Sökresultat:
2083 Uppsatser om Creating of security - Sida 9 av 139
Att färdas i symbios : ett gång -och cykelstråk anpassat efter trafikanternas rörelsemönster och behov
The aim of this paper is to examine the layout of public spaces and its effect on human behavior with focus on the relation between pedestrians and cyclists movement patterns in a specific path. The study emanates from the security aspect of pedestrians and cyclists, and builds upon previous theories and empirical studies about perception, security, information design, environmental psychology and behavior. The result shows that individual behavior and movement pattern differs with age, purpose, physical- and other conditions, and layout of the surroundings. A design proposal for improved layout of a path and a node between different oncoming paths has been developed to aid the users? needs, where a separation of walkways and bike lanes forms zones of security for the purpose of better orientation and a better flow between the users..
Metoder för trust : Hur praktiker arbetar för att bygga förtroende till knowledge management-system
This thesis examines how knowledge management professionals use trust as a component in the creation of knowledge management systems, and what methods they use for building trust.Adopting a grounded theory approach, interviews with 8 knowledge management professionals active in different industries served as the base for an analysis that identified trust to be the single most important common factor in the data. The concept of trust used by the informants was identified as relating to the knowledge management system itself, rather than other users, employees or groups in an organisation.Building trust, the KM-professionals mainly focused on three methods: simple solutions, system superiority, and implementation security. Using these methods, the KM-professionals seek to ensure system trust by creating opportunities for users to obtain positive experiences of using the system, and thereby generate a foundation for a trust-based relationship between the user and the system..
Att skapa kunskap i informationshavet : Om hur text kan struktureras för att skapa lärande i intranät
Creating instructions is not just about words, but also about text structure. A company creates many instructions to document their management systems, which often are presented through an intranet. This study examines how the text can be presented to make content understandable and give employees the knowledge to take action. An interview survey was made at Skanska Sweden and their management system "Vårt sätt att arbeta". The results show that it is mainly about creating an overview of the system and creating separations between different text sections.
Bluetooth and security
Detta arbete behandlar hur Bluetooth fungerar samt säkerheten kring Bluetooth
och några allmänt tillgängliga attack verktyg.
Syftet med uppsatsen är att försöka fastställa hur säkert Bluetooth är i dagens
läge. Bluetooth har länge varit tillgängligt för att utbyta data över korta
avstånd. Därför har man valt att implementera det i kommunikationsenheter som
mobiltelefoner och laptops med mera. Det har funnits en debatt om hur säkert
Bluetooth är. För att kunna genomföra denna undersökning så har vi satt oss in
i hur Bluetooth fungerar, vilka allmänt tillgängliga attacker och
implementationer av dessa, som finns.
Säkerhet och integritet i närfältskommunikation
Context. In today?s society we use smart cards in many areas, NFC is a smart
card technology that allows contactless interaction between a reader and the
tag, the tag is often in the form of a card. NFC can be used for various
payment methods or as access card to a building which makes life easier. In
previous studies, the technique has proven to be weak to attacks using an NFC
reader connected to a computer.
Säkerhetshot och lösningar för privatpersoner med bredband
As more and more people gain access to broadband in their properties, the
security threats get bigger. A lot more people also have computers that they
carry home from work where they store important information concerning the
company. The information stored on theese computers can be very easy to
retrieve if you have the will and the skill to do it. Very few people have any
knowledge how to protect themselves from theese threats..
Rysslands politiska utveckling : En fallstudie över svensk säkerhetspolitik
The Swedish security policy has changed from stressing neutrality to embrace co-operation within the EU and other organisations. New threats like terrorism, boarder-crossing criminality and natural disasters require new ways to deal with this type of problems to protect the society. Since the beginning of 21st century the high Russian economic growth has made it possible for the country to play an increasingly role as a superpower on the international political stage. In the same time the democratic development has been replaced by an autocratic rule which has obstructed the Russian- European relations. From a Swedish security policy view the Russian political development is of importance and the picture of Russian as a threat has changed from 1996 to 2008/09.
Att skapa kunskap i informationshavet - Om hur text kan struktureras för att skapa lärande i intranät
Creating instructions is not just about words, but also about text structure. A
company creates many instructions to document their management systems, which
often are presented through an intranet. This study examines how the text can
be presented to make content understandable and give employees the knowledge to
take action. An interview survey was made at Skanska Sweden and their
management system "Vårt sätt att arbeta". The results show that it is mainly
about creating an overview of the system and creating separations between
different text sections.
Hur används vetenskap och forskning i den politiska debatten? : Idéanalys av debatten kring försäkringsmedicinskt beslutsstöd
How is research and science being used in political debate? An idea analysis of the debate about försäkringsmedicinskt beslutsstöd (decision tool in healthcare security)This is a case study on different types of research use (utilization) The aim of this paper is to examine how the politicians make use of expertise and research in the parliamentary debate surrounding the decision tool in healthcare security (försäkringsmedicinskt beslutsstöd). The aim is also to find out to what extent different types of research use are present in this debate. In this case study the qualitative method of idea analysis is being used on the empirical material. The tool of analysis is based upon the theories of research use by Amara et al.
Dominerande affärsmodeller inom området informationssäkerhet
Computers together with Internet have been growing enormously, during the last decade and the area of information technology has been growing in the same speed. As long as the surrounding environment evolves, the business models must within the IT-area, keep the same pace. So, how do business corporations handle this change to attract customers? How do the dominant business models look like? In many cases, they are apparently much the same. But what differences can we see and what areas can be improved? We have showed that the IT area isn?t just one, it consist of several segments.
Övervakning och integritet ? en omöjlig möjlighet? En studie av de svenska riksdagspartiernas syn på förhållandet mellan övervakning och integritet 2006
There is an ongoing discussion amongst Swedish politicians about how the Swedish police will be able to handle increased organised criminality represented in the growing threats of terrorism. In May 2006 representatives from the seven parties of the Swedish parliament debated the question whether the Swedish security service and Swedish police should be permitted to use increased surveillance with the purpose of preventing severe criminality.The question of increased surveillance is a matter often connected to matters of personal privacy. The aim of this master?s thesis is to study which arguments are being used for and against the proposed law that would permit surveillance with the purpose of preventing crime, as well as examine members of Parliaments view on privacy.The methodology used in this thesis is both argumentation analysis and rhetoric analysis. These two tools are used to examine the minutes from a parliamentary debate about the bill mentioned earlier.
IT-relaterade hot - professionella IT-tjänstemäns farhågor och möjligheter
The objective of this thesis was firstly to examine the possibilities of creating a universal tool for evaluating IT-security. When all the material was gathered we saw that we had strayed away from our subject and that our focus was on IT-threats and IT-professionals apprehensions and possibilities on the subject. The purpose of this thesis was there after to find and identify threats and counter measures in publications and later discuss these with IT-professionals. We found and identified several threats that the professionals encountered in their work. These threats ranged from techniques used by hackers to threats that can arise when the users on the network are poorly educated.
Förstudie till införandet av centralt loggsystem hos Försvarsmakten
Modern IT systems tend to become more and more complex, while the number of active systems in companies increases. Furthermore, the number of security-related incidents is at an all-time high. These new conditions impose new demands on organizations. For example, it is no longer possible to manually collect and examine the systems log messages.The purpose of this thesis has been to make a comprehensive study of solutions for automated collecting and managing of log messages, analyze the Swedish Armed Forces specification for solutions for central log collection and management, and evaluating exis- ting solutions. The work consisted primarily of literature studies and evaluations of two of the Swedish Armed Forces of selected products: NetIQ Security Manager and Splunk.
Ett anpassat ledningssystem för informationssäkerhet : - Hur gör en liten organisation med hög personalomsättning?
This paper aims to find out how to implement an information security management (ISMS) system that is based on ISO/IEC 27001-standard into a small organization with high employee turnover. The standard employs the PDCA-method as a course of action for implementing the standard. The reason for implementing such a system is to introduce information security to the organization and to maintain it despite the changes in management. The paper based it?s survey on a case study of a student nation in Uppsala, Sweden.
Vem är du på Flashback Forum? : En studie av identitetsskapande på ett forum.
With this study we aim to learn more about the process in creating an identity onFlashback Forum. We have observed four members of the forum to find what themesdefine thier way of making an identitity. Besides to our empirical material we foundearlier research that could support our study. The methods we used was qualitativesince we wanted to get a deep understandning for their behaviour. We found thattheese three themes were central: Language, Content and the feeling of beingAnonymous.