Sökresultat:
1212 Uppsatser om Asset-backed security - Sida 7 av 81
Trefaktorsmodellen : Undersökning på svenska börsnoterade aktiebolag
Previous work by researchers as Eugene F. Fama and Kenneth R. French, show that average return on stocks are related to a firms characteristics like size and book-to-market ratio. These kinds of patterns in average return is not explained by The Capital Asset Pricing Model (CAPM), and are therefore seen as anomalies. Fama and French have proposed a three-factor model, which captures patterns observed in U.S average returns associated with size and value.
Forsknings- och utvecklingskostnader : Definition och anskaffningsvärde ur ett skatterättsligt perspektiv.
Research and Development-costs constitutes an important part in contemporary companies. R&D are treated differently depending on their definition and how the historic value is decided. The main goal for this essay is to bring clarity to how the definiton of the term R&D is decided in accounting as well as in tax law. Another goal is to decide how the historic value is calculated. It is also interesting to examine under which circumstances the costs can be activated in the balance sheet, and under which circumstances deduction for the R&D-costs may be allowed.
ISIT-modellen : Vägledning för att realisera en verksamhets informationssäkerhetsmål
The ISO standard ISO/IEC 17799/SS-627799-2 is a guidance for organizations to realize their information security goals. In spite of this standard, studies show flaws regarding information security in organizations. In particular flaws regarding overall view, knowledge and clear roles and responsibilities have been observed. The ISIT (Information Security Integrated Three level) model and its guidelines, developed in this thesis, help organizations to identify the required processes and procedures as well as the logical process flow. The thesis is based on theoretical studies and a case study within a multinational company.
Snabb och säker roaming i WLAN
This thesis investigates how Ericsson AB should do to achieve fast and secure handover when roaming in a WLAN. It also provides a security analysis of the system that the wireless access point is part of. The reason for this is that Ericsson is selling an access point called the ABS 2200 aimed at the public hotspot market. The premise was that they wanted a standardized way of handling the roaming issue. At the outset the 802.11F standard looked like a good alternative (in fact the only standardized alternative).
Förväntningar på Framtida Mobila Tjänster
Today?s society is very focused around technology and something that is very popular is the usage of mobile devices such as Smartphones or Tablet computers. One of the reasons why these devices are so popular, is because of the large amounts of services or ?apps? that they can provide for the user. They can do a lot of things that makes everyday living easier for the users.The focus of this study is to find out what kinds of mobile services the users of these devices are expecting and/or wishes to see in the future and what is required to be able to develop and use these services in a good way.We started of the study by searching for earlier studies on the same or similar subjects.
Staters förhållningssätt till Human Security i teori och praktik : En jämförande fallstudie om kriterierna för verkställighetshinder till Syrien hos Sveriges och Norges migrationsverk
Den här uppsatsen handlar om staters förhållningssätt till human security i teori och praktik. Syftet med uppsatsen har varit att undersöka om den kanadensiska definitionen av human security används som referensobjekt i policydokument från Norges och Sveriges nuvarande regeringar samt hos ländernas kriterier för verkställighetshinder av syriska medborgare. Uppsatsens metod är en jämförande fallstudie där verkställighetshinder och utvalda policydokument utgör analysenheterna. För att analysera dokument och ställningstaganden används kvalitativ textanalys.Fallstudien visar att båda länderna ser sig själva som föregångsländer inom human security, bland annat genom skapandet av strategier och handlingsplaner. Vidare visar studien att migrationsverken har olika tillvägagångsätt för verkställighetshinder till Syrien.
Kampen om ett föränderligt Arktis : En jämförande studie av Rysslands och Kanadas agerande i Arktis och Arktiska rådet.
The Arctic region is rich in natural resources such as oil, gas, minerals and fish. Climate change causes the Arctic ice melt, making resource extraction possible as well as opening up new transport routes through the Northwest Passage and the Northeast Passage. This has led to competition and cross-border strife among the Arctic States. The two largest states in the Arctic are Russia and Canada, which are also members of the Arctic Council. Russia and Canada are at the moment involved in several disputes regarding the Arctic territory where the ownership of the North Pole is one example.
ISIT-modellen - Vägledning för att realisera en verksamhets informationssäkerhetsmål
The ISO standard ISO/IEC 17799/SS-627799-2 is a guidance for organizations to
realize their information security goals. In spite of this standard, studies
show flaws regarding information security in organizations. In particular flaws
regarding overall view, knowledge and clear roles and responsibilities have
been observed.
The ISIT (Information Security Integrated Three level) model and its
guidelines, developed in this thesis, help organizations to identify the
required processes and procedures as well as the logical process flow. The
thesis is based on theoretical studies and a case study within a multinational
company.
Ett öppet eller slutet Europa. En diskursanalys av EU:s flykting- och invandringspolitik
This thesis focuses on the perception of immigration and refugees in the commonEuropean refugee and immigration policy. It identifies different discourses andstudies their development and interrelated power structures.Using the discourse theory of Laclau and Mouffe, documents from theEuropean Council, the Commission, the Justice and Home Affairs Council andParliament debates are analysed. The study is defined in the time span of 1999-2006, i.e. from the European Council's first agreement on developing a commonEuropean asylum system, following the period up till today.Four discourses are distinguished, focusing respectively on rights, security,European Union's needs, and cultural identity. I use Sandra Lavenex theory ofrealism and idealism to analyse one of the main points in the thesis: There is afundamental schism between the one rights-based discourse, focusing on universalhuman rights, and the three sharing a particularistic focus on immigration as asecurity concern.
Informationssa?kerhetsanalysers verksamhetsnytta : Utva?rdering och fo?rba?ttringsfo?rslag
The importance of good information security and safety grows larger and larger for each day in the information society of today. This concerns citizens, companies and public authorities. At the Swedish Transport Administration, the operation of an information security and safety process has evolved over the years to guarantee that the public authority can be trusted by its citizens, cooperating companies and other public authorities. This responsibility has been assigned to the Information Security and Safety Department (Informationssa?kerhetsavdelningen, ITsa?).In this thesis the aim is to review to what extent ITsa? achieves any business benefits for the Swedish Transport Administration, and to analyze, streamline and come up with solutions to improve their workflow.
Trygghet och säkerhet i offentlig stadsmiljö :
To thoroughly think with safety and security in mind is an important issue in planning of public city spaces. Spaces intended to be available to all inhabitants of a city should have a welcoming appearance. Unfortu-nately, this is not the situation in many pedestrian walkways, parks and such spaces, possibly due to lack in safety and security.
This master thesis intend to examine questions at this issue ? what makes you feel safe and what causes insecurity in public city spaces. The safety aspect treats the human psychological and sociological ways of perceiving her milieu and other humans in it, and how the physical shape of her surroundings can affect the sense of safety.
Vad förvaltningen bör sträva efter : -riksdagspartiernas uppfattningar om de värden som förknippas med förvaltningen
The values politicians relate with public administration are likely to affect the way that they want the public administration to be organised. The purpose of this study is therefore to examine which values Swedish parliamentary parties relate with public administration and more particularly how they emphasise these values.The study is conducted as an analysis of theoretically relevant bills that the government party and the parliamentary parties have introduced to the Riksdag, and reports and statements of opinion from the parliamentary committees. The documents are from the Riksdag´s sessions from 2000/01 to 2005/06. After examining the documents the conclusion can be drawn that the value that is most emphasised during the period is legal security. This might mean that legal security will have more influence on the decisions taken about the organisation of Swedish public administration..
Den levande policyn
In today's changing environment, an increasing number of companies are realizing thebenefits of analyzing business information and thereby stay competitive. By making use ofdecision support systems, known as Business Intelligence (BI), organizations are expected tocollect and process business data and thus get more out of their business.Nowadays it is not enough for organizations to have access to corporate data inside officewalls, they must also be able to bring the information "on the go", which has been thefoundation for the progress of mobile BI solutions. As the mobility increases and thecorporate data leaves the office, new risks arise, which is one reason as to why manycompanies hesitate at the idea of introducing mobile BI solutions.In this paper we explore two security aspects in the area of mobile BI solutions. Our researchquestion is as follows: How does security aspects affect a company's decision to acquiremobile BI solutions? The survey was conducted through interviews in cooperation with thefirm Optivasys, exclusively dedicated to the BI solution QlikView.A significant part of the theory we studied describes security as critical; however, ourresearch suggests a solution on how companies can manage the security aspects.
Utrikespolitiskt beslutsfattande : En studie om hur en militär intervention kunde godkännas av FN
This study in political science examines the UN adopted resolution 1970 (2011) andresolution 1973 (2011) on the basis of foreign policy decision-making. The study aims toexplain how the UN principle of Responsibility to Protect came to be legitimized for the firsttime by the UN Security Council in the Libya conflict in 2011. By a poliheuristic perspectivethe study attempt to explain Russia and China?s acting in the voting of resolution 1970 andresolution 1973. The background to the conflict in Libya 2011 is presented in the study aswell as the Security Council?s actions during the conflict, from the beginning of the conflictuntil the adoption of resolution 1973.
Systematisk risk och avkastning på en volatil samt stabil marknad : En undersökning på den svenska aktiemarknaden
Background: Since the early 60?s, the CAPM or Capital Asset Pricing Model, has been an invaluable tool for assessing an asset's expected return, assuming that the asset is added to an already well-diversified portfolio of assets. CAPM theory assume that the unsystematic risk can be diversified and that the systematic, market-specific, risk is determined by the Beta value, from the Greek ?. An investor who takes big risks expect higher returns.One of the CAPM?s basic assumptions is that disruption in the market is not taken into account.