Sök:

Sökresultat:

2083 Uppsatser om Creating of security - Sida 5 av 139

Flygvapnets Transformation : Fallstudie i flygutbildningens omtvistade placering

The transformation among armed forces in Europe is a consequence due to shifted security perspective and the growth of international security actors, such as NATO and the EU. Sweden has played an active role in EU to ensure its influence in forming the security policy for the organisation. Some studies mean it´s because of Sweden?s interest in strengthen EUs roll as a security actor they transformed their own armed forces to be able to take part in international operations. This transformation led to what can be called ?the Swedish defence dismantle? and some studies mean that it has led to the point where Sweden completely lacks the ability to defence themselves.The question is if the ambition to become an active member in these security organisations can explain all the decisions made throughout the Swedish defence-transformation, or if some decisions were made due to other factors?By studying the decision process leading up to the decision to locate the flight education to Malmen in Linköping this study seeks to answer why the decision was made.

Möjligheternas land? En kvalitativ studie om ensamkommande barns upplevelser av att leva i Sverige

This study concerns unaccompanied refugee children and their experiences of living in Sweden and also their thoughts about identity and security. The aim of this study was to find a deeper understanding of these children?s situation. We formulated three research questions in order to obtain this deeper understanding:? What experiences do the informants have of living in Sweden?? What are the informants? views of their identity in their new life situation?? What is security to the informants?This is a qualitative study based on six semi-structured interviews with six youths whom have come to Sweden as unaccompanied refugee children.

Ser ni mer än bara min kropp? -Patienters upplevelser av trygghet under operation

ABSTRACTIntroduction: An increasing number of patients undergo surgery under local anesthesia and are thereforeawake during the procedure. Nursing care that is provided to these patients can differ from those thatreceive general anesthesia. Previous research has focused on patients? general experiences of being awakeintraoperative. But there is no research that focuses on patients perceptions of security.

"Hellre en bra story än en dålig" : En kvalitativ studie om framställningen av berättandet i tv-spel

Within the literature and film sciences there are clear models of storytelling and methods of creating a good story. In the game industry it's more difficult because the games are often non-linear, and games are a less established medium than the other two. With this study our purpose was to examine game developers and methods they used when creating a videogame, with focus on storytelling. Four interviews were made with representatives from four different videogame companies in Sweden. The information from the interviews was put in relation to theories regarding the structure of videogames and an established model for creating videogames.

Inredningsförslag till Bolandgymnasiets matsal

My bachelor?s dissertation concerns the creation of a proposal for interior decoration of the Boland High School?s canteen. I have been in contact with personnel, students and the school principal through the duration of the project. In the end, substantive changes of lighting, interior decoration and movement were proposed for the canteen. In the proposal I have focused on accentuating the school?s profile, on creating smaller spatial configurations within the larger configuration of the room, lowering the noise level, creating a good movement flow, increase the number of seats and creating a pleasant environment in which to eat..

??Auktorisation och ackreditering inom Försvarsmakten : En studie i nyttan av en standardiserad process för att hantera informationssäkerhet

???Information Technology is an essential part of the society today, not least in large ???organisations dealing with sensitive information. An example of such an organisation is the Swedish Armed Forces which indeed is in the need of ways to ensure information security in their Information Technology systems. The means which is used is an authorisation and accreditation process.All Information Technology systems go through a life cycle which includes realisation, usage, development and liquidation. In the Swedish Armed Forces the lifecycle is an authorisation process.

Det (väst-) europeiska samarbetet - från säkerhetsdilemma till stabil fred

In this essay the morphing of the interstate relations in the post-World War II Western Europe is taken in to consideration in discussing how these relations were stabilized and consolidated through community cooperation to achieve a state of stable peace. It concludes that the early 1900's of Western Europe comes close to being conditioned by Herz's security dilemma and then continues to analyze the development from this state to one of stable peace. In this analysis pivotal features of the ECSC, EEC and the EC are being scrutinized through the use of Boulding's Stable Peace theory and developments of the very same, in separate case studies, in order to account for the Communities? influence on the peace process.In doing this, conclusions are drawn that external pressures can be very effective in creating an incentive to move beyond an initial state of conflicting self-images and that a stabilizing process has got to provide a long term solution in order to sustain a trustful relationship. In order to provide this long term solution the community cooperations suggests that locking in through institutionalization, harmonization, and the creation of a state of irrevocable interdependence are highly effective..

Handelsstopp på Stockholmsbörsen. Innebär handelsstoppen på Stockholmsbörsen en trygg handel och en effektiv marknad

This paper examines if trading suspensions on Nasdaq OMX Nordic - Stockholm work as a contributing factor in creating a secure trading. This has been made through an event study and examination of abnormal returns. Our results for plus tick suspensions indicate that suspensions fulfill their purpose in creating a more secure trading since the trend of abnormal return we observe prior to a suspension is disrupted. Thus, the suspension is warranted. The conclusion is that the market cannot be completely safe; as the law and practice is structured today an abnormal return is inevitable.

Den gemensamma utrikes och säkerhetspolitiken- Ett neo-funktionalistiskt perspektiv

This essay aims to explore the development of the common foreign and security policy within the European Union as well as the recent addition of the post of High representative in the field of the common foreign and security policy. This essay will attempt to achieve this trough exploring the questions; how have the aim of the European foreign policy developed, how the forms of cooperation has within this field developed and finally what impact will the recent addition of a high representative for the common foreign and security have. My aim is to answer these questions with the help of neo-functionalism.The results that came out of this essay point to the direction that the neo- functionalist premise about spill over effects and the notion about increased supranational influence turn out to have some validity in them. The study has shown that during the time the cooperation within the field of foreign and security policy have developed it is possible to see that supranational institutions will gain influence when the scope of integration within a policy area widens and deepens..

FN - i mäktiga staters tjänst En studie av hur FN påverkas av mäktiga stater

The United Nations is an important organization when it comes to international peace and security. Recent events in international politics, however, have brought about a widespread concern about the abilities of the organization. Powerful states have shosen to act outside of the organization to achieve their goals. They have furthermore a disproportionate influence on the decision-making body, the Security Council.The aim of this essay is to examine wheather UN can function productively as keeper of the international peace and security in the political climate of today, and to find out to what extent the powerful states harm the organization. I use a theoretical article, concerning states relations to international organisations, to analyse the acts of powerful states in UN.

Utvärdering av Falköpings kommuns Informations säkerhet

A student at the Technical University in Jönköping was given an assignment from Falköping municipality. The assignment was to evaluate their IT systems 'users' awareness of information security and even present suggestions for IT-Users to improve their information security within Falköping municipality.Falköping municipality consists today of seven administrations. The target groups for the study of the information security are a pilot group consisting of 30 IT Users and four different managers from various administrations within Falköping Municipality.The purpose of this work is mainly to indicate an understanding of the importance of the information security knowledge among IT Users in Falkopings municipality, mainly those who use their smartphones and tablets for work-related activities.This work aims to answer the following questions:? How wide is the awareness of information security among municipality's IT users?? How can information security improve among the municipality's IT users?Theories that work consists of are mainly what information security is, how it is handled and the threats and risks that may create problems for the municipality, basically when IT Users use their smart phones and tablets.The Work Implementation started with sending surveys to a pilot group of IT- system users and the student even interviewed four general managers working in Falköpings municipality. Both the questionnaires results and interviews results are presented in diagram and text.The result from both surveys and interviews was very positive and it shows that the municipality investigated IT-Users are very aware and have knowledge about information security, when they use their smart phones and tablets.

Utvärdering av den upplevda användbarheten hos CySeMoL och EAAT med hjälp av ramverk för ändamålet och ISO/IEC 25010:2011

This report describes a study aimed at uncovering flaws and finding potential improvements from when the modelling tool EAAT is used in conjunction with the modelling language CySeMoL. The study was performed by developing a framework and applying it on CySeMoL and EAAT in real life context networks.The framework was developed in order to increase the number of flaws uncovered as well as gather potential improvements to both EAAT and CySeMoL. The basis of the framework is a modified version of the Quality in use model from ISO/IEC 25010:2011 standard. Upon the characteristics and sub characteristics of this modified model different values for measuring usability where attached. The purpose of these values is to measure usability from the perspectives of both creating and interpreting models.

Utvärdering av Near Field Communication och Certified Wireless USB : Säkerhet vid utveckling av applikationer

Today?s society is one where technological advances are made daily, which increases the need to stop and assess the risks against users? integrity when integrating new technology in contemporary systems all the greater. We have taken two technologies, Near Field Communication and Certified Wireless USB, whose envisioned area of use is to be integrated into mobile phones, and evaluated what security threats are revealed for the respective technologies. The threats against security have been identified through research of the standards and existing reports for each technology. Practical experiments have not been conducted on account of us not having access to any equipment to run such trials.

En undersökning i datasäkerhet för hemanvändare : Är det nödvändigt att använda brandvägg?

The emphasize of this study is to evaluate security issues for home users having a personal computer connected to the Internet. It focus on the usage of advantages and disadvantages when using a firewall while connected to the Internet. The hypothesis is that it gives a better protection to install and use a firewall compared not to do so, due to security flaws in the operating system. The prediction was tested on a home user's personal computer. The testwork was divided into two major tests, each of them performed with, respectively without, a firewall.

Somaliska pirater - ett mycket litet problem: En undersökning av Sveriges arbete gällande frågan om somaliska pirater under 2009-2010.

During 2009-2010 Sweden participated in an international military operation whose intention, according to the Swedish news media, was to fight Somali pirates. The purpose of this thesis is to study various decisions and documents behind the Swedish efforts, both military and foreign aid, regarding the matter of Somali pirates during the years 2009-2010 and analyze the results using an interpretation of the security-development-nexus-theory. The method used is text analysis based on the hermeneutic idea of understanding and interpretation.The thesis studies the international resolutions and national decisions that lead to the military operations in the Gulf of Aden and also the international strategies and national approaches regarding Sweden's assistance in the development of Somalia. The theoretical section contains an interpretation of the vast security-development-nexus-theory. The concepts of security and development are first presented separately and then collectively in terms of military security, societal security, economic security, regime security and human security.

<- Föregående sida 5 Nästa sida ->