Sök:

Sökresultat:

18264 Uppsatser om Information Security - Sida 14 av 1218

DISPUTERAD OCH KLAR- ÄNDÅ INTE ANSTÄLLNINGSBAR. Personalens upplevelser av anställningstrygghet och karriärmöjligheter vid ett svenskt universitet

This study examines university employees? perception of their employment situation and career opportunities. By tradition, fixed term contracts are used in the Swedish research community due to dependency on insecure funding. There is a current debate that questions this use of insecure employments. The employments are said to negatively affect the university?s societal role and international competitiveness.

Säkerhets- och arbertsmiljöarbete på Arbetsförmedlingen : Naturlig utveckling och påtvingade förändringar

Arbetsförmedlingen is the Swedish national authority responsible for the work politics, and its main purpose is to create and build a solid and sustainable job market.Economic crises together with changes in the society and in the organization over the past few years mean that the unemployed individuals that come in contact with Arbetsförmedlingen are no longer a homogenous group. A lot of effort is put into helping those who may find it difficult to enter the work environment, such as youths (19 ? 26 years old), people who have been unemployed or on sick leave for a long period of time, people with disabilities or immigrants who are newly arrived in Sweden.A harder social and economic climate can lead to frustration among the unemployed which mean that security measures at the offices has had to become adjusted. Local offices now have a public area where they have meetings with their clients and a locked open plan office space to which the public have no access. Working within an open plan office environment can cause health problems, mostly due to the constant background noise that comes from people having conversations on the phone, or with each other.

Sveriges hantering i praktik av EU:s regelverk om samordningen av medlemsländernas sociala trygghetssystem : En fallstudie av svenska offentliga instansers implementering och uppföljning

This essay analyses how Swedish authorities implement the EU regulations on the application of social security schemes and, more specifically, when it comes to health care and sickness benefits. The research is based on a survey and several interviews and aims to answer how the lower echelons of the hierarchy work towards the implementation, what are their working conditions and how the authorities evaluate and optimize the implementation process.The general conclusion of the study is that there are several flaws in the implementation process. The results have shown that there is a lack of resources as well as of tutoring and education amongst the actors. The complexity of the regulations does also seem to have influenced the process. Finally the results have shown that the public instances do not proceed to a systematic evaluation of the implementation process which has led to a bad communication between the different actors as well as to difficulties in improving the flaws in the implementation process..

Från diskurs till praktik? En studie om säkerhetiseringen av irreguljär migration och dess konsekvenser

This thesis discusses the theory of securitization in relation to the issue of irregularmigration, from EU level to national level. By using discourse analysis, the purpose isto explore whether the discourse leads to practice when it comes to nationalimplementation of EU debates on return policy. The material used in this workconsists of policy documents regarding the Return Directive from the EuropeanCommission as well as the Reva Project in Swedish migration policy. The mainobjective of the Reva Project is to make the process of returning irregular immigrantsmore effective and it has been strongly criticized, both by media and public opinion.The conclusion of this case study is that even if the security rhetoric may appearstronger on the EU level, the main elements of the security discourse are stillportrayed in the implementation on the national level. Based on this analysis we canmake the presumption that discourse develops into practice in the case of returnpolicy in the EU-member state relation..

Val av destination och reklam : En studie om faktorer som påverkar val av destinationen

The purpose of this study was to examine the various influences and advertising in particular affecting travelers' choice of destination. Data collection was conducted through quantitative method in the form of a survey to identify how travelers choose a destination, and to what extent they are influenced by advertising. Interviewees were travelers who were in Stockholm's central station would be passed on to Arlanda. The results from this study indicate that underlying factors such as economy, security, seasonal and service in place. The results also show that advertising is an important factor in selecting the destination.

Bluetooth and security

Detta arbete behandlar hur Bluetooth fungerar samt säkerheten kring Bluetooth och några allmänt tillgängliga attack verktyg. Syftet med uppsatsen är att försöka fastställa hur säkert Bluetooth är i dagens läge. Bluetooth har länge varit tillgängligt för att utbyta data över korta avstånd. Därför har man valt att implementera det i kommunikationsenheter som mobiltelefoner och laptops med mera. Det har funnits en debatt om hur säkert Bluetooth är.

Distribution av känslig data

Information Technology (IT) makes it possible to electronically distribute data between actorswho are in geographically diverse areas. Nowadays, information is sent less frequently throughtraditional correspondence in favor of faster electronic equivalents via the internet.Despite effective IT environmentand secure encryption techniques choose some actors to sendinformation through physical delivery. This phenomenon occurs in those working withconfidential information as it is handled by a number of rules and safety regulations.Based on a set of rules and requirements, we have looked over the possibility of sending sensitiveinformation electronically over the internet. The aim was to find general guidelines for howcompanies and organizations should manage and send sensitive information over insecurenetworks. This led us to our research question: How can information be exchanged betweenactors in geographically diverse areas be categorized and encrypted so that it can be transportedover the internet without security or integrity deficiencies?To answer the question, there was a case study at a defense company.

Ungdomars medvetenhet om säkerhetsrisker med bankverktyg

According to Nosti (2012) banks target youths to find new customers by giving them special offers such as debit cards from a relatively early age. However, Moschis and Churchill (1979) point out that age can affect the level of knowledge in the consumer. Therefore, this essay focuses on youths as consumers. Specifically, youths? awareness of security risks in using bank tools such as debit cards or internet banks was studied.

Trygghetskänslan hos mammor som går på tidig hemgång efter förlossningen

Vårdtiden för mammor efter förlossningen har minskat markant de sista decennierna. Det är därför av vikt att undersöka hur nyblivna mammor upplever den första tiden efter de har fött barn. Syftet med studien var att undersöka känslan av trygghet som mammor, med tidig hemgång, kände under den första veckan efter förlossningen. Metod: Enkäten Parents Postnatal Sense of Security (PPSS) med 18 frågor plus tre tilläggsfrågor användes. Enkäten skickades till 100 nyförlösta svensktalande mammor med normala förlossningar och tidigt hemgång.

HAVECA-modellen : En metod för att fortlöpande säkra ett internt nätverk mot tredjepart

This thesis will address a problem concerning availability of information systems at an enterprise within the financial sector and its external suppliers, so called trusted third party. The information system resides on the internal network of the enterprise and must be available to both employees of the enterprise and the trusted third party simultaneously. This contradicts the company policy which disallows third parties access to the internal network. The HAVECA-model introduced in this thesis provides a framework of methods, each solving a sub problem identified in the model. The identified methods are hardening, verification, control and assurance, together supplying a method for continuously securing the internal network against a trusted third party.

Hembudsklausuler i aktieägaravtal

Since the 9/11-attacks several nations have been confronted with a new international threat, its nature traces back to the political- and religious- radical movements of the 20th century Cold War. Ever since, various states have been under threat by terrorist organizations around the world due to mainly participating in worldwide counter-terrorist interventions created by western alliances. In Sweden, amongst other countries, the state took security-precautions that would imply total control of information throughout the territorial borders. The assigned proposition was accepted by the Swedish parliament in June 18th 2008, after this date wild spread criticism was still in effect ever since the Swedish government first publicly announced the proposition in May 8th 2007. This study emphasizes on understanding why the Swedish government chose to present this proposition to parliament, in order to complete this task the study will present the motives and the alleged threats that were the core of the proposition and its value-maximizing goal of creating a new surface for Swedish homeland security.

Lingvistisk knäckning av lösenordsfraser

För att minnas långa lösenord är det inte ovanligt att användare rekommenderas att skapa en mening som sedan sätts ihop till ett långt lösenord, en lösenordsfras.Informationsteoretiskt sett är dock ett språk väldigt begränsat och förutsägbart, varför enligt Shannons definition av informationsteori en språkriktig lösenordsfras bör vara relativt lätt att knäcka.Detta arbete riktar in sig på knäckning av språkriktiga lösenordsfraser, dels i syfte att avgöra i vilken grad det är tillrådligt att basera en lösenordspolicy på lösenordsfraser för skydd av data, dels för att allmänt tillgängliga effektiva metoder idag saknas för att knäcka så långa lösenord.Inom arbetet genererades fraser för vidare användning av tillgängliga knäckningsprogram, och språket i fraserna modelleras med hjälp av en Markov-process. I denna process byggs fraserna upp genom att det används antal observerade förekomster av följder av bokstäver eller ord i en källtext, så kallade n-gram, för att avgöra möjliga/troliga nästkommande bokstav/ord i fraserna.Arbetet visar att genom att skapa modeller över språket kan språkriktiga lösenordsfraser knäckas på ett praktiskt användbart sätt jämfört med uttömmande sökning..

Kommuner i interorganisatorisk samverkan : Att säkert och effektivt styra informationssäkerhetsarbete

Samverkan mellan kommuner a?r na?got som varit en aktuell fra?ga fo?r svenska myndigheter under en la?ngre tid. Mer specifikt har en tydlig o?kning identifierats sedan kommunallagen tra?dde i kraft 1991 och samverkansformen visade sig mo?ta reella politiska behov pa? ett positivt sa?tt. Samtidigt har offentliga organisationer de senaste 15 a?ren ga?tt fra?n att fo?respra?ka skyddandet av information till att bli mer o?ppna och utbyta information o?ver organisatoriska gra?nser.Denna kvalitativa fallstudie underso?ker informationssa?kerhet i en interorganisatorisk samverkan mellan svenska kommuner.

En fallstudie inom en organisation av Security Operations Center (SOC): Utmaningar och utforskning av Agil och Traditionell metodik : A Case Study in a Security Operations Center (SOC) Organization: Challenges and exploration of Agile and Traditional Meth

This study focuses on a specific organization of a Security Operations Center (SOC) as a case studyto first identify specific challenges related to the work process, preceding with identifying whichprinciples from various process models, such as agile and traditional methodologies from softwaredevelopment companies, can be implemented. Initially, the study presents relevant research on agile and traditional process models as well asresearch on SOC. Subsequently, six semi-structured interviews are planned and conducted withemployees within a specific SOC-type organization to identify the current work process and thechallenges affecting the organization?s work process. The results of this study indicate a description of the current work process in the organization aswell as a variety of challenges related to technical and organizational issues.

Förbränningslära för bubblandefluidbädd

Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report,  the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.

<- Föregående sida 14 Nästa sida ->