Sök:

Sökresultat:

1032 Uppsatser om Cyber security - Sida 15 av 69

Om solidaritet och ansvarstagande i världen : en diskursanalytisk studie kring internationaliseringen av svensk försvars- och säkerhetspolitik

The world is increasingly coalescing, ecologically, economically and culturally. Many problems can no longer be solved within the own state borders and the limitation of the territorial state is obvious. Jürgen Habermas means that a world domestic politic without a world government is what this progress need. Therefore it is important that national interests become less central and the solidarity between people is given priority in international relations. The focus of this thesis is therefore a critical discourse analysis of the current position of the internationalisation of Swedish security and defence policy.

Requirement Specification for Information Security to Health Systems, Case Study : IMIS

During 2001-2002 a prototype, IMIS (Integrated Mobile Information System) was developed at BTH (Blekinge University of Technology) to demonstrate how mobile IT-systems can be used in healthcare. The prototype was based on the activity theory of Engeström. An ongoing project started in spring 2003. The purpose of the project is further development of IMIS with special focus in the diabetes healthcare. Participants in the project are scientists and students at BTH, ALMI Företagspartner, Blekinge FoU-enhet, Barndiabetesförbundet Blekinge, Blekinge Diabetesförening, Vårdcentralen Ronneby and Vårdcentralen Sölvesborg.

Säkerhetsmedvetenhet vid daglig IT-interaktion hos hemanvändare

Dagligen interagerar människor med IT-system och internetanvändning har blivit en viktig del i många människors liv. Med fler användare än någonsin hanteras ofantliga mängder information och samhället ställer allt högre krav på IT-säkerhet. När det gäller att skydda sin integritet, tillgänglighet och sekretess vid internetanvändning fokuseras det ofta på tekniska åtgärder, såsom brandvägg och antivirusprogram. De tekniska åtgärderna skyddar användaren till viss del, men det räcker inte för att förhindra ett bekvämt och naivt mänskligt beteende. När säkerheten brister beror det oftast på den mänskliga faktorn.

Barn som söker negativ uppmärksamhet : En intervjustudie om ett av förskollärarens pedagogiska dilemman

The purpose of this qualitative interview study was to examine which approach experienced pre-school teachers have on children that seek negative attention. The study contains five informants in a city in the middle of Sweden and they all have at least 10 years of experience after their diploma from a pre-school teachers? program. The questions I aimed to answer were the following: How did the pre-school teachers define the expression ?negative attention?? What approach did they have on children that seek negative attention? What effects do the childrens? seeking of negative attention generate on their self-esteem and sense of security? How possible do the pre-school teachers feel it is to achieve the goals of the pre-schools? curricula that every child should get their needs respected and met, when they work with children that seek negative attention? The results showed that the teachers think of them as resources in the group and that they need to think of the environment around these children both at home and at the pre-school to better meet their needs.


Användare, säkerhet och webbläsare : Ett gränssnittsproblem

I denna uppsats beskrivs gränssnittsproblematiken i dagens webbläsare. Syftet är att undersöka om användargränssnittet i webbläsaren hämmar användarna till att sätta sina individuellt anpassade säkerhetsinställningar. En stor del vardagliga sysslor utförs via webbläsaren, exempelvis hantera bankärenden eller ladda upp bilder på sociala medier. Därför finns det ett behov av att webbläsarens gränssnitt kommunicerar olika säkerhetsnivåer och inställningar så att alla användare kan använda och förstå de inställningar som erbjuds. Med hjälp av teoretiska utgångspunkter söker vi svar på eventuella brister i webbläsaren med hjälp av användarstudier.

Utvärdering av den upplevda användbarheten hos CySeMoL och EAAT med hjälp av ramverk för ändamålet och ISO/IEC 25010:2011

This report describes a study aimed at uncovering flaws and finding potential improvements from when the modelling tool EAAT is used in conjunction with the modelling language CySeMoL. The study was performed by developing a framework and applying it on CySeMoL and EAAT in real life context networks.The framework was developed in order to increase the number of flaws uncovered as well as gather potential improvements to both EAAT and CySeMoL. The basis of the framework is a modified version of the Quality in use model from ISO/IEC 25010:2011 standard. Upon the characteristics and sub characteristics of this modified model different values for measuring usability where attached. The purpose of these values is to measure usability from the perspectives of both creating and interpreting models.

Fritidspedagogers ochgrundskollärares föräldrakontakt : Likheter eller skillnader i den verbala kommunikationen

The purpose of this study is to investigate whether there are any similarities or differences between leisure-time pedagogs and primary school teachers' verbal communication with parents. Questions we ask ourselves is how the verbal contact looks like today, the desire for how it should be and the importance of verbal communication has.We chose to make a qualitative questionnaire study in the form of open questions to three leisure-time pedagogs, three primary school teachers and eleven parents were asked to answer.The results show that leisure-time pedagogs, primary school teachers and parents believe that verbal communication is important and significant. They believe that it is working well today, whether is via face to face, telephone or email. The verbal communication should be honest and straight between all parties. Parents believe it is important to know leisure-time pedagogs who take care of their children, in order to create a sense of security among parents.

Digital Storytelling

The purpose of this paper is to analyze and map out the cyber culture of the Internet and its all users, identity, design theories and services. How people communicate and how they build up their identities are some of the baselines. I will also discuss the important aspects of Interaction design and how this can be used in a Community for digital storytelling. The Internet, or new media, was founded in the 60?s by some great philosophers (McLuhan, Rheingold, Lambert and more). With influence from their books I will discuss and analyze what kind of media the Internet is and how it can be seen as extensions to our senses, as McLuhan claims.

Förfogandeförbudets framtid. Förutsättningar för, och eventuella konsekvenser av, ett avskaffande av kravet på förfogandeförbud vid användning av återtagandeförbehåll.

In order for a retention of title clause (ROT-clause) to be valid against third parties underSwedish law, the debtor must be prohibited to dispose of the object transferred. Forinstance, the debtor must not be allowed to resell the object without the creditor?spermission or before the object has been fully paid. If the creditor gives consent to thedebtor?s disposal, he loses his right of separation.

En studie av SSL

Dokumentet är ett resultat av studier gjorda under kursen Kandidatarbete I Datavetenskap. Arbetet utforskade, genom fallstudie, två egenskaper av distribuerade informationssystem och relation mellan dessa: säkerhet och prestanda. Målet med fallstudien har varit att belysa nackdelen med användning av Secure Socker Layer (SSL) dvs. dess effekt på hastigheten och fördelen med SSL, dvs. SSL:s roll i informationssäkerhetsarbetet. Arbetet visar hur prestanda i ett tillämpad distribuerat informationssystem kan påverkas av en SSL tillämpning.

Social-engineering ett hot mot informationssäkerheten?

Den här rapporten tar upp ett annorlunda hot mot informationssäkerheten, som inte hårdvaraeller mjukvara kan stoppa. Detta hot kallas för social-engineering, och det som gör detta hotfarligt är att de anställda och chefer i en organisation, kan hjälpa utövaren av socialengineeringutan att de själva vet om det.Det går inte att förhindra att dessa attacker sker, men man kan förhindra de negativakonsekvenserna av en sådan attack. Denna rapport tar upp hur man ska göra för att enorganisation ska kunna fortsätta med sin verksamhet, efter en attack av social-engineering. Ivärsta fall kan en attack av social-engineering innebära att ett företag aldrig återhämtar sig.Detta kan bero på att organisationen har förlorat alla sina kunder, förlorat marknads andelar,eller för att de ansvariga och viktiga personerna i organisationen har blivit dömda föroaktsamhet och sitter i fängelse.Denna rapport ska informera och få er att vara uppmärksamma och medvetna om dessahot, som ni kanske inte vet finns. Ni ska få kunskap och lära er känna igen de olikaförklädnaderna en utövare av social-engineering antar..

Anställdas förvärv av värdepapper : Beskattningstidpunkten när förvärvet är förenat med förfoganderättsinskränkningar

It has become increasingly simple for companies to offer its employees shares in the form of incentive or option plans to acquire.  Companies motivate incentive plans with employee buy-outs that it will lead to higher involvement of work. The offers are often associated with disposal restrictions to the employee such as not immediately dispose of shares or that the employees will have to remain of employment within a certain timeframe. The problems with disposal restrictions are that it makes it difficult to determine the point of taxation.When shares deemed acquired at the time of share subscription the benefit will be taxable as income from service and the increase in value income from capital. When shares are deemed to be acquired only after cessation of disposal restrictions this will result in that the benefit is taxed only once.After the Supreme Administrative Court rulings in 3167-09 and 3168-09, it is now obvious that the acquisition is deemed to occur at the time of acquisition. The problem is not yet solved because the constant development of the security market needs to be considered.

Trådlösa nätverk

This report describes what wireless local area networks are and the use and configuration of them. These WLAN as they also are called can be used both in new installations and expansion of existing networks. Further on this report reveals security in this area. Security is incredible important in all networks not at least wireless because you don?t have to be in the environment physically to get the information, you only have to be in the coverage area that can be several hundred meters.

EU:s vapenembargo gentemot Kina - Orsaker till Frankrikes agerande för ett avvecklande av vapenembargot

France is committed to its ambition to lift the European Union's arms embargo imposed on China after the Tiananmen Square Massacre in 1989. France is of today the only member state that is acting to lift the arms embargo, evoking questions of motives behind its behavior. The underlying assumption in this essay is that France's actions reflect a need to find new ways of adapting itself and surviving faced with the threats of its decreased international influence. By using three different perspectives ? realism, liberalism and constructivism ? this essay examines three possible models of analysis to explain France's behavior.An analysis of the discourse covering this essay´s topic between 1989-2007 provided the basis of the paper.

<- Föregående sida 15 Nästa sida ->