Sök:

Sökresultat:

8076 Uppsatser om Feminist Security Theory - Sida 8 av 539

Genusnormer p? Kvinnofolkh?gskolan: En fallstudie av deltagarnas upplevelse och skapande av kunskap och identitet i ett separatistiskt rum

Through a critical discourse analysis this study explores the gender norms that students on Kvinnofolkh?gskolan produce, reproduce and experience. Kvinnofolkh?gskolan is built on the understanding that the world discriminates against women politically, culturally, economically and socially, and thus intends to give women, non-binaries and trans people an education with a feminist alignment. Despite studies being made on gender segregated schools as identity forming, I argue that there is a lack of studies that show how gender discourse and theory is produced in contexts where men are excluded.

Sveriges säkerhetspolitik under 2000-talet : En analys ur ett liberalt och ett realistiskt perspektiv

The purpose of this study was to examine and explain Sweden?s defence and security policy during the twenty-first century. The method that was used in this research was a case study. The material that was used were government documents focusing on this area of policy, and numerous books concerning the theoretical perspectives on international relations and defence security policy. The study is of an explaining art and the analysis explains Sweden?s security and defence policy during the twenty-first century. The analysis explains this by testing it against a liberal and a realist view on international relations. The conclusion of the study is that Sweden?s defence and security policy has been liberal during this time period ? and still is.

Analys av datakommunikationssäkerhet för VoIP-protokoll

Voice over IP (VoIP) is a relatively new technology that enables voice calls over data networks.With VoIP it is possible to lower expenses, and increase functionality and flexibility. FromSwedish Armed Forces point of view, the security issue is of great importance, why the focus inthis report is on the security aspect of the two most common open-source VoIP-protocols H.323and SIP, some of the most common attacks, and counter-measures for those attacks.Because of the level of complexity with a network running H.323 or SIP, and the fact that it hasyet to stand the same level of trial as of traditional telephony, a VoIP-system includes manyknown security-issues, and probably at present many unknown security flaws.The conclusion is that it takes great knowledge and insight about a VoIP-network based onH.323 or SIP to make the network satisfyingly safe as it is today, and is therefore perhaps not asuitable solution for the Swedish Armed Forces today for their more sensitive communications..

Det ätstörda samhället och det sociala arbetet : En kvalitativ studie om ätstörningar ur ett sociokulturellt perspektiv

The main domain in which eating disorders are defined is medical, whereas socio-cultural perspectives are less common. Because social workers seeks to explain different problems taking societal factors into account, we asked ourselves if social workers have a way of understanding eating disorders, that is different from a medical point of view. Two focus group interviews were conducted; the one composed by social workers with experience of working with eating disorders, and the other by social workers without that experience, which enabled comparisons. The interviews were analyzed using socio-cultural and feminist perspectives. The result showed that the social workers use socio-cultural perspectives in explaining eating disorders.

En undersökning i datasäkerhet för hemanvändare - Är det nödvändigt att använda brandvägg?

The emphasize of this study is to evaluate security issues for home users having a personal computer connected to the Internet. It focus on the usage of advantages and disadvantages when using a firewall while connected to the Internet. The hypothesis is that it gives a better protection to install and use a firewall compared not to do so, due to security flaws in the operating system. The prediction was tested on a home user's personal computer. The testwork was divided into two major tests, each of them performed with, respectively without, a firewall. These major tests were divided into five smaller semi­ tests. The first semi­test without a firewall suffered from a virus or worm attack resulting in loss of data and log files.

Den särskilda kvinnan: En feministisk analys av Universella decimalklassifikationen

The aim of this thesis is to, from a feminist point of view, analyse the Universal Decimal Classification UDC, which is an international and widely used classification system. A number of the larger classification systems and subject heading lists have during the last decades been placed in the limelight of various gender studies and the systems treatment of women has been criticized. With this examination of the UDC, I dont merely wish to identify shortcomings and advantages with the UDCs way to treat men and women. The UDC is also used as an example of how the gender problem can be identified and interpretated in classification systems generally. My analysis is performed with a theoretical foundation in feminist science theories about knowledge and norms, together with a linguistic perspective on valuing and emotionally tinged language.

Betalningssätt via webben : En studie om konsumenters ansedda kunskap angående olika betalningssätt via webben och deras säkerhet

The e-commerce in Sweden has increased each year for the past several years, but still just over half of all the consumers feels worry about payment security. This could be the reason why over half of the consumers just shopped about one time on the Internet during the whole year of 2009. Another reason could be that the many consumers have a lack of trust to the different payment methods that are available during payment on the Internet, because they might don't possess enough knowledge regarding the payment methods and their security. If the consumers were to gain more knowledge about the payment methods and their security, it may lead to that the they would feel more comfortable when shopping online, and do it more frequently. It is this that will be investigated in this paper.The purpose of the paper  is to research if consumers believed knowledge concerning the different payment methods available on the web and their security influence the consumers trust in the payment methods.

Det etniska säkerhetsdilemmat-en idealtypsanalys över etniska konflikter

In the world after the Cold War, internal and ethnic conflicts have been predominant. Ethnic conflicts have their own theories on why they erupt and what can be done to solve them. This essay seeks to analyze how the Ethnic Security Dilemma can explain the causes, and possible solutions, of today´s armed ethnic conflicts.By making an ideal types typology over different types of ethnic conflicts, and then analyzing the Ethnic Security Dilemma´s impact on each conflict type.

Säkerhet i smarttelefoner : En jämförelsestudie mellan bärbara datorer och smarttelefoner i verksamheter

Smartphones have become more common as business tools within the workplace. With its many features and great flexibility, the smartphone has stormed the business world and become an alternative or complement to the laptop. As these mobile units' popularity has increased, the interest of businesses to invest in this new technology has increased, but has security kept up with the technology developments?This study aims to conduct a study to see if the companies in the IT industry have the same safety awareness for smart phones to laptops.The study shows that companies have greater safety awareness and higher safety requirements for laptops than smartphones. Meanwhile, both end-users and management are well aware of the risks and threats that the smartphone is facing..

Grälsjuka svenskar : En undersökning av verbala konflikter i två svenska 2000-talsfilmer

The purpose of this essay is to highlight the conceptions that exist in school towards homosexuality. My overall essay questions are: What rules does the school have to apply concerning homosexuality? What approach do the professors have towards young lesbian women and kind of support is offered to the group? In order to answer these questions I interviewed a professor and a young lesbian female. One of the surveys that has been made, as a normative order, about heterosexuality in the last decade is known as queer theory.One of the theories that in surveys investigates homosexuality as a normative order is known as ?queer theory? and it is the one I decided to use in this essay.Inspired by feminist research, gay and lesbian studies and the poststructuralist theory, the queertheory focuses on some peoples way of organizing sexuality is privileged, sanctioned and is perceived as normal, while others are seen as deviant, abnormal and therefore unwelcome.

Hur blir man feminist i Sällskapet? : Vägar till ett politiskt radikalfeministiskt fält

This field study examines how politically active radical feminists have reached their position in a group called Sällskapet. The aim of the study is to examine different paths, with the purpose to gain understanding of how to become a politically active radical feminist. Also, processes of social recognition on the field are examined; what is recognized and what taste preferences and behaviors gain a lower value? The different paths to the feminist position have been examined through a qualitative method consisting of a mixture of interviews and participant observations. The question if the position in Sällskapet requires specific experiences has been analyzed through Pierre Bourdieu?s theoretical framework, with a particular emphasis on the concept of habitus, symbolic- and cultural capital.

Riskhanteringens utmaning : En studie som identifierar svenska organisationers riskhantering avseende informationssäkerhet samt dess prioritering.

Background: Risk Management plays an important part of the enterprises strategic business activity. Efficient Risk Management will secure the businesses survival, assets and creates market advantages. The interest of information security has consequently gained in Swedish corporations. Corporations have realized the importance of the information which is stored in the IT systems. IT is the tool for businesses future progress and growth and therefore a source of risks.

Brasilien - ett modernt men religiöst land : En fallstudie av Brasilien utifrån Pippa Norris och Ronald Ingleharts teori om sekularisering och religiositet

The aim of this study is to examine the religious landscape of Brazil, and based on the theory of secularization by Pippa Norris and Ronald Inglehart to explain why Brazilians are religious and not secular. The study is a secondary analysis that uses existing statistics to examine different units of analysis of Brazil?s religious landscape, economics and equality, etc. Based on their theory I find that Brazil is still religious due to the lack of security in the country. Brazil is insecure in terms of measures of socioeconomic equality, stable politics without corruption, and physical safety of the citizens in Brazil.

Säkerhetspolitik, Medborgare & Frihet

The terror attack in New York year 2001 was a turning point in international politics. New policies were reformed in both USA and EU to secure their citizens from terrorism. The power of the institutions has developed and the question is; how does the new security policy affect people?s freedom? Is it the agencies new policies that are restricting the freedom or the actions of a terrorist? The purpose of this study is to examine if the security policies in USA and EU are protecting their citizen?s freedom. Many individuals are not aware of how much the security policies are affecting their lives.

Europas gräns under en säkerhetspolitisk förändring? : En fallstudie om säkerhetspolitiken vid den europeiska gränsen mellan 2007 och 2010 samt en prövning av Köpenhamnsskolans säkerhetiseringsteori

The purpose of the essay is both to bring forward the threats images, sectors, actors and referents that can be found at the European border between 2007-2010 and to explore whether they change during this period. Furthermore, the essay also intends to review the Copenhagen School?s theory of securitization. The analysis of the essay will be done on the European commission?s ?Enlargement Strategy and Main Challenges?, a rapport that focus on the European border and its enlargement.

<- Föregående sida 8 Nästa sida ->