 and analyze the results using an interpretation of the security-development-nexus-theory. The method used is text analysis based on the hermeneutic idea of understanding and interpretation.The thesis studies the international resolutions and national decisions that lead to the military operations in the Gulf of Aden and also the international strategies and national approaches regarding Sweden's assistance in the development of Somalia. The theoretical section contains an interpretation of the vast security-development-nexus-theory. The concepts of security and development are first presented separately and then collectively in terms of military security, societal security, economic security, regime security and human security.
Internkommunikation och beslutsprocesser inom Åtvidabergs FF : En kvalitativ fallstudie av Åtvidabergs FF
AimThe purpose of this study has been to help Åtvidabergs FF to find development opportunities by reviewing the internal communication and decision making process within the organization. In this study we have used two models, Johari window and Administrative man.Our study has two main questions. The questions at issues are:? Can Åtvidabergs FF with help of the communication model Johari window identify how the internal communication can improve?? Can Åtvidabergs FF use the Administrative man as a decision model?o Will the use of the model Administrative man lead to better decisions will be made?MethodWe have made a qualitative case study in a positivistic spirit. Data has been collected through half structured interviews.
Säkerhetsservice/Fixartjänst En fallstudie om en implementeringsprocess som befäster de klassiska könsrollerna
Fighting against accidents with elderly involved have come to be one of the west world's greatest challenges together with the climate changes and epidemics, and in order to fight against these accidents SDF Centre, Gothenburg appointed a man to the post as a caretaker.The aim of this master thesis is to analyse whether the implementation process and the systematic work correspond with Vedungs implementation theory and also put forward arguments for and against a masculine entrance into promotion old-age care; if it strengthens or is a take-off from the classical sexual roles.The thesis main theory is Evert Vedungs theory of implementation, which is constituted of eight factors which facilitates an implementation process. In order to theorise the sexual roles I have appropriated a gender perspective, constituted of multiple researchers and authors.The conclusion I have received through the qualitative interviews carried out with actors involved in the implementation process, is that the security services implementation correspond well with Vedungs implementation theory, hence the implementation has proceeded efficiently. The classical sexual roles is on one hand strengthened through a masculine possession of the security service, and on the other hand can the masculine entrance in the old-age care entail that more men apply for promotion old-age care work..
Smarta Kort : En del av en intelligent IT-lösning i hälso- och sjukvården?
Background: IT-security is included in the concept of information security, which considers all the security of handling information within an organisation. Good IT-security is about finding the right level of measurement, however, it is hard to implemement new IT-solutions in an organisation, particularly within the health care field, where sensitive information are handled daily. Lately the Swedish government, together with county- and city council, understand the importance of IT and health care. Carelink, an organisation of interest, is working actively for the presumption of benefit by using IT within the health care field. During spring 2006 the Swedish government introduced a national IT-strategy.
IT-säkerhet i små organisationer
IT- och informationssäkerhet är ett ständigt aktuellt ämnesområde. ITsäkerhetsarbetei små organisationer framstår som ett underforskat område. Föratt göra en kartläggning av hur arbete med risk, hot och säkerhet kan se ut i småorganisationer har vi genomfört en explorativ intervjustudie med representanterför små organisationer om deras arbete med IT- och informationssäkerhet. Vihar dessutom genomfört intervjuer med experter på området för att få ettbredare perspektiv. Tolkningen och analysen av intervjusvaren har utförtsgenom att först tolka svaren utifrån Security Controls och därefter analyserasvaren utifrån fem temaområden som vi funnit i materialet.
Finns kvinnor i säkerhetspolitik? : En undersökning av den svenska säkerhetiseringsprocessen avseende svenskt deltagande i den militära insatsen Minusma i Mali utifrån ett feministiskt perspektiv
Scientists argue that gender affects foreign policy and security policy, that ideas of gender are inconstant and that there is a lack of feminist perspectives in International Relations. The changes seen in the global security context may have challenged the way politicians and scientists understand war and its impacts, and led to increased gender awareness.Using securitization theory and feminist international relations theory, the aim is to examine how women and men are being spoken of in the Swedish foreign policy discourse regarding participation in the UN-led stabilization mission Minusma in Mali. By applying a feminist perspective on the securitization process, the intention is to increase the knowledge of whether there is gender awareness in this context.The result shows that there is limited gender awareness. There is minor consideration for the conflict?s different implications on the situation for women and men.
Människan och lärarprofessionen : En livsberättelse
The aim of this essay is to get a deeper understanding of a teachers' profession and to get knowledge of how earlier experiences can influence you as a teacher. I have interviewed a female teacher, Pia to get this understanding. As a tool to get the teacher's whole story I used the life story method. In her profession she is influenced by her own importance of security as a child.Her own needs of security has given her an deeper understanding for pupils like herself during the childhood; insecure and afraid. Her understanding for all kinds of behavior among the children has increased by her own experiences.The story shows that Pia is frustrated by the fact that she can't control her own working time.
Koncern som tillväxtinkubator för småföretag : ? En fallstudie i ett shared service centers möjligheter attstödja entreprenöriella småföretag
???Information Technology is an essential part of the society today, not least in large ???organisations dealing with sensitive information. An example of such an organisation is the Swedish Armed Forces which indeed is in the need of ways to ensure information security in their Information Technology systems. The means which is used is an authorisation and accreditation process.All Information Technology systems go through a life cycle which includes realisation, usage, development and liquidation. In the Swedish Armed Forces the lifecycle is an authorisation process.
Veto: En motivanalys av FN:s säkerhetsråds fem permanenta medlemmars agerande i konflikten i Syrien.
Aim: The aim of this study is to analyse the possible motives behind the actions of the five permanent members of the UN Security Council in relation to the conflict in Syria. The background of this aim is the Arab Spring and the protests and violence that have followed the uprising. While, in Libya, the UN Security Council adopted resolutions that allowed sanctions against the Libyan government, no such resolutions have been adopted yet in Syria.Theory: The principal theory of the analysis is Stephen D. Krasner´s theory on sovereignty.Method: I have researched various resolutions and statements done in the Security Council, together with official statements from the actors, through Hadenius´ motive analysis methodology and Gilje & Grimen and Ödmans theories on hermeneutics.Conclusion: The conclusion of the analysis is that there, in the case of Syria and Libya, are two different parties in the Security Council. One that stands for sovereignty and one that stands for intervention.
Utvärdering av Near Field Communication och Certified Wireless USB: Säkerhet vid utveckling av applikationer
Today?s society is one where technological advances are made daily, which
increases the need to stop and assess the risks against users? integrity when
integrating new technology in contemporary systems all the greater. We have
taken two technologies, Near Field Communication and Certified Wireless USB,
whose envisioned area of use is to be integrated into mobile phones, and
evaluated what security threats are revealed for the respective technologies.
The threats against security have been identified through research of the
standards and existing reports for each technology. Practical experiments have
not been conducted on account of us not having access to any equipment to run
such trials.
ISIT-modellen : Vägledning för att realisera en verksamhets informationssäkerhetsmål
The ISO standard ISO/IEC 17799/SS-627799-2 is a guidance for organizations to realize their information security goals. In spite of this standard, studies show flaws regarding information security in organizations. In particular flaws regarding overall view, knowledge and clear roles and responsibilities have been observed. The ISIT (Information Security Integrated Three level) model and its guidelines, developed in this thesis, help organizations to identify the required processes and procedures as well as the logical process flow. The thesis is based on theoretical studies and a case study within a multinational company.
En studie av olika ekonomiska modeller för mångbruk baserad på vindkraft
Today produces the wind power 2,5 TWh (TWh = terawatt hours) of Sweden?s total energy input of around 620 TWh. The Parliament has adopted a national planning objective where the wind-based electricity production will increase to 30 TWh in 2020. This requires that landowners will leas there land for wind power to wind energy companies. Such land leasing means that the landowner's business is considered to be a multiple-use.