Sök:

Sökresultat:

1329 Uppsatser om Military security - Sida 10 av 89

Om stenar kunde spela. Framst?llningen av musiker och ljudlandskap p? Trajanuskolonnen

This thesis aims to explore the representations of musicians and soundscapes on the column of Trajan in Rome. While many different parts of the column have been explored thoroughly, the musicians are not such a part. As such, this thesis aims to explore this gap in research as well as explore how the soundscapes have been represented on the column. By sorting and grouping scenes with musicians into different groups, this thesis has been able to find patterns of representation such as musicians being represented in religious scenes more often than in military scenes and the fact that there seem to be some compositional overlap between the different groups in how the musicians are represented. Grounding the thesis in a theoretical approach that uses the presumed audience and their experiences as a guide for how to represent different scenes, it is argued that part of the reason for musicians being more present in religious scenes than in military ones is because the roman audience were more aware of the actual religious soundscapes.

NBF- Förmågan att se på andra sidan kullen eller ?Kejsarens nya kläder"

So- called ?Network Based Defense? (NBD) was introduced in Sweden in connection with the transformation of the Swedish Armed Forces in 1999. NBD is based on the U.S. variant Network Centric Warfare (NCW), which in turn is derived from research on the concept of Revolution in Military Affairs (RMA). In Sweden the concept was introduced and included not only the Armed Forces but was intended to also support the Swedish civilian agencies in order to create networks and hence share the available information and thus more effective crisis management and to provide more "bang for the buck." In developing the concept of NBD the Swedish Armed Forces used both economic and human resources, in the form of research, new technologies, new organization and new methods.Between year 2004 and 2006 the Armed Forces once again entered the process of reorganization.

Människan och lärarprofessionen : En livsberättelse

The aim of this essay is to get a deeper understanding of a teachers' profession and to get knowledge of how earlier experiences can influence you as a teacher. I have interviewed a female teacher, Pia to get this understanding. As a tool to get the teacher's whole story I used the life story method. In her profession she is influenced by her own importance of security as a child.Her own needs of security has given her an deeper understanding for pupils like herself during the childhood; insecure and afraid. Her understanding for all kinds of behavior among the children has increased by her own experiences.The story shows that Pia is frustrated by the fact that she can't control her own working time.

Ingen Lag - Straff? Straffansvar och befogenheter för svensk militär personal i internationella insatser ur ett rättstillämparperspektiv.

INGEN LAG ? STRAFF? ABSTRACTThe thesis deals with a gap in the Swedish legislation concerning the criminal responsibility under which military personnel act in international peace operations. According to international treaties called Status of Forces Agreements, military personnel operating abroad within the territory of other states are exempted from the criminal law of the host states. In return, their home states apply its national criminal law upon the personnel instead. Thus, Swedish criminal law is applied in relation to actions taken by Swedish military forces in international operations.

Koncern som tillväxtinkubator för småföretag : ? En fallstudie i ett shared service centers möjligheter attstödja entreprenöriella småföretag

???Information Technology is an essential part of the society today, not least in large ???organisations dealing with sensitive information. An example of such an organisation is the Swedish Armed Forces which indeed is in the need of ways to ensure information security in their Information Technology systems. The means which is used is an authorisation and accreditation process.All Information Technology systems go through a life cycle which includes realisation, usage, development and liquidation. In the Swedish Armed Forces the lifecycle is an authorisation process.

Veto: En motivanalys av FN:s säkerhetsråds fem permanenta medlemmars agerande i konflikten i Syrien.

Aim: The aim of this study is to analyse the possible motives behind the actions of the five permanent members of the UN Security Council in relation to the conflict in Syria. The background of this aim is the Arab Spring and the protests and violence that have followed the uprising. While, in Libya, the UN Security Council adopted resolutions that allowed sanctions against the Libyan government, no such resolutions have been adopted yet in Syria.Theory: The principal theory of the analysis is Stephen D. Krasner´s theory on sovereignty.Method: I have researched various resolutions and statements done in the Security Council, together with official statements from the actors, through Hadenius´ motive analysis methodology and Gilje & Grimen and Ödmans theories on hermeneutics.Conclusion: The conclusion of the analysis is that there, in the case of Syria and Libya, are two different parties in the Security Council. One that stands for sovereignty and one that stands for intervention.

Ethernet-baserat interkommunikationssystem för militära fordonssystem

The result of this master thesis report describes the advantages and the drawbacks that will arise when implementing an Ethernet based intercommunication system in military vehicles. The report presents a possible solution and describes how different sound applications will be implemented into the suggested solution. The report show that IP LAN in vehicles leads to more advantages than drawbacks. The main advantages are that all kind of media can share the same LAN and that there is a lot of knowledge of this technique in the civil area. The main drawback is about delay.

Utvärdering av Near Field Communication och Certified Wireless USB: Säkerhet vid utveckling av applikationer

Today?s society is one where technological advances are made daily, which increases the need to stop and assess the risks against users? integrity when integrating new technology in contemporary systems all the greater. We have taken two technologies, Near Field Communication and Certified Wireless USB, whose envisioned area of use is to be integrated into mobile phones, and evaluated what security threats are revealed for the respective technologies. The threats against security have been identified through research of the standards and existing reports for each technology. Practical experiments have not been conducted on account of us not having access to any equipment to run such trials.

ISIT-modellen : Vägledning för att realisera en verksamhets informationssäkerhetsmål

The ISO standard ISO/IEC 17799/SS-627799-2 is a guidance for organizations to realize their information security goals. In spite of this standard, studies show flaws regarding information security in organizations. In particular flaws regarding overall view, knowledge and clear roles and responsibilities have been observed. The ISIT (Information Security Integrated Three level) model and its guidelines, developed in this thesis, help organizations to identify the required processes and procedures as well as the logical process flow. The thesis is based on theoretical studies and a case study within a multinational company.

"Folk kommer att dö" : Framtida krigsveteraner och hur samhället ska kunna möta deras behov

The aim of our study is to research what the future help-needs and expectations on the civilian society are among Swedish soldiers before they are sent on their first deployment abroad, especially to Afghanistan. The fact that Sweden sends soldiers to a warzone is something that is new nd research according the help-needs from the returning soldiers are missing.This study is based on a qualitative method where the data consists of four focus group interviews with at least two participants in each focus group from three different military bases in Sweden. The results indicate that the soldiers´expectations on the civilian society are low but that they would like to have more support from the civilian society. An important notice during the study, we encountered the fact that the participants in some way feel stigmatized. The results also show that they want the Swedish armed forces to be in charge and provide the care for the soldiers where health professionals involved have som military background.

Snabb och säker roaming i WLAN

This thesis investigates how Ericsson AB should do to achieve fast and secure handover when roaming in a WLAN. It also provides a security analysis of the system that the wireless access point is part of. The reason for this is that Ericsson is selling an access point called the ABS 2200 aimed at the public hotspot market. The premise was that they wanted a standardized way of handling the roaming issue. At the outset the 802.11F standard looked like a good alternative (in fact the only standardized alternative).

Förväntningar på Framtida Mobila Tjänster

Today?s society is very focused around technology and something that is very popular is the usage of mobile devices such as Smartphones or Tablet computers. One of the reasons why these devices are so popular, is because of the large amounts of services or ?apps? that they can provide for the user. They can do a lot of things that makes everyday living easier for the users.The focus of this study is to find out what kinds of mobile services the users of these devices are expecting and/or wishes to see in the future and what is required to be able to develop and use these services in a good way.We started of the study by searching for earlier studies on the same or similar subjects.

Staters förhållningssätt till Human Security i teori och praktik : En jämförande fallstudie om kriterierna för verkställighetshinder till Syrien hos Sveriges och Norges migrationsverk

Den här uppsatsen handlar om staters förhållningssätt till human security i teori och praktik. Syftet med uppsatsen har varit att undersöka om den kanadensiska definitionen av human security används som referensobjekt i policydokument från Norges och Sveriges nuvarande regeringar samt hos ländernas kriterier för verkställighetshinder av syriska medborgare. Uppsatsens metod är en jämförande fallstudie där verkställighetshinder och utvalda policydokument utgör analysenheterna. För att analysera dokument och ställningstaganden används kvalitativ textanalys.Fallstudien visar att båda länderna ser sig själva som föregångsländer inom human security, bland annat genom skapandet av strategier och handlingsplaner. Vidare visar studien att migrationsverken har olika tillvägagångsätt för verkställighetshinder till Syrien.

Konflikten Om Arktis

The Arctic region has not been a topic of discussion or a reason for a conflict in the past, but with the development of environmental issues which has resulted in melting of the ice, so has the interest for the region developed. This has resulted in a conflict over the area, with five countries as main actors. This paper investigates the five main actors? goals with increased influence in the area, using the thoughts of Rational Actor Model, with states as utility-maximizing actors and foreign policy as the expression of national interest. Furthermore the paper investigates the means of getting to the goal, what kind of tools they use.The paper shows that all of the countries are interested in the economically benefits that are buried under the melting ice and the short cuts in sea routes that will be a possibility to use ones the ice melt more.

ISIT-modellen - Vägledning för att realisera en verksamhets informationssäkerhetsmål

The ISO standard ISO/IEC 17799/SS-627799-2 is a guidance for organizations to realize their information security goals. In spite of this standard, studies show flaws regarding information security in organizations. In particular flaws regarding overall view, knowledge and clear roles and responsibilities have been observed. The ISIT (Information Security Integrated Three level) model and its guidelines, developed in this thesis, help organizations to identify the required processes and procedures as well as the logical process flow. The thesis is based on theoretical studies and a case study within a multinational company.

<- Föregående sida 10 Nästa sida ->