
Sökresultat:
18264 Uppsatser om Information Security - Sida 10 av 1218
Hur används vetenskap och forskning i den politiska debatten? : Idéanalys av debatten kring försäkringsmedicinskt beslutsstöd
How is research and science being used in political debate? An idea analysis of the debate about försäkringsmedicinskt beslutsstöd (decision tool in healthcare security)This is a case study on different types of research use (utilization) The aim of this paper is to examine how the politicians make use of expertise and research in the parliamentary debate surrounding the decision tool in healthcare security (försäkringsmedicinskt beslutsstöd). The aim is also to find out to what extent different types of research use are present in this debate. In this case study the qualitative method of idea analysis is being used on the empirical material. The tool of analysis is based upon the theories of research use by Amara et al.
Mobil verksamhetsapplikation för Nationell patientöversikt : Implementation och automatiserad testning av mobil applikation
While the technological infrastructure that enables collaboration between municipalities, counties and private health care providers improves, so does the need for health-care providers to gain access to the right patient journal at the right time. For doctors, nurses and other health-care organization employees this goal is achieved by NPÖ, National Patient Summary. NPÖ effectively enables health-care records to be shared across organizational boundaries. This thesis is based on a demand by a mobile application that can give district nurses access to health-care records wherever they are.This thesis describes the development of a prototype of a mobile application aimed for NPÖ. This includes investigating a suitable mobile platform, investigating available card readers for reading electronic identification from SITHS cards and the ability to connect to external services such as NPÖ.
Utvärdering av SIEM-produkter
Denna rapport behandlar ett examensarbete med målet att hitta en paketering för resursövervakning i nätverk (NPMD - Network Performance Monitoring & Diagnostics) samt centraliserad logghantering (SIEM - Security Information & Event Management).Arbetet har utförts över fem veckor och bestod av att undersöka vilka produkter som kan vara möjliga att leverera till Ateas kunder genom att ta fram förslag på produkter och sedan utvärdera dessa i en virtuell testmiljö.Efter att två veckor av arbetet passerat beslutades att enbart SIEM-produkter skall utvärderas då vi annars inte kunnat hålla tidsramen på fem veckor. De första två veckorna bestod mestadels av efterforskning av olika produkter baserat på ett antal kriterier.Applikationen ska:? Stödja mallar och regler för Payment Card Industry Data Security Standard (PCI-DSS)? Stödja korrelering av händelser? Ej vara open source eller en hårdvarulösningUnder resterande tre veckor installerades, konfigurerades och utvärderades de produkter som var intressanta för ändamålet. Utvärderingen av produkternas funktioner och egenskaper utfördes i en virtuella miljö. Resultatet av testerna är ett dokument som innehåller information om varje produkts förmågor samt betyg på varje produkt.
Förstudie till införandet av centralt loggsystem hos Försvarsmakten
Modern IT systems tend to become more and more complex, while the number of active systems in companies increases. Furthermore, the number of security-related incidents is at an all-time high. These new conditions impose new demands on organizations. For example, it is no longer possible to manually collect and examine the systems log messages.The purpose of this thesis has been to make a comprehensive study of solutions for automated collecting and managing of log messages, analyze the Swedish Armed Forces specification for solutions for central log collection and management, and evaluating exis- ting solutions. The work consisted primarily of literature studies and evaluations of two of the Swedish Armed Forces of selected products: NetIQ Security Manager and Splunk.
Webbportal för kreditlån
This report describes the development of a well?functioning and aesthetically appealing web portal and associated database for a company called Svensk Kredit & Försäkringsförmedling AB (Translated: Swedish Credit & Insurance intermediation AB). The portal will test customers' creditworthiness through another company called Business Check in Sweden AB.Administrators to the web portal have a special user interface to display all customers, to disburse the money to the customer and edit customer information. A super?user interface is available for administrators where they can change the information on all administrator accounts.Many aspects of security has been addressed because the web portal will handle personal information.
Hotet från de kriminella MC-gängen - en normativ studie av värdekonflikten mellan den personliga integriteten och statens säkerhet
The aim of this essay is to illustrate a fundamental question; what is a democracy allowed to do to protect itself from enemies? I´ve chosen to analyze the conflict between the two values; individual integrity and state´s security. The individual integrity refers to every person's right to have a protected sphere, and the stat´s security refers to its right to protect itself, and these two positions are often time incompatible. This conflict of value is shown in a normative analysis, where depending on which perspective or normative logic is seen as primate, it gives different conclusions to what a democracy should do to defend itself.To demonstrate how severe the threats are against the society, I choose to examine a specific part of the organized crime, the outlaw motorcycle gangs. They have a special position in affecting the legal system because they have an explicit aim to influence the judicial system with scaremongering and threats.
Anbudskalkyl mer användbar i byggprocessen
This report is written for a consultant networking company with the purpose to review the development ofthe company's remote connections from a user friendly and security perspective.This includes an investigation of the possibilities to consolidate existing authentication methods foraccessing customers. The problem lies in the amount of methods being used. Through case study wefound that smart cards, SMS-service, software and hardware tokens exist.The only method feasible from a security perspective is smart cards. Since the method is not commonlyused by the company's customers a standardization of it would be counterproductive.Also, the purpose of this report is to investigate how the ongoing internal development of the remoteconnection will affect the company's clients. Within this framework we have also verified a designsuggestion.We interpret, after the completion of the case study, that the internal development of the remoteconnection is marginally affected by legal perspectives.
Återuppbyggnad av en kollapsad stat - En fallstudie av återuppbyggnaden av staten Afghanistan
The purpose of this thesis is to explore and analyze the processes and efforts involved in rebuilding the war-torn state of Afghanistan. The examined period span from the fall of the Taliban regime in 2001, to the elections in 2005. This period, commonly known as the Bonn-process, sets out the initial time for the reconstruction of the state.A theoretical framework, which considers the necessary mechanisms for successful state-building, will be used to analyze Afghanistan's re-building process. The mechanisms include the prerequisite of a stable security environment, emerging from a cease-fire, together with the development of a well-functioning economy, re-introduction of rule of law and rejuvenating civil society.The failure to establish a secure environment has had a devastating impact on all analyzed aspects of the re-building process. It is therefore crucial that the international society continuing to assists the Afghan government in its efforts to strengthen its capacity, in order to improve the security situation.
Användare, säkerhet och webbläsare : Ett gränssnittsproblem
I denna uppsats beskrivs gränssnittsproblematiken i dagens webbläsare. Syftet är att undersöka om användargränssnittet i webbläsaren hämmar användarna till att sätta sina individuellt anpassade säkerhetsinställningar. En stor del vardagliga sysslor utförs via webbläsaren, exempelvis hantera bankärenden eller ladda upp bilder på sociala medier. Därför finns det ett behov av att webbläsarens gränssnitt kommunicerar olika säkerhetsnivåer och inställningar så att alla användare kan använda och förstå de inställningar som erbjuds. Med hjälp av teoretiska utgångspunkter söker vi svar på eventuella brister i webbläsaren med hjälp av användarstudier.
Fritidspedagogers ochgrundskollärares föräldrakontakt : Likheter eller skillnader i den verbala kommunikationen
The purpose of this study is to investigate whether there are any similarities or differences between leisure-time pedagogs and primary school teachers' verbal communication with parents. Questions we ask ourselves is how the verbal contact looks like today, the desire for how it should be and the importance of verbal communication has.We chose to make a qualitative questionnaire study in the form of open questions to three leisure-time pedagogs, three primary school teachers and eleven parents were asked to answer.The results show that leisure-time pedagogs, primary school teachers and parents believe that verbal communication is important and significant. They believe that it is working well today, whether is via face to face, telephone or email. The verbal communication should be honest and straight between all parties. Parents believe it is important to know leisure-time pedagogs who take care of their children, in order to create a sense of security among parents.
Förändrad syn på svensk militär alliansfrihet? : En studie om svensk neutralitetspolitik mellan 1990-2008
Abstract: The purpose of this study is to examine how the Swedish policy of neutrality has changed between the years 1990-2008. The research method used for this essay has been comparative case study, which strives to answer four research questions. Two of these questions are: Which specific occurrences have been fundamental in changing the Swedish policy of neutrality? How have the Swedish policy of neutrality and the policy of non-alignment changed between the years 1990-2008? The theoretical frame work of this study consists of Europeanization as a comprehensive theoretical perspective. In order to explain the Swedish act regarding the policy of neutrality, Logic of Consequences and Logic of appropriateness are used.
Med Säkerhetsrådets resolution 1325 (2000) som utgångspunkt : En komparativ studie av två handlingsplaner
Security Council resolution 1325 (2000) is about women, peace and security. Since the resolution was adopted several countries has made their own National Action Plan for implementation of the resolution.Sweden and Denmark are two of these countries. Resolution 1325 is one of the documents that each countries armed force has to relate to in international work.These countries can get to work together in international operations within the framework of the Nordic Defense Cooperation, NORDEFCO. This study is done by looking at similarities and differences in the action plans and whether they can be an obstacle for the countries to cooperate in an international operation.In this paper a comparative analysis of Sweden and Denmark's plans for the Security Council resolution 1325 will be done. The comparison is made based on the clauses of the resolution relating to the member states actions.In this paper, a qualitative text analysis to be carried out with sections of Resolution 1325 as a model for the comparison..
Vårdtagarens perspektiv på sjuksköterskans bemötande
Every day in medical care the nurse and the patient meet, they are not just represented as the care giver and the care taker, but also as two unique individuals. The meeting is a very important part in caring and few studies have been made on this topic from the patient.s perspective. The purpose of this study was to describe the patient.s perspective on the meeting with the nurse. The study is a literature review, where articles have been reviewed, encoded, and then categorized. The result builds on our four main categories, confirmed as a unique indidual, the meaning of the information according to the patient, the humanistic side of the nurse, and the importance of humor in the meeting.
Athena - En intelligent och flexibel säkerhetslösning för transportbranschen
The project team has chosen to carry out the project itself. This is to be able to work more flexibly in the product development process and not be guided by some guidelines.Every day, we read in the media about a new truck burglary. The problem has become so common that we do not even notice it in the media. Each year the theft of 1 billion of Sweden and the entire 82 billion in Europe in 2008. This is an increase of 10 billion by 2007.
Behovsanpassad bevakning
The market for security is one filled with great opportunities. The security services companies are numerous and diverse, the Swedish market is dominated by two large companies: Securitas Bevakning AB and Falck Security AB. In this study we have focused on the bigger of the two, Securitas. This report describes and analysis the security service branch and its surroundings in an involved manner. The target group of the result is mainly people within the security branch.