Sökresultat:
1638 Uppsatser om Legal security - Sida 6 av 110
Contra legem och in fraudem legis i svensk och tysk rätt
The legal conception of contra legem derives from Roman law and is translated into "against the law". A decision contra legem arises when the text of law and the legislators purpose of law are disregarded. A paradoxal consequence is that there will always be a decision contra legem, when the text of lawand the legislators purpose of law are contradictory. It is therefore important that decisions contra legem are based on legitimate motives to ensure law and order. In fraudem legis is another legal conception from Roman law and is translated into "evasion of law".
Renskötselrätten : som rättslig konstruktion
This master thesis concerns the relation between law and the theory of the conceptual metaphor which has developed within cognitive linguistics. Although its main focus is abstract thinking, it also covers a wide range of aspects within cognitive linguistics, such as the prototype theory and radial categories. In order to address this relation, three questions will be dealt with. Firstly, does the theory of the conceptual metaphor have relevance to interpretation of legal rules and contracts? Secondly, can the same theory explain why a legal rule or a contractual term has been interpreted outside of its most given area of application? Thirdly, when an interpretation is not predictable from a legal viewpoint, can such an explanation answer to that fact? Answering the first question will require a descriptive analysis of the conceptual metaphor and cognitive linguistics.
Människohandel som en säkerhetsfråga
The purpose of this study is to examine which security approach dominates Sweden?s strategy for combating human trafficking. The two approaches covered in this essay are the state- centred perspective, and the individual-centred perspective. These approaches are being used because those two approaches are on each end of the security spectrum, and it is important to discover from what approach Sweden is working. This is important because it might help us to get a bigger understanding on why certain policies are being made.
Framtagning av en informationssäkerhetspolicy
This report was made for the company HordaGruppen AB to investigate how information security was handled. This report fits in the Master program of Internet Technology at School of Engineering in Jönköping University in Sweden.The question at issue was how you protect your information against different threats. One question was how to make an information security policy and which guidelines you can follow in the Swedish Standard, SS-ISO/IEC 17799:2000.Another question was to investigate the information sources at the company and which threats there are against it.The work begins with a presentation about information security for the chief of information and the chief of quality in the company. The next thing was to do a survey of as thing are at present with a tool from Länsteknikcentrum called ?Infosäkpulsen?.
WLAN : Oskyddad och okontrollerad datakommunikation
This master?s thesis investigates the technology and security awareness associated with wireless networks (WLAN). It has been stated by the media and theories that many wireless networks are unprotected. This has sparked an interest to investigate the phenomenon in the Jonkoping region. The study is based on the following research questions:- What security weaknesses are present with the WLAN-technology and how can these be avoided?- How does the wireless infrastructure in the Jonkoping region look like?- Why do companies implement the WLAN-technology?- Are the companies aware of the risks involved with WLAN?We conducted this study in three steps; the first step was to hack a wireless network in a controlled environment in order to investigate the weaknesses of the commonly used security measures.
Sa?kerhet och integritet i webbapplikationer : En orientering o?ver sa?ker utveckling
The use of Web applications is a growing area. While the possibilities and functionalities are increasing, so is the complexity of them, together with the threats against them because the complexity also opens up the application to vulnerabilities. It is therefore important for developers to know how a web application can be developed with security in mind.This study?s intention has been to create an introductory documentation of what kind of techniques that exists which can produce higher security, which methods there can be within the development process and what to think about when programming secure web applications. In this paper we have investigated how theoretical manuals in the IT security department handles that area, and interviewed two developers from two different companies to see how they use security in their web applications.The study has an exploratory technical perspective and does not explain how to practically use and interconnecting different security-enhancing technologies, but is more suppose to give a first glance at what is available and sow a seed for those interested to continue reading further about the subject.
Sveriges säkerhetspolitik under 2000-talet : En analys ur ett liberalt och ett realistiskt perspektiv
The purpose of this study was to examine and explain Sweden?s defence and security policy during the twenty-first century. The method that was used in this research was a case study. The material that was used were government documents focusing on this area of policy, and numerous books concerning the theoretical perspectives on international relations and defence security policy. The study is of an explaining art and the analysis explains Sweden?s security and defence policy during the twenty-first century. The analysis explains this by testing it against a liberal and a realist view on international relations. The conclusion of the study is that Sweden?s defence and security policy has been liberal during this time period ? and still is.
Blankning i rättslig belysning
Shortselling and loan of shares are becoming a common complement to"traditional"trade in shares. To be able to lend shares, it is necessary to reregister the shares so that the shortseller is competent to sell these shares further. In a legal sense, the proprietorship of the shares has changed hands, though it is not obvious for those involved to see what happens to the prorietorship. The obscurity is principally whether a complete changeover of the proprietorship is made between those concerned. This essay makes clear which legal consequences loan of shares and shortselling get concerning the proprietorship, and how a conflict between the lender and the third party should be solved if the shortseller becomes bankrupt.
VEMS SÄKERHET? VILKA RÄTTIGHETER? : Om diskursförändringen i svensk migrationspolitisk riksdagsdebatt 1975-2002
Human rights and solidarity, as well as moral and legal responsibilities to protect people in need of refuge, seem to be principles of secondary importance within international migratory policies today. Instead, the predominant view seems to focus more and more on the protection of territorial borders, the welfare state and national identity. This international change in discourse can also be seen in the political trends of individual states. There are reasons to believe that this is a development that is also perceptible in the political rhetoric that is used in parliamentary debates, which constitute the main focus of this thesis. The aim of this study has therefore been to increase the understanding of this change in migratory policies by analyzing Swedish parliamentary debates between 1975 and 2002, using a theoretical framework focused on two different perspectives on security: First, the Copenhagen School and securitization of migration, and second, human security and human rights.
Analys av datakommunikationssäkerhet för VoIP-protokoll
Voice over IP (VoIP) is a relatively new technology that enables voice calls over data networks.With VoIP it is possible to lower expenses, and increase functionality and flexibility. FromSwedish Armed Forces point of view, the security issue is of great importance, why the focus inthis report is on the security aspect of the two most common open-source VoIP-protocols H.323and SIP, some of the most common attacks, and counter-measures for those attacks.Because of the level of complexity with a network running H.323 or SIP, and the fact that it hasyet to stand the same level of trial as of traditional telephony, a VoIP-system includes manyknown security-issues, and probably at present many unknown security flaws.The conclusion is that it takes great knowledge and insight about a VoIP-network based onH.323 or SIP to make the network satisfyingly safe as it is today, and is therefore perhaps not asuitable solution for the Swedish Armed Forces today for their more sensitive communications..
När har juridiska personer beviljats förvärvstillstånd av lantbruksfastigheter?
The purpose of this report is to study when and why legal persons have been allowed to acquire agricultural properties.
The ownership of agricultural property is governed by the Land Acquisition Act. The reason for this is because they want to limit legal person owner-ship of agricultural properties. It is believed that a large proportion of pri-vate ownership is healthy and stimulating for the Swedish countryside.
There are some exceptions in which legal persons may be able to acquire. This is a review over decisions taken by the authorities. In this report I have studied purchases made between 2008 and 2010.
Bakomliggande resonemang och uppfattningar av fenomenet life education : en etnografisk studie i Uganda
The flexibility of the labour market is considered as an instrument for increasing economic growth.Therefore has the use of flexible employment, also called atypical employment, increased. The atypical employment is characterized by insecurity in comparison with a traditional permanent full- time employment. One of the most common atypical employments is the manning employment, which is insecure whether it is permanent or not. The insecurity in the industry is based on insecure income, unpredictable working hours and poor psychosocial work environment.In order to encourage a continued increase of flexibility in the labour market while the need for security for staffing employees would be satisfied was Directive 2008:104 adopted. A certain amount of security has been achieved.
En undersökning i datasäkerhet för hemanvändare - Är det nödvändigt att använda brandvägg?
The emphasize of this study is to evaluate security issues for home users
having a personal computer connected to the Internet. It focus on the usage of
advantages and disadvantages when using a firewall while connected to the
Internet.
The hypothesis is that it gives a better protection to install and use a
firewall compared not to do so, due to security flaws in the operating system.
The prediction was tested on a home user's personal computer. The testwork was
divided into two major tests, each of them performed with, respectively
without, a firewall. These major tests were divided into five smaller semi
tests. The first semitest without a firewall suffered from a virus or worm
attack resulting in loss of data and log files.
Betalningssätt via webben : En studie om konsumenters ansedda kunskap angående olika betalningssätt via webben och deras säkerhet
The e-commerce in Sweden has increased each year for the past several years, but still just over half of all the consumers feels worry about payment security. This could be the reason why over half of the consumers just shopped about one time on the Internet during the whole year of 2009. Another reason could be that the many consumers have a lack of trust to the different payment methods that are available during payment on the Internet, because they might don't possess enough knowledge regarding the payment methods and their security. If the consumers were to gain more knowledge about the payment methods and their security, it may lead to that the they would feel more comfortable when shopping online, and do it more frequently. It is this that will be investigated in this paper.The purpose of the paper is to research if consumers believed knowledge concerning the different payment methods available on the web and their security influence the consumers trust in the payment methods.
Derivativ talan och Corporate Governance. En komparativ studie ur ett rättsekonomiskt perspektiv
The world is getting smaller. Global markets, political processes and communication technology bring people together. Even though many of these processes are dynamic and constructive, they have also resulted in a need for better and more effective ways of international conflict resolution. This thesis investigates central issues connected to the concept of humanitarian interventions in relation to current and future legislation of the European Union. The overall question is whether the rapid globalization process has resulted in a change of international law towards more liberal view where authorization of the security council is not always needed? And, if there has actually been such a liberalization, how does that affect the legal possibilities for the European Union to carry out armed operations without the consent of the global community?The conclusion of the thesis is that international law has been modified mainly in two aspects: First, the concept of sovereignty is no longer seen merely as a right of the nation, but also as a responsibility.