
Sökresultat:
6493 Uppsatser om Computer science - electronic security - Sida 10 av 433
Sjukvårdsrådgivningen i Karlshamn, Blekinge Län, : Från utredning till verklighet, om processen att införskaffa ett system
This Batchelor?s Thesis concerns 20 points at the MDA-program (People, Computers and Work) at Blekinge Institute of Technology in Ronneby, Sweden. 10 points concerns Computer Science and 10 points Human Work Science. The thesis is about the process of starting a new department of Blekingesjukhuset [Blekinge Hospital] in Karlshamn, Blekinge called Sjukvårdsrådgivningen [Health Care Advice Bureau]. The thesis starts with a description of the ethnographical methods used, followed by the process of establishing the department.
Diskussioner om trygghet i planeringssammanhang :
This is a bachelor?s essay in the landscape architect programme in Alnarp.
The purpose of the essay is to describe discussions about security in planning contexts in Sweden. Written material from three levels of the discussions has been studied: Swedish research, governmental directives and practisers. I have tried to obtain a variation in types of material.
Säkerhet till varje pris : En jämförande studie om utvecklingen av privat säkerhet från Kuwaitkriget till Irakkriget
The purpose of this essay is to examine the development of the use of private securitycontractors in Iraq. The reason is that there has been a considerable increase of the number ofprivate security firms operating in Iraq during the last couple of years. The legislation in thefield of private military and security is indistinct and my hypothesis is that the lack of nationaland/or international legislation can be connected to the increased globalization. To come toany conclusions about this I have chosen to make a comparative study between the two casesthe Gulf War and the War in Iraq which started in 2003. In this comparison, I ask thefollowing questions: 1) Are there any signs of anarchy in the field of private security duringthe Gulf War respectively the last War in Iraq? 2) In what way has the use of private securitycontractors changed from Case 1 to Case 2 ?According to my research, there were signs of anarchy in the field of private security bothduring the Gulf War and during the latest war in Iraq.
Analytiker och riktkurser: - Varför bry sig?
The purpose of this master thesis is to evaluate how the current share price and market consensus affect security analysts target price and if an investor should pay any attention to it. Empirical data is primarily collected from qualitative interviews with ten security analysts but also from a quantitative e-mail survey. Our main finding is that security analysts are indeed affected by each others earnings forecasts as well as the current share price. This is not strange, it is in several aspects rational. Security analysts has often nothing to gain by standing out too much and not either by spending too much time trying to create their own opinions due to lack of time or the complexity of what is analyzed.
Ungas datoranvändning finns det några könsskillnader?
The purpose of this study was to examine if there are gender differences in computer use among the young. Our aim was to find out in what respects boys and girls differ, if at all. The main method of investigation is a literature review. We have also made a complementary empirical study in a public library. The literature studied principally covers computer use at home and in school.
Att tyda tecknen -En alternativ syn på förändringarna av Japans säkerhetspolitik
Japan's foreign and security policy has seen some substantial changes as a result of events like the first Gulf war and 9/11th. This has been taken as proof, by some, that Japan is abandoning its antimilitaristic stance and pursuing a more traditional hard power role through military means. This essay aims to explore if these shifts have coincided with any substantial shifts away from antimilitarism, which has had a strong influence on the country's security policy since the end of WW2.To do this I use constructivist theory, specifically regarding the impact of norms and identities on states security policy and briefly look into the problem of actor designation. The thematic focus is on security policy, from a narrow perspective, and thus I examine areas like the input and output to the Japanese military and the actual applications of this force. State identity is used to explore the prevalence of nationalistic sentiments and support for anti militarism in the public opinion and the political elite.The result of this study points to the further relevance of constructivist theory and especially the application of norms and identity.
Säkerhetstänkande integrerat i systemdesign via formaliserade metoder
Systems development methods mirror different organizational perspectives, and not all methods are formalised, but what they have in common is the purpose of structuring and supporting systems development processes. Which method would be the most suitable may be determined by the systems development context at hand, because every systems development context is unique. Information is a valuable asset in today?s organizations, and it needs to be protected against both internal and external security threats. In our essay we aspired to find and present suggestions as to how systems developers can include security in the very design based on formalised systems development methods to create systems that are better prepared to meet the security challenges of today.
Elektroniska konossement i Sverige. Elektroniska registreringar och reglerna för konossement.
While this summary is written in English, the paper published is written in Swedish.The paper concerns itself with the legal status of electronic transport records in a Swedish context. The main question asked is whether rules for bills of lading should be applied to electronic transport records, or if they should be treated according to general rules. A secondary question is asked; partially to help put the main question into context and partially to see whether the different legal regimes will lead to different solutions to an issue. This second question is if electronic transport records can effect the transfer of property (sv. sakrätt).
Klimatförändringar som ett säkerhetshot. En studie av internationella organisationers säkerhetisering av klimathoten
International organizations are important actors on the stage of world politics, and how these actors securitize the climate change issue is of importance for how it will be tackled by actors on global and national levels. The purpose of this study is to contribute to research on climate security discourses and how climate change is defined as a security concern amongst different actors. This study, in contrast to previous research, focuses on systematically mapping the definitions made by different international organizations by asking: whose security is at stake; who is responsible for responding to the threat; how is the nature of the threat defined; and what responses are suggested? By analyzing material consisting of a variety of documents and statements from five international organizations, I aim to identify differences between these actors ? in how the climate change issue is conceptualized from a security perspective. The result of the study shows that only one of the organizations shows clear elements of the national/geopolitical security discourse, while all of the other actors primarily use the human security discourse.
SiLu - Riktlinjer för spelmotor
Spelmotor är benämningen på den komponent som hanterar en del av mekaniken i
ett datorspel. Förutom funktioner för grafik, fysik etc. finns också funktioner
för rörelser, interaktion med världen etc.
I detta examensarbete går vi in på hur en spelmotor för morgondagens
mobiltelefon kan se ut, samt vad dagens mobiltelefoners hårdvara och mjukvara
saknar för att dagens PC-spel ska kunna portas till dem. Stödet för att spela
avancerade spel på mobiltelefoner växer ständigt och inom några år bör
hårdvaran vara ungefär densamma som på PC.
Är det effektivt? - En studie av ett företag och dess förvaltning av datorbaserade system
This thesis examines how a company can get an effective, high quality,
maintenance of their computerized systems. After literary studies concerning
the life cycle activity Maintenance we have studied how the maintenance at the
department IT Supply of IKEA IT AB in Älmhult is carried out. What steps and
measures in the analyzing of results of changes are carried out and if they
have predefined processes for changes.
Based on the facts we found most important in our literary studies we have
created a model and theoretically applied this to the maintenance of a specific
system to see what they can work with to further improve the quality and
efficiency in their maintenance.
The basis for our thesis is literary studies and the collected material has
been used as a foundation for the research at the company, which was carried
out through interviews.
This thesis is based on the question: ?How do the lack of a model for
maintenance and the lack of orientation affect the maintenance in a company??.
Elektronisk mobbning : En kvantitativ studie om elektronisk mobbning med fokus på genus, anonymitet och konsekvenser
Abstract:Today many adolescents have access to computers and mobile phones. They prefer to socialize through these means which has led to a new kind of bullying, the electronic bullying. The purpose of this study has been to examine the electronic bullying from the perspective of gender, anonymity and the consequences that it may lead to. We have chosen a quantitative approach by using a questionnaire survey targeting young people between the ages of 15-16 years in Kalmar county. 163 respondents took part in the survey, 78 girls and 85 boys. The gathered material is presented by means of contingency tables and has been interpreted by gender socialization, deindividuation and dehumanization.
Strategiska försvarsaktörer : En studie av NATO och EU:s kompatibilitet i rollen som säkerhetspolitiska aktörer
This essay conducts a descriptive analysis of the ideas expressed by NATO´s official security strategy "Strategic Concept" from 2010 and the European Union?s security strategy "A Secure Europe in a Better World" from 2003. The purpose of this analysis is to examine whether the ESDP and NATO are compatible with each other when it comes to the role of security policy actor. To do so, I´ve chosen to analyse the actors' security strategies based on three dimensions. These dimensions are: Their view of the international scene, their views on cooperation and their views on how to reach security.
Utrikespolitiskt beslutsfattande : En studie om hur en militär intervention kunde godkännas av FN
This study in political science examines the UN adopted resolution 1970 (2011) andresolution 1973 (2011) on the basis of foreign policy decision-making. The study aims toexplain how the UN principle of Responsibility to Protect came to be legitimized for the firsttime by the UN Security Council in the Libya conflict in 2011. By a poliheuristic perspectivethe study attempt to explain Russia and China?s acting in the voting of resolution 1970 andresolution 1973. The background to the conflict in Libya 2011 is presented in the study aswell as the Security Council?s actions during the conflict, from the beginning of the conflictuntil the adoption of resolution 1973.
Från "Word of Mouth" till "Electronic Word of Mouth" En studie i hur begreppets innebörd förändras över tiden
Uppsats för avläggande av filosofie kandidatexamen iKulturvård, Konservatorprogrammet15 hpInstitutionen för kulturvårdGöteborgs universitet2012:20.