Sök:

Sökresultat:

2133 Uppsatser om Computer security - Sida 11 av 143

Informationssa?kerhetsanalysers verksamhetsnytta : Utva?rdering och fo?rba?ttringsfo?rslag

The importance of good information security and safety grows larger and larger for each day in the information society of today. This concerns citizens, companies and public authorities. At the Swedish Transport Administration, the operation of an information security and safety process has evolved over the years to guarantee that the public authority can be trusted by its citizens, cooperating companies and other public authorities. This responsibility has been assigned to the Information Security and Safety Department (Informationssa?kerhetsavdelningen, ITsa?).In this thesis the aim is to review to what extent ITsa? achieves any business benefits for the Swedish Transport Administration, and to analyze, streamline and come up with solutions to improve their workflow.

Trygghet och säkerhet i offentlig stadsmiljö :

To thoroughly think with safety and security in mind is an important issue in planning of public city spaces. Spaces intended to be available to all inhabitants of a city should have a welcoming appearance. Unfortu-nately, this is not the situation in many pedestrian walkways, parks and such spaces, possibly due to lack in safety and security. This master thesis intend to examine questions at this issue ? what makes you feel safe and what causes insecurity in public city spaces. The safety aspect treats the human psychological and sociological ways of perceiving her milieu and other humans in it, and how the physical shape of her surroundings can affect the sense of safety.

Vad förvaltningen bör sträva efter : -riksdagspartiernas uppfattningar om de värden som förknippas med förvaltningen

The values politicians relate with public administration are likely to affect the way that they want the public administration to be organised. The purpose of this study is therefore to examine which values Swedish parliamentary parties relate with public administration and more particularly how they emphasise these values.The study is conducted as an analysis of theoretically relevant bills that the government party and the parliamentary parties have introduced to the Riksdag, and reports and statements of opinion from the parliamentary committees. The documents are from the Riksdag´s sessions from 2000/01 to 2005/06. After examining the documents the conclusion can be drawn that the value that is most emphasised during the period is legal security. This might mean that legal security will have more influence on the decisions taken about the organisation of Swedish public administration..

Det nya verktyget : En undersökning av förskollärares upplevelser med surfplattan

The aim of this thesis is to study preschool-teachers? experiences from using the computertablet as a tool for learning and teaching, in order to gain knowledge of how the integrationalprocess of information and communications technology (ICT) in preschool has progressedsince its instatement. The background that caused interest to make this study was the rapidprogression of the use of ICT-tools in childrens? everyday lives and the troubles that havesurrounded the process of integrating these tools into preschool-practices. The theoreticalbasis for the analysis of the research lies within the socio-cultural perspective.

Den levande policyn

In today's changing environment, an increasing number of companies are realizing thebenefits of analyzing business information and thereby stay competitive. By making use ofdecision support systems, known as Business Intelligence (BI), organizations are expected tocollect and process business data and thus get more out of their business.Nowadays it is not enough for organizations to have access to corporate data inside officewalls, they must also be able to bring the information "on the go", which has been thefoundation for the progress of mobile BI solutions. As the mobility increases and thecorporate data leaves the office, new risks arise, which is one reason as to why manycompanies hesitate at the idea of introducing mobile BI solutions.In this paper we explore two security aspects in the area of mobile BI solutions. Our researchquestion is as follows: How does security aspects affect a company's decision to acquiremobile BI solutions? The survey was conducted through interviews in cooperation with thefirm Optivasys, exclusively dedicated to the BI solution QlikView.A significant part of the theory we studied describes security as critical; however, ourresearch suggests a solution on how companies can manage the security aspects.

En-till-en på gymnasiet: En kvalitativ studie kring vad elever i behov av stöd anser att datorn har stöttat dem med i skolan angående språksvårigheter

The purpose of this study was to examine what students themselves think about using computers in school. The study was conducted in a school in central Sweden. The students in focus were students with reading and writing difficulties, dyslexia or language difficulties such as an other native language. A total of eight students were interviewed. The interviews were analyzed using thematic analysis.

Hur hanterar institutioner en miljö med blandade Operativsystem?

The purpose of this thesis is to investigate if there are environments that use some kind of central authentication system within institutions/schools. The hypothesis is that an institution not using a form of central authentication service has more need for maintenance and as such is considered a higher cost for the organization. The gathering of data has been done through interviews with technical personal at Blekinge Tekniska Högskola and Linköpings Universitet. Based on the technical background of the authors, and the system limited to discussing Windows and UNIX operating systems, a discussion and analysis of the systems working today has been done, with emphasize on the hypothesis..

Utrikespolitiskt beslutsfattande : En studie om hur en militär intervention kunde godkännas av FN

This study in political science examines the UN adopted resolution 1970 (2011) andresolution 1973 (2011) on the basis of foreign policy decision-making. The study aims toexplain how the UN principle of Responsibility to Protect came to be legitimized for the firsttime by the UN Security Council in the Libya conflict in 2011. By a poliheuristic perspectivethe study attempt to explain Russia and China?s acting in the voting of resolution 1970 andresolution 1973. The background to the conflict in Libya 2011 is presented in the study aswell as the Security Council?s actions during the conflict, from the beginning of the conflictuntil the adoption of resolution 1973.

Den europeiska arresteringsordern : ett rättssäkert förfarande?

The European union started as an area of economic cooperation, but has developed into an area of cooperation in many legal fields. There are these days even cooperation when it comes to dealing with criminals. There is a new procedure called the European arrest warrant which goal is to make the extradition of criminals between the different member states in the European union more efficient. Sometimes when a state receives a European arrest warrant they have to extradite the person in question without doing any investigation of their own. The procedure is based on the principle of mutual recognition.

Bristfällig säkerhet inom trådlösa routrar med fokus på WPS

I denna rapport undersöks WPS-funktionen då det uppmärksammats säkerhetshåli den. Intervjuer, tester och observationer har gjorts för att undersöka problemenmed WPS. De tester och intervjuver som gjorts indikerar att säkerhetsbristen i WPS-funktionen har säkrats upp med extra funktioner..

"Jag ser det som ett smörgåsbord" : En studie om två olika läs- och skrivutvecklingsmetoder

In this study I have compared two different development methods of reading and writing. I have done this by interviewing five first grade teachers in elementary schools and it is based on qualitative research interviews. The aim of the study was to immerse myself in which methods these five teachers describe that they have used. They got to describe how they work and how they have tought the students to read and write. I have investigated if the teachers think that the computer is a good tool. The investigation also shows if the teachers believe that the students´ writing skills deteriorate if they can use the keyboard instead. I came to the conclusion that four of the teachers used Arne Trageton´s method (2005) which means that the students learn how to write by using to computer.

Informationskrigföring - den nya teknikens hot

The new information society has revolutionised almost the entire world. But the new technique does not only bring good. That which was before only available on paper may today only be available on a computer system. This makes it possible to send data electronically. In the wrong hands that information can become a threat against the security of an individual, a company or even a nation. The possibility to protect oneself against attacks from the outside becomes increasingly difficult.

Utvärdering av datorprogram för användning vid dagvattenutredningar

The main object of this diploma work thesis is about how computer programs can bea tool to use for work on stormwater investigations. The advantage of using acomputer program compared with calculations made by hand is evaluated anddiscussed. The computer programs that have been used for studies and a sequence oftesting of the possibilities are Autodesks Storm and Sanitary Analysis and DHIs MikeUrban.Focus on sustainable development now permeates the building industry. As a resultstormwater investigations have been conducted in an increasing extent the recentyears. Stormwater is water produced due to precipitation, such as rain and snowmelt.Stormwater investigations normally contain descriptions of existing land use, plannedland use and suggestions of measures and technical solutions for the future disposal ofstormwater.The initial part of the thesis consisted of literature studies on stormwater andstormwater investigations to understand the science.

Säkerhetshot och lösningar för privatpersoner med bredband

As more and more people gain access to broadband in their properties, the security threats get bigger. A lot more people also have computers that they carry home from work where they store important information concerning the company. The information stored on theese computers can be very easy to retrieve if you have the will and the skill to do it. Very few people have any knowledge how to protect themselves from theese threats..

Privilegierad mobilitet? : Flygplatser, resande och säkerhet

Never before have so many moved so frequently as now. Mobility lies at the centre for the concern ofstates, business and technological development. Some even claim that we are witnessing a mobility turn inthe social sciences. However, as the capacity to move has increased so too has the control and surveillanceof mobility become more extensive. Since September 11, 2001 security has been the defining paradigm fora variety for actors.

<- Föregående sida 11 Nästa sida ->