
Sökresultat:
2133 Uppsatser om Computer security - Sida 5 av 143
Mänsklig säkerhet i Sudan- För vem och mot vad?
The concept of security is a contested one. The United Nations definition in UNDPs Development report of 1994 is the most authoritive and commonly cited. The civil war in Sudan has led to 2 million deaths and over 5.5 million refugees. In a resolution from 2005, the UN decided that the war in Sudan was a threat to international security and peace. The 10th of January UN decided that a peace commission ought to be send with 10 000 military and civil men including 700 policemen.The main purpose of this thesis is to improve our knowledge of those factors which can cause an increased risk of conflict within a state, and how that can affect the social conditions for individuals.
Mellan säkerhet och mänskliga rättigheter : en studie av den svenska officiella migrationsdiskursen
This paper focuses on the Swedish migration discourse and investigates if and to what extent it is dominated by a security perspective. Analysing a number of official texts and documents I want to show how the discourse describes migrants and what implications this carries with it for the migrants and for the Swedish migration politics. Through discourse analysis I have analysed whose security that is prioritised, the Swedish or the refugees, who is the refugee and the asylum seeker, and who is the illegal migrant in the Swedish official migration discourse. As a theoretical frame for the analysis I have used theories on migration and security. These include theories on the securitisation of politics, the globalisation and the creation of political identity from the nation state perspective and theories on the connection between migration and security.My results show that a security discourse is dominating the Swedish official migration discourse and is therefore defining our reality and the identities of refugees, asylum seekers and illegal migrants.
GPS-baserad virtuell geografisk inhägnad för mobil enhet
The aim of this paper is to find an algorithm to establish and maintain a
virtual
enclosure around a mobile unit. The area may take any form and should be
scalable
up to and including national borders. The enclosure is managed on the mobile
unit.
The target system is Android.
Smartphones, tablets and more recently, cameras is examples of mobile units. A
modern mobile unit is part of a computer network.
Socialarbetares syn på datorspelande ungdomar : En intervjustudie om socialarbetares problematisering av ett nytt fenomen
The purpose of our study is to describe and understand whether, and if so, how social workers in school and in social services construct computer gaming adolescents as a social problem. We chose social workers who encounter adolescents with different problems. We have conducted qualitative interviews with vignettes to capture the social workers' reasoning about computer gaming adolescents and how they handle this in their work. The study shows that all social workers we interviewed had encountered adolescents with troubling computer gaming habits. In the study, all agree that computer gaming becomes a problem when it leads to deviant behaviour such as not going to school, staying up all night and so on.
Förändring = Förbättring? : En studie av hur några användare skattar och upplever förändringar i ett datorstöd
Human-computer interaction is central for computer assisted development. The aim was to investigate the user experience of a new (U2) compared to an old (U1) computer system, within a cognitive psychology frame of reference. Six subjects, frequently using the system, participated in the study. It was shown that the new (U2) compared to the old system (U1) enhanced and supported more the users? system related procedures/tasks.
Container Security Initiative - En diskursanalys utifrån teorier om det il/legala
Container Security Initiative was launched in 2002 by the US Customs and Border Patrol in order to secure the global flow of containers destined for USA. This thesis attempts to analyze Container Security Initiative in relation to a possible future scenario made by the weapons industry where the state's global traderoutes are being subject to militarization. A development which is partly based on the threat posed by global illegal trade. The latter is discussed and defined based on current research made by Carolyn Nordstrom, Moíses Naím and theories on the cosmopolitan perspective made by Ulrich Beck. Strategy documents concerning Container Security Initiative are then analyzed in terms of discourse to try to say something about what the program indicates.
Webbased Timereport system
Webbaserat Tidrapporteringsystem.
Hur använder pedagogerna och barnen datorn i förskola och i förskoleklass?
The purpose with my degree project is to investigate the use of computers within the daily activity in three preschools and one preschool class. I have designed a survey that I distributed to the staff. The purpose of my work is to investigate how a number of preschool teachers and children in a few preschools and one preschool class in a medium-sized Swedish town are using the computer in their activities.My study shows that the computer is frequently used, both of the children and teachers, but also together. The children in my study are using the computer to play games, listen to music, and go into the websitewww.youtube.com, but also in order to write and count. The teachers primarily use the computer to document, check their e-mail and listen to music.
Ingenting är sant, allt är tillåtet : En kvalitativ studie om historiska datorspel som Assassin?s Creeds påverkan för det oavsiktliga lärandet och dess pedagogiska möjligheter
The main purpose of this study is to investigate the unintentional learning that happens during the use of computer games. With the use of interviews with students in the ages 13-15 who all have played the game series Assassin?s Creed, and then compared them with students who does not play the game, we have been able to identify that some learning is taking place, but that the student?s attitude towards the subject, and their maturity, also is vital for the learning. Even tough, the students who didn?t really enjoy history as a subject showed better knowledge after playing the game, than the students who hadn?t played at all, which indicates that computer games can be a good source for learning.
Låt det förflutna tillhöra det förflutna : En studie om datorspel, socialt välbefinnande och kunskapsmässig utveckling
This study investigates the effects that commercial computer games have on young individuals social comfort and learning progress. As a systematic study of literature, scholarly articles have been analysed in order to illuminate the positive as well as negative effects on social comfort and learning progress that may come with playing computer games. The social effects have mainly been discussed with role-playing games, such as World of Warcraft, as starting point, while the learning effects have been coupled with strategy games, such as Civilization IV. The study does not simply declare how these games can be good for these factors, but also in what respect computer games may prevent the development of young individuals socials skills and learning progress. The study showed that in spite of perpetual prejudices against computer games in the technological age, computer games might actually be good to use as a tool in order to authorize the development of young individuals regarding learning and social aspects.
Hälsa och datorkonsumtion bland pojkar i årskurs nio : En komparativ tvärsnittsstudie
The aim of this study is to investigate the prevalence of computer consumption among boys in ninth grade, and to see if there were any differences with regards to physical activity, sleeping habits, breakfast habits and BMI. The study has cross sectional design with a comparative and a quantitative structure and is based on a former study called ?Food & Health 2007?. The respondents were represented by 181 boys in ninth grade, recruited from ten different schools in the county of Uppsala, who were answering questions about media consumption, breakfast habits, physical activity and sleeping habits. Daily computer consumption was reported up to one hour for 12 % of the respondents, one to three hours for 65 % and over three hours for 42 %. The boys who had a high physical activity level were less frequent in computer consumption while those who had a low physical activity level spent more time by the computer.
Datorbaserad examination: En studie om användarhinder och systemacceptans bland lärare
The aim of this thesis is to examine how teachers use computer based assessment in their work and what user barriers they experience while working with computer based assessments. The result of the thesis is meant to provide an understanding of which factors affect the use of computer based assessments and how a company who provide computer based assessments applications can increase the rate of use amongst teachers.To investigate this, the author examined a company in Sweden who provide a computer based assessment application for both universities and high schools. The study was carried out at two different schools, a university and a high school, both located in Stockholm. In total nine teachers were interviewed. The author also conducted observations at the company whose computer based assessment application was examined.The author?s findings suggest that a lack of functions within the application and lack of costumer support from the company all negatively impacted the teacher?s use of the application.
Människohandel som en säkerhetsfråga
The purpose of this study is to examine which security approach dominates Sweden?s strategy for combating human trafficking. The two approaches covered in this essay are the state- centred perspective, and the individual-centred perspective. These approaches are being used because those two approaches are on each end of the security spectrum, and it is important to discover from what approach Sweden is working. This is important because it might help us to get a bigger understanding on why certain policies are being made.
Framtagning av en informationssäkerhetspolicy
This report was made for the company HordaGruppen AB to investigate how information security was handled. This report fits in the Master program of Internet Technology at School of Engineering in Jönköping University in Sweden.The question at issue was how you protect your information against different threats. One question was how to make an information security policy and which guidelines you can follow in the Swedish Standard, SS-ISO/IEC 17799:2000.Another question was to investigate the information sources at the company and which threats there are against it.The work begins with a presentation about information security for the chief of information and the chief of quality in the company. The next thing was to do a survey of as thing are at present with a tool from Länsteknikcentrum called ?Infosäkpulsen?.
WLAN : Oskyddad och okontrollerad datakommunikation
This master?s thesis investigates the technology and security awareness associated with wireless networks (WLAN). It has been stated by the media and theories that many wireless networks are unprotected. This has sparked an interest to investigate the phenomenon in the Jonkoping region. The study is based on the following research questions:- What security weaknesses are present with the WLAN-technology and how can these be avoided?- How does the wireless infrastructure in the Jonkoping region look like?- Why do companies implement the WLAN-technology?- Are the companies aware of the risks involved with WLAN?We conducted this study in three steps; the first step was to hack a wireless network in a controlled environment in order to investigate the weaknesses of the commonly used security measures.