Sök:

Sökresultat:

3198 Uppsatser om Human security - Sida 22 av 214

Riktlinjer för implementering av ISO 17799

An ongoing concern within the Intellectual Technological world is the issue of security. There are severe consequences if someone without permission searches a computer for secret information that was left unlocked. In order to prevent this situation from occurring, rules about password lengths or employees bringing personal flash drives into the company should be created and followed.As Internet become a worldwide phenomenon, the use of information technology is growing more than ever. With more use and accessibility to Internet, new threats against companies have also emerged. This report brings up the main issues that a company needs to regulate today.The standard for regulations and proposals for IT-security comes in a document called ISO 17799 and very complicated for those who are not experts in the field.

Nyanimism i Sverige : En studie om förmänskligande av hunden i samband med dennes död

This study focusses on how people in Sweden commemorate their dogs and handle their demise. By examining memorial texts for dogs that are presented by their owners on internet forums, memorial texts that are used on gravestones on an animal cemetery as well as an interview with an animal nurse, the study examines how dogs are humanized and treated in human-like ways. With theories about new animism, social acceptance (nomos) and ontology as the theoretical framework, the study provides an analysis of strategies by which people tend to humanize dogs in ways that are often similar to the handling and mourning of human deceased.                                               The empirical data illustrate how dog owners in Swedish society who have lost their beloved pet express themselves in terms of religious terminology. According to memorial texts, the dogs go to heaven, where they may be reunited with their owners, become free from their diseases, and in some cases they are buried in separate graves in animal cemeteries. The study also illustrates how dogs in Sweden today have almost equal opportunities and access to medical care as human beings.

"Vadå, har du bara en examen?" : En studie om relationen mellan studier och extraarbete

This study discusses the relationship between studies and part-time work. The aim is to gain a deeper understanding of why students enrolled in the programme of human resource management and working life choose to undertake part time work, specifically in the human resource business in such great extent while studying full time and what this means for the students regard gaining knowledge. It focuses on the students experience and in order to gain the understanding of this phenomenon three qestion formulations were formed; ?What are the reasons formed by the interviewed human resource-students for having part-time work in the human resource bransch, in addition to their full-time studies??, "What values are made visible regarding the students choices of having a part-time work in addition to their full-time studies?" and ?How does the students express the thought about their part-time work as a key to learn from their studies?? The empirical data were collected through interviews with eight branch-specific human resource-students. The data was analysed based on previous research and a theoretical framework consisting of Lave & Wenger's theory of communities of practice and John Deweys theory of learning by doing.

4-1BB is up-regulated in human mast cells, when exposed to tumor conditioned medium

Mast cells have for a long time been known to accumulate around tumors (Maltby et al., 2009). Studies show that they may be important and sometimes essential in tumor angiogenesis, tumor growth and metastasis of tumors (Soucek, et al., 2007; Xiang et al., 2010). In an expression array study (Wensman et al, submitted manuscript) performed on mouse mast cells exposed to tumor conditioned medium, the gene 4-1BB was among the most up-regulated genes compared to control medium. 4-1BB codes for a membrane receptor protein of the tumor necrosis factor superfamily and has been shown to be important in T cell regulation in tumor diseases. This study was performed to investigate if human mast cells up-regulate 4-1BB when they get exposed to tumor conditioned medium.

Vinnarna: Åtta framgångsrika HR-chefer om identitet, strategi, och framtid i en skeptisk omgivning

The purpose of this essay is to examine Swedish HR-managers who have either received, or been nominated for, the award ?HR-manager of the Year?. We investigate the managers? personalities, how they think about their own role and HR?s function in the organization, all in an environment that can be characterized by some skepticism towards HR. We find the HR-managers to be ?winners?; strong individuals that are confident, communicative, and driven.

Tryggare kan ingen vara? En studie om den danska flexicurity-modellens lämplighet för Sverige

This paper discuss the possibilities to transfer the Danish labour market policy, called flexicurity, to Sweden. There are two main purposes of this essay. The first purpose is to discuss the reasons why the Danish labour market policy could be interesting for Sweden. The second purpose is to investigate which obstacles that might occur during the transfer. For guidance I have used two startingpoints which highlights the Danish flexicurity's pros and cons.

Strategic Human Resource Management-ett medel att förbättra kundnöjdheten i serviceföretag

Motivationsskapande åtgärder är avgörande för de anställdas nöjdhet inom organisationen. Vad som motiverar de anställda varierar från individ till individ. Vårt resultat visar att det existerar ett samband mellan de anställdas nöjdhet och hur väl organisationens strategi, struktur, utvärderingar och belöningar stämmer överens med olika karriärinriktningar och drivkrafter. Studien visar även att de anställdas nöjdhet påverkar kundernas nöjdhet med servicen..

HAVECA-modellen - En metod för att fortlöpande säkra ett internt nätverk mot tredjepart

This thesis will address a problem concerning availability of information systems at an enterprise within the financial sector and its external suppliers, so called trusted third party. The information system resides on the internal network of the enterprise and must be available to both employees of the enterprise and the trusted third party simultaneously. This contradicts the company policy which disallows third parties access to the internal network. The HAVECA-model introduced in this thesis provides a framework of methods, each solving a sub problem identified in the model. The identified methods are hardening, verification, control and assurance, together supplying a method for continuously securing the internal network against a trusted third party.

"Jag kände mig som en pilot" : ??????En studie om interaktionsstilarnas påverkan på spelupplevelsen

Today's technology offers a variety of opportunities to interact with the interactive systems. Human-Computer Interaction in the last decade is the area of research that has contributed the most to this development. But how is this interaction perceived? The user experience is something that is formed by the interaction between human and the computer interactive systems. The objective of this thesis is to investigate how the user experience differs depending on how one interacts with a game.

Skydd på vilken grund? En komparativ fallstudie av den svenska utlänningslagen.

This paper studies the Swedish Alien?s Act regulations regarding individuals in need of international protection. The purpose of the essay is to examine the differences between the three grounds of protection that are found in the Swedish Alien?s Act. Central questions have been whether the origins of protection statuses granted in this act are national or international, as the UN convention relating to the status of refugees and also the progress of the European Union?s Common European Asylum System both are affecting the Swedish legislation.

Wolf movement patterns and the distribution of moose kills : implications for human harvest?

Most studies regarding wolf (Canis lupus) predation on moose (Alces alces) have focused on the total annual consumption of moose within a wolf territory but few have tried to describe the spatial impact of wolf predation on a local scale. In this study I have analyzed wolf movement data, wolf predation, moose hunting statistics and moose hunter observations to investigate how wolf predation affects the human harvest of moose in Scandinavia. Since wolves prey on mostly juvenile moose during summer, analysis of their summer movement patterns is crucial to understand its impact on the human harvest later during autumn. In this study both reproducing (n = 45) and non-reproducing wolves (n = 12) reduced their movement range during summer to 66% and 67% of their annual movement range, respectively. Reproducing wolves increased their movement range from early to late summer while non reproducing wolves did not.

Stadsdelsförnyelse i Norra Björksätra, Sandviken

The housing estates in the outskirts of Sandviken, consist of relatively large scale apartment buildings. This report, that is a B.A. thesis at 10 Swedish university points, aims to investigate and describe the opportunities to improve safety and security for inhabitants in Norra Björksätra. The purpose with this report is to make Norra Björksätra to a more attractive place to live in, by changing the negative trends in the area. Since demolition of at least some of the houses could be of current interest in some years; the purpose is also to investigate whether demolition or renewal of the area is the best solution.

Kreditgivningsprocessen : Hur humankapital och risk bedöms vid kreditgivning av nyetablerade småföretag

Small business enterprises have escalated in Sweden during the last decade. However, new established companies are struggling to maintain their selves during the startup process and according to a survey from Tillväxtanalys, only 68 % of startup companies from 2008 were still active three years later. One of the main reasons is lack of capital and the most common approach to finance companies is to apply for a bank loan. In other words, commercial banks are of great importance for new businesses. Although, the problem arises when there is no previous history from the new businesses that the bank could base its credit assessment on.

Dolt i det öppna

Communication is a part of everyday life. The more sensitive information we handle, the more interesting the question around security of your information becomes. There are two ways of handling security around the information you want to communicate, either you control the means by which you are communicating. Or you control the way you communicate, making you able to use existing communication channels. Existing methods within cryptography enables two parties to communicate information securely.

En studie av zero knowledge-identifikationsprotokoll för smarta kort

Zero knowledge protocols is a lesser known type of protocol that can be used for identification. These protocols are especially designed not to reveal any information during an identification process that can be misused later on, neither by the one who should be convinced of the identity of the user, nor by anyone else that is eavesdropping. Many of these protocols are also especially designed for implementation in smart cards. The more common type of card with a magnetic stripe has during the last few years become more susceptible to attacks since they are easily copied. Smart cards combined with a secure identification protocol has been predicted to be the solution to this problem.

<- Föregående sida 22 Nästa sida ->