Sök:

Sökresultat:

1052 Uppsatser om Maritime security - Sida 7 av 71

Trygghet och säkerhet i offentlig stadsmiljö :

To thoroughly think with safety and security in mind is an important issue in planning of public city spaces. Spaces intended to be available to all inhabitants of a city should have a welcoming appearance. Unfortu-nately, this is not the situation in many pedestrian walkways, parks and such spaces, possibly due to lack in safety and security. This master thesis intend to examine questions at this issue ? what makes you feel safe and what causes insecurity in public city spaces. The safety aspect treats the human psychological and sociological ways of perceiving her milieu and other humans in it, and how the physical shape of her surroundings can affect the sense of safety.

Vad förvaltningen bör sträva efter : -riksdagspartiernas uppfattningar om de värden som förknippas med förvaltningen

The values politicians relate with public administration are likely to affect the way that they want the public administration to be organised. The purpose of this study is therefore to examine which values Swedish parliamentary parties relate with public administration and more particularly how they emphasise these values.The study is conducted as an analysis of theoretically relevant bills that the government party and the parliamentary parties have introduced to the Riksdag, and reports and statements of opinion from the parliamentary committees. The documents are from the Riksdag´s sessions from 2000/01 to 2005/06. After examining the documents the conclusion can be drawn that the value that is most emphasised during the period is legal security. This might mean that legal security will have more influence on the decisions taken about the organisation of Swedish public administration..

Parallel Registration of Ships

In present there is no Swedish legislation regulating bareboat registration of Swedish ships. Despite this absence however shipowners with vessels already registered in the Swedish Vessel Register do not hesitate to take advantage of the positive aspects of bareboat registration and thereby allowing the registration of their ships in another State as well. The fact that there is a lack of legislation in this area has left a legal loophole resulting in Swedish ships being registered in a second State without any regulation providing options or protection for the different parties involved. With this as a background, the main objective of this thesis is to analyze parallel registration of ships, its consequences and the future of dual registration in Sweden. To fulfil this objective another aim is to impart a collected legal and economical presentation of the problems that may occur when a bareboat chartered vessel is registered in two different States simultaneously.

Den levande policyn

In today's changing environment, an increasing number of companies are realizing thebenefits of analyzing business information and thereby stay competitive. By making use ofdecision support systems, known as Business Intelligence (BI), organizations are expected tocollect and process business data and thus get more out of their business.Nowadays it is not enough for organizations to have access to corporate data inside officewalls, they must also be able to bring the information "on the go", which has been thefoundation for the progress of mobile BI solutions. As the mobility increases and thecorporate data leaves the office, new risks arise, which is one reason as to why manycompanies hesitate at the idea of introducing mobile BI solutions.In this paper we explore two security aspects in the area of mobile BI solutions. Our researchquestion is as follows: How does security aspects affect a company's decision to acquiremobile BI solutions? The survey was conducted through interviews in cooperation with thefirm Optivasys, exclusively dedicated to the BI solution QlikView.A significant part of the theory we studied describes security as critical; however, ourresearch suggests a solution on how companies can manage the security aspects.

Risks Related to the Maritime Transportation of Oil and Gas (mainly Crude oil, LPG, and LNG) -A Conceptual Study and Empirical Outlook on the Baltic Sea and UK Territorial Waters to Mitigate Risks

Transportation of oil and gas by the Sea characterizes challenges from a safety viewpoint. In this type of transportation, different sizes of special tankers carrying oil and gas. The marine transportation of these scarce natural riches is involved with risks and hazards, which may lead to many losses; for instance, wasting oil and gas, injuries of people, damaging ships and properties, and damaging environment. The main purpose of this thesis is to evaluate the risks, hazards, and accidents during transportation of oil and gas (mainly Crude Oil, liquefied petroleum gas, and Liquefied natural gas) by the Sea with concentrating on transport safety. Hence, a better understanding of these risks and hazards can contribute to decrease of addressed losses.This study is carried out on risks associated with maritime transportation of oil and gas starting with describing the general casual chain (dealing with causes, incidents, accidents and consequences/causalities), continuing with describing risk analysis techniques (including event tree analysis and fault tree analysis) and risk control measures/options, and finally implementing aforesaid investigations on real data from two areas; namely UK territorial waters and the Baltic Sea.In this study, the results of analyzing data from 1991 to 2010 in UK territorial waters revealed that collision and grounding were two most common accidents in terms of crude oil tankers, LPG and LNG carriers in which 44% of all accidents were equally divided between collision and grounding.

Utrikespolitiskt beslutsfattande : En studie om hur en militär intervention kunde godkännas av FN

This study in political science examines the UN adopted resolution 1970 (2011) andresolution 1973 (2011) on the basis of foreign policy decision-making. The study aims toexplain how the UN principle of Responsibility to Protect came to be legitimized for the firsttime by the UN Security Council in the Libya conflict in 2011. By a poliheuristic perspectivethe study attempt to explain Russia and China?s acting in the voting of resolution 1970 andresolution 1973. The background to the conflict in Libya 2011 is presented in the study aswell as the Security Council?s actions during the conflict, from the beginning of the conflictuntil the adoption of resolution 1973.

peer2peer - hur dyrt är gratis?

Detta arbete behandlar de tilläggsprogram som, på senaste tid, börjat spridas med bland annat peer2peerverktyg. Dessa tilläggsprogram, som brukar benämnas spyware alternativt adware, misstänks för att samla in personlig information, så som e-mailadresser och lösenord. Det föreligger en risk att informationen sedan säljs vidare eller används för att exempelvis rikta reklam....

Den europeiska arresteringsordern : ett rättssäkert förfarande?

The European union started as an area of economic cooperation, but has developed into an area of cooperation in many legal fields. There are these days even cooperation when it comes to dealing with criminals. There is a new procedure called the European arrest warrant which goal is to make the extradition of criminals between the different member states in the European union more efficient. Sometimes when a state receives a European arrest warrant they have to extradite the person in question without doing any investigation of their own. The procedure is based on the principle of mutual recognition.

Bristfällig säkerhet inom trådlösa routrar med fokus på WPS

I denna rapport undersöks WPS-funktionen då det uppmärksammats säkerhetshåli den. Intervjuer, tester och observationer har gjorts för att undersöka problemenmed WPS. De tester och intervjuver som gjorts indikerar att säkerhetsbristen i WPS-funktionen har säkrats upp med extra funktioner..

En jämförelse av krypteringsalgoritmer

Today the Internet is used more and more as a transportation for information. Much of the information is confidential and should not be read by those not privileged. To protect the information from unauthorized access cryptography can be applied. The cryptography algorithms in use today all have their pros and cons. They are therefore suited for different applications.

Säkerhetshot och lösningar för privatpersoner med bredband

As more and more people gain access to broadband in their properties, the security threats get bigger. A lot more people also have computers that they carry home from work where they store important information concerning the company. The information stored on theese computers can be very easy to retrieve if you have the will and the skill to do it. Very few people have any knowledge how to protect themselves from theese threats..

Förbud mot dubbelregistrering av fartyg

In a recently published official Report from the Swedish Government (SOU 2010:73) a leg- islative proposal has been introduced. Its main purpose is to prevent parallel registrations of ships that are bareboat chartered to other countries. The legislative proposal claims that by preventing parallel registration of ships the Swedish Maritime Code will better corre- spond with the UN convention on the law of the sea.The UN convention on the law of the sea clearly states that ships are forbidden to fly two flags. There is however no restriction concerning parallel registration, simultaneously, in two registers. A ship that is bareboat chartered out from Sweden does not fulfil criteria re- quired in order to be deregistered, according to the Swedish maritime code.

Privilegierad mobilitet? : Flygplatser, resande och säkerhet

Never before have so many moved so frequently as now. Mobility lies at the centre for the concern ofstates, business and technological development. Some even claim that we are witnessing a mobility turn inthe social sciences. However, as the capacity to move has increased so too has the control and surveillanceof mobility become more extensive. Since September 11, 2001 security has been the defining paradigm fora variety for actors.

En jämförelse av krypteringsalgoritmer

Today the Internet is used more and more as a transportation for information. Much of the information is confidential and should not be read by those not privileged. To protect the information from unauthorized access cryptography can be applied. The cryptography algorithms in use today all have their pros and cons. They are therefore suited for different applications.

Säkerhet i öppna WiFi-nätverk. En studie om hur användares medvetenhet om säkerhetsrisker vid interaktion med öppna WiFi-nätverk kan ökas

Public WiFi networks is one of the dominant technologies for users to get public internet access. The problem is that the networks are designed for accessability rather than security ? a problem users seldom are aware of. Users who carelessly access WiFi networks may reveal sensitive information which, among other things, can lead to an identity theft. Previous research suggests that users must be educated and informed about the risks they incur, but not how this should be done.

<- Föregående sida 7 Nästa sida ->