Sökresultat:
2688 Uppsatser om Environmental Security - Sida 2 av 180
När Arktis isar smälter tinar världen upp? : En kvalitativ analys av det vidgade säkerhetsbegreppet i den svenska strategin för den arktiska regionen
This study is called When the ice of the Arctic melts is the world defrosting? and written by Rebecca Fröling.The purpose of the study is to investigate how the concept ?security? is used in the Swedish arctic strategy and why the concept is described in that way. The debate of the concept ?security? has been going on for years, but the debate is still present today. What we put in to the concept is operative for how we regard and discuss security and security politics.To analyze the strategy I used two theories, one with a traditional approach and one with a critical approach to security: Realism and Copenhagen School.The method that has been applied to the study is qualitative content analysis, to be able to analyze the text on the depth.
Livsmedelssäkerhet, konflikt och hållbar fred - en teoriutvecklande studie om matens makt
In our world, more than two billion people are living under insecure food conditions and more than eight hundred million people are estimated to be starving. The majority of these people live in developing counties which are poor and often subject of civil war. The past fifty years the main subject of security analysis has been the sovereign and rational state and the threats have been viewed in terms of military and weapons of mass destruction. This has come to change over the last decades and security as a concept has broadened, which better represents the reality of today. Within this broader conceptualization of security the main referent of security is the individual, rather than the state, and threats are not only analyzed from a military point of view, but also seen as threats against human rights and freedoms.
Säkerhetsstyrning inom den Finansiella Sektorn : En Studie på Best Practice hos Tre Svenska Banker
For organizations that handle sensitive information, IT governance and information security are necessities in order to maintain credibility and to conduct its business efficiently. There are several known processes to increase security governance ? which is a fusion of information security and IT governance.This master thesis examines if organizations use recognized processes and if it in that case would lead to higher security. The study is qualitative and conducted in the financial sector and based on Best Practice frameworks of the security governance in Swedish banks. Data collection was done through interviews and surveys that were triangulated to get a gathered picture of the quality of the security governance activities.
Human Security in Serbia: A Case Study of the Economic and Personal Security of Internally Displaced Persons
The aim of this study was twofold; firstly it sought to describe the human security situation of Roma IDPs and IDPs living in collective centers, secondly it tried to create an understanding for how the human security situation can affect IDPs capabilities to develop. The findings of the study were mainly based on a field study conducted in Belgrade, Serbia for two months. The results of the study were that IDPs in collective centers have a poor human security situation regarding basic income, employment, adequate housing and experienced personal security. Roma IDPs suffer from the same insecurities, but in addition also has poor human security in basic education and personal safety. Their stagnant human security situation proved to be the result of the inability to help IDPs by the actors involved in the relief work.
Säkerhet i det trådlösa hemnätverket ? En analys av de vanligaste säkerhetslösningarna
The security solutions used in wireless home networks are examined in this report. Thegrowing number of wireless units have increased the need for reliable security solutions.This report aims to enlighten the reader about the fundamental technology used inwireless security solutions and inform about the existing flaws. A recommendationabout how to achieve a high level of security in the home network is also given to thereader.Several flaws in the security solutions in use have been reported. Of these the mostsevere has been examined in a test network using highly accessible tools to get aperception of how vulnerable the user is.The tests showed that several attacks were efficient and easily carried out. We have alsoseen that several of the home networks in our sample are susceptible to these attacks.Our survey revealed that the Internet service provider's technical support in many caseslacked the knowledge necessary to inform the user about reliable security solutions..
Case Pöyry Sweden AB : Miljöprestandaindikatorer för ett tjänsteföretag
The world's natural resources are constantly being reduced, which increases the pressure on companies to actively engage themselves in environmental activities. Meanwhile, stakeholders focus is being broadened and it is now important not only to supply a particular product or service but also show that they are actively pursuing an environmental agenda. Companies can use various tools to aid in environmental efforts, but also to demonstrate to the world that the company is actively engaged in environmental activities. One such tool is the environmental standard ISO14001 which provides the company with guidance and support on how the business must manage its environmental efforts. To show a business' progress in environmental performance, it is advantageous to use environmental performance indicators as they enable stakeholders to easily understand how the business works with environmental issues.Authors in the field explain that the environmental management system propagation is limited in service organizations.
Säkerhetsansvarigas syn på supportrars beteende och dess inverkan på ishockeyevenemang : En kvalitativ studie om hur säkerhetsansvariga ser på supportrars beteende och dess inverkan på ishockeyevenemang
Are icehockey supporters a big problem in todays society? Is security required during icehockey events, and how is it implemented? This study was aimed to investigate the people at security positions and their view on fan behavior and it?s impact on icehockey events. It was a qualitative study were six interviews were made with people in charge of the security at different hockey clubs. The results showed that security managers overall saw a good fan culture, and that it created a wonderful atmosphere. Security managers worked a lot with dialogue with the supporters and they thought it had a good effect.
Från neutralitet till öppenhet? : En studie av säkerhetspolitikens utveckling i Sverige efter kalla krigets slut
Abstract Title: Från neutralitet till öppenhet? ? En studie av säkerhetspolitikens utveckling i Sverige efter kalla krigets slutAuthor: Jens KindhSupervisor: Patric LindgrenLinnaeus UniversityDepartment of Political ScienceSpring term 2012 When the Cold War ended, a new security situation was unfolded in Sweden. The purpose of this thesis is to describe and compare how the Swedish security policy is organized and how it has changed since the Cold War ended. To do that, I?m going to try answer the following questions:How is the Swedish security policy organized?What defence resolutions have affected the Swedish security policy after the Cold War ended?How has different political actions made its impact on the Swedish security policy after the Cold War ended?My theory is to try explain how the Swedish security policy has changed after the Cold War through a realism security perspective called traditional security, which refers to a realistic construct of the states security policy.
Att färdas i symbios : ett gång -och cykelstråk anpassat efter trafikanternas rörelsemönster och behov
The aim of this paper is to examine the layout of public spaces and its effect on human behavior with focus on the relation between pedestrians and cyclists movement patterns in a specific path. The study emanates from the security aspect of pedestrians and cyclists, and builds upon previous theories and empirical studies about perception, security, information design, environmental psychology and behavior. The result shows that individual behavior and movement pattern differs with age, purpose, physical- and other conditions, and layout of the surroundings. A design proposal for improved layout of a path and a node between different oncoming paths has been developed to aid the users? needs, where a separation of walkways and bike lanes forms zones of security for the purpose of better orientation and a better flow between the users..
En känsla av trygghet : Patienters perspektiv inom palliativ vård
Background: Every year 56 million people die around the world and it is estimated that 60% of these people are in need of palliative care. It has been shown that patients in the palliative care experienced their situation as uncertain. When life no longer was certain, the patients tried to live their life day by day and make the best of it. Problem: When patients were diagnosed with an incurable disease the future became unsure, because their life would come to an end. Therefore patients with a palliative diagnosis could be in need of experiencing feelings of security.
IT-säkerhetspolicy ? efterlevs den av anställda?
ABSTRACT The main purpose of IT security policies is to protect companies against intrusion and unwanted spread of information. Statistics show that IT related crimes tend to increase and because of that it is important, from the company?s side of view, to be well prepared. The IT security policy is an important part of that preparation. A lot of the crimes related to IT can be deduced indirectly to employees at the companies where the crime takes place.
Diskussioner om trygghet i planeringssammanhang :
This is a bachelor?s essay in the landscape architect programme in Alnarp.
The purpose of the essay is to describe discussions about security in planning contexts in Sweden. Written material from three levels of the discussions has been studied: Swedish research, governmental directives and practisers. I have tried to obtain a variation in types of material.
Säkerhet till varje pris : En jämförande studie om utvecklingen av privat säkerhet från Kuwaitkriget till Irakkriget
The purpose of this essay is to examine the development of the use of private securitycontractors in Iraq. The reason is that there has been a considerable increase of the number ofprivate security firms operating in Iraq during the last couple of years. The legislation in thefield of private military and security is indistinct and my hypothesis is that the lack of nationaland/or international legislation can be connected to the increased globalization. To come toany conclusions about this I have chosen to make a comparative study between the two casesthe Gulf War and the War in Iraq which started in 2003. In this comparison, I ask thefollowing questions: 1) Are there any signs of anarchy in the field of private security duringthe Gulf War respectively the last War in Iraq? 2) In what way has the use of private securitycontractors changed from Case 1 to Case 2 ?According to my research, there were signs of anarchy in the field of private security bothduring the Gulf War and during the latest war in Iraq.
Analytiker och riktkurser: - Varför bry sig?
The purpose of this master thesis is to evaluate how the current share price and market consensus affect security analysts target price and if an investor should pay any attention to it. Empirical data is primarily collected from qualitative interviews with ten security analysts but also from a quantitative e-mail survey. Our main finding is that security analysts are indeed affected by each others earnings forecasts as well as the current share price. This is not strange, it is in several aspects rational. Security analysts has often nothing to gain by standing out too much and not either by spending too much time trying to create their own opinions due to lack of time or the complexity of what is analyzed.
Privata säkerhetsföretag - Våldet som handelsvara
This essay tries, in different levels, to explain and create a deeper understanding for the phenomena ?private security companies?. By using Mary Kaldors theory about new wars, I will come to the conclusion that the insecurity that these wars create is an important part in understanding the emergence of a security need that these private security companies can provide. Later I investigate and explain howthe neoliberal privatization policy that is spreading through the world today has laid ground for development of the private security industry. When I have answered these questions I analyze how the private security companies can affect the state, war and peace both positively and negatively.