Sökresultat:
2177 Uppsatser om Administrative security - Sida 2 av 146
WHITE HOUSE/GREEN HOUSE - En processpårande undersökning av klimatfrågan i USA
This thesis examines the process of securitization of the environmental issue in the United States. By using the theories of sectoral security and securitization by Barry Buzan and Ole Waever, commonly known as the Copenhagen school we go beyond the traditional security frames and examine where the environmental issue in the United States stand today within the securitization spectrum. The securitizing spectrum includes three levels in which an issue can be place: non-politicised, politicised and securitized.The problem, which we wish to address, is if there is a movement of the environmental issue in the United States towards becoming a securitized issue. In the light of these circumstances we also wish to explore who is behind the movement and also find out where the issue stand today. We do believe that Al Gore is a securitizing actor and examine his role in the movement of the environmental issueWe have come to the conclusion that there is an ongoing process of securitization in which the environmental issue have moved from being politicised to becoming securitized..
När Arktis isar smälter tinar världen upp? : En kvalitativ analys av det vidgade säkerhetsbegreppet i den svenska strategin för den arktiska regionen
This study is called When the ice of the Arctic melts is the world defrosting? and written by Rebecca Fröling.The purpose of the study is to investigate how the concept ?security? is used in the Swedish arctic strategy and why the concept is described in that way. The debate of the concept ?security? has been going on for years, but the debate is still present today. What we put in to the concept is operative for how we regard and discuss security and security politics.To analyze the strategy I used two theories, one with a traditional approach and one with a critical approach to security: Realism and Copenhagen School.The method that has been applied to the study is qualitative content analysis, to be able to analyze the text on the depth.
Livsmedelssäkerhet, konflikt och hållbar fred - en teoriutvecklande studie om matens makt
In our world, more than two billion people are living under insecure food conditions and more than eight hundred million people are estimated to be starving. The majority of these people live in developing counties which are poor and often subject of civil war. The past fifty years the main subject of security analysis has been the sovereign and rational state and the threats have been viewed in terms of military and weapons of mass destruction. This has come to change over the last decades and security as a concept has broadened, which better represents the reality of today. Within this broader conceptualization of security the main referent of security is the individual, rather than the state, and threats are not only analyzed from a military point of view, but also seen as threats against human rights and freedoms.
Ett öppet eller slutet Europa. En diskursanalys av EU:s flykting- och invandringspolitik
This thesis focuses on the perception of immigration and refugees in the commonEuropean refugee and immigration policy. It identifies different discourses andstudies their development and interrelated power structures.Using the discourse theory of Laclau and Mouffe, documents from theEuropean Council, the Commission, the Justice and Home Affairs Council andParliament debates are analysed. The study is defined in the time span of 1999-2006, i.e. from the European Council's first agreement on developing a commonEuropean asylum system, following the period up till today.Four discourses are distinguished, focusing respectively on rights, security,European Union's needs, and cultural identity. I use Sandra Lavenex theory ofrealism and idealism to analyse one of the main points in the thesis: There is afundamental schism between the one rights-based discourse, focusing on universalhuman rights, and the three sharing a particularistic focus on immigration as asecurity concern.
Säkerhetsstyrning inom den Finansiella Sektorn : En Studie på Best Practice hos Tre Svenska Banker
For organizations that handle sensitive information, IT governance and information security are necessities in order to maintain credibility and to conduct its business efficiently. There are several known processes to increase security governance ? which is a fusion of information security and IT governance.This master thesis examines if organizations use recognized processes and if it in that case would lead to higher security. The study is qualitative and conducted in the financial sector and based on Best Practice frameworks of the security governance in Swedish banks. Data collection was done through interviews and surveys that were triangulated to get a gathered picture of the quality of the security governance activities.
Human Security in Serbia: A Case Study of the Economic and Personal Security of Internally Displaced Persons
The aim of this study was twofold; firstly it sought to describe the human security situation of Roma IDPs and IDPs living in collective centers, secondly it tried to create an understanding for how the human security situation can affect IDPs capabilities to develop. The findings of the study were mainly based on a field study conducted in Belgrade, Serbia for two months. The results of the study were that IDPs in collective centers have a poor human security situation regarding basic income, employment, adequate housing and experienced personal security. Roma IDPs suffer from the same insecurities, but in addition also has poor human security in basic education and personal safety. Their stagnant human security situation proved to be the result of the inability to help IDPs by the actors involved in the relief work.
Länsstyrelsen i Uppsala län : En arkivhandledning
The County Administrative Board is an authority with big variations in their work. The fact that the County Administrative Board work with so many different issues makes it difficult for the general public to get an insight in what they do and what kind of archival material they create. This handbook is made to illustrate what the County Administrative Board do and how you can find your way to the archives and its documents, both as an employ and as a public visitor.The Handbook begins with a historical overview of the County Administrative Board, from the 17th century to today, with focus on the County Administrative Board of Uppsala. As the Handbook is made for both employees and for the general public several ways to enter the archives are described.Since the employees at the County Administrative Board of Uppsala have access to the archives them self the Handbook also provides detailed descriptions about how to find the way to the records. These descriptions both explains the way to archives organized in dossier and archives organized in chronological order, both provided at County Administrative Board of Uppsala.All the records that the County Administrative Board of Uppsala has generated though the years are not available in the building of the County Administrative Board but at The National Archive in Uppsala.
Säkerhet i det trådlösa hemnätverket ? En analys av de vanligaste säkerhetslösningarna
The security solutions used in wireless home networks are examined in this report. Thegrowing number of wireless units have increased the need for reliable security solutions.This report aims to enlighten the reader about the fundamental technology used inwireless security solutions and inform about the existing flaws. A recommendationabout how to achieve a high level of security in the home network is also given to thereader.Several flaws in the security solutions in use have been reported. Of these the mostsevere has been examined in a test network using highly accessible tools to get aperception of how vulnerable the user is.The tests showed that several attacks were efficient and easily carried out. We have alsoseen that several of the home networks in our sample are susceptible to these attacks.Our survey revealed that the Internet service provider's technical support in many caseslacked the knowledge necessary to inform the user about reliable security solutions..
Säkerhetsansvarigas syn på supportrars beteende och dess inverkan på ishockeyevenemang : En kvalitativ studie om hur säkerhetsansvariga ser på supportrars beteende och dess inverkan på ishockeyevenemang
Are icehockey supporters a big problem in todays society? Is security required during icehockey events, and how is it implemented? This study was aimed to investigate the people at security positions and their view on fan behavior and it?s impact on icehockey events. It was a qualitative study were six interviews were made with people in charge of the security at different hockey clubs. The results showed that security managers overall saw a good fan culture, and that it created a wonderful atmosphere. Security managers worked a lot with dialogue with the supporters and they thought it had a good effect.
Dominerande affärsmodeller inom området informationssäkerhet
Computers together with Internet have been growing enormously, during the last decade and the area of information technology has been growing in the same speed. As long as the surrounding environment evolves, the business models must within the IT-area, keep the same pace. So, how do business corporations handle this change to attract customers? How do the dominant business models look like? In many cases, they are apparently much the same. But what differences can we see and what areas can be improved? We have showed that the IT area isn?t just one, it consist of several segments.
Från neutralitet till öppenhet? : En studie av säkerhetspolitikens utveckling i Sverige efter kalla krigets slut
Abstract Title: Från neutralitet till öppenhet? ? En studie av säkerhetspolitikens utveckling i Sverige efter kalla krigets slutAuthor: Jens KindhSupervisor: Patric LindgrenLinnaeus UniversityDepartment of Political ScienceSpring term 2012 When the Cold War ended, a new security situation was unfolded in Sweden. The purpose of this thesis is to describe and compare how the Swedish security policy is organized and how it has changed since the Cold War ended. To do that, I?m going to try answer the following questions:How is the Swedish security policy organized?What defence resolutions have affected the Swedish security policy after the Cold War ended?How has different political actions made its impact on the Swedish security policy after the Cold War ended?My theory is to try explain how the Swedish security policy has changed after the Cold War through a realism security perspective called traditional security, which refers to a realistic construct of the states security policy.
En känsla av trygghet : Patienters perspektiv inom palliativ vård
Background: Every year 56 million people die around the world and it is estimated that 60% of these people are in need of palliative care. It has been shown that patients in the palliative care experienced their situation as uncertain. When life no longer was certain, the patients tried to live their life day by day and make the best of it. Problem: When patients were diagnosed with an incurable disease the future became unsure, because their life would come to an end. Therefore patients with a palliative diagnosis could be in need of experiencing feelings of security.
IT-säkerhetspolicy ? efterlevs den av anställda?
ABSTRACT The main purpose of IT security policies is to protect companies against intrusion and unwanted spread of information. Statistics show that IT related crimes tend to increase and because of that it is important, from the company?s side of view, to be well prepared. The IT security policy is an important part of that preparation. A lot of the crimes related to IT can be deduced indirectly to employees at the companies where the crime takes place.
Hotet från de kriminella MC-gängen - en normativ studie av värdekonflikten mellan den personliga integriteten och statens säkerhet
The aim of this essay is to illustrate a fundamental question; what is a democracy allowed to do to protect itself from enemies? I´ve chosen to analyze the conflict between the two values; individual integrity and state´s security. The individual integrity refers to every person's right to have a protected sphere, and the stat´s security refers to its right to protect itself, and these two positions are often time incompatible. This conflict of value is shown in a normative analysis, where depending on which perspective or normative logic is seen as primate, it gives different conclusions to what a democracy should do to defend itself.To demonstrate how severe the threats are against the society, I choose to examine a specific part of the organized crime, the outlaw motorcycle gangs. They have a special position in affecting the legal system because they have an explicit aim to influence the judicial system with scaremongering and threats.
Återuppbyggnad av en kollapsad stat - En fallstudie av återuppbyggnaden av staten Afghanistan
The purpose of this thesis is to explore and analyze the processes and efforts involved in rebuilding the war-torn state of Afghanistan. The examined period span from the fall of the Taliban regime in 2001, to the elections in 2005. This period, commonly known as the Bonn-process, sets out the initial time for the reconstruction of the state.A theoretical framework, which considers the necessary mechanisms for successful state-building, will be used to analyze Afghanistan's re-building process. The mechanisms include the prerequisite of a stable security environment, emerging from a cease-fire, together with the development of a well-functioning economy, re-introduction of rule of law and rejuvenating civil society.The failure to establish a secure environment has had a devastating impact on all analyzed aspects of the re-building process. It is therefore crucial that the international society continuing to assists the Afghan government in its efforts to strengthen its capacity, in order to improve the security situation.