Sök:

Sökresultat:

1329 Uppsatser om Military security - Sida 20 av 89

Fredsengagemang i en os?ker tid: En studie av hur svenska fredsaktivister navigerat sitt fredsengagemang sedan Rysslands fullskaliga invasion av Ukraina

This case study examines how individuals involved in the Swedish peace movement have navigated their peace activism due to the intensified security debate which followed Russia?s full-scale invasion of Ukraine in February 2022. By conducting semi-structured interviews with peace activists involved in the Swedish peace organization Svenska freds- och Skiljedomsf?reningen, the study aims to provide insight into how peace activists, and the peace movement as a whole, can be affected when the security debate intensifies. By applying a theoretical framework consisting of Political Process Theory (PPT) and Discursive Opportunity Structure (DOS), as well as previous studies and literature on social movement organizations and peace movements, the study?s objective is also to apply context to the observations made by the peace activists in the study.

"Att föräldrarna får vara sig själva är den stora vinsten" : en studie med betoning på den kortare inskolningsmodellen i förskolan

I have examined acclimatization models in pre-school. My emphasis is on the shorter acclimatization models. To begin pre-school is a big change, not only for small children, for the whole family as well. It is important to get a good acclimatization in pre-school, and one of the things it takes to achieve that is to interact with the parents. The reason why I chose this subject was because we have not studied much literature about this subject during our education to become pre-school teachers.

Riktlinjer för implementering av ISO 17799

An ongoing concern within the Intellectual Technological world is the issue of security. There are severe consequences if someone without permission searches a computer for secret information that was left unlocked. In order to prevent this situation from occurring, rules about password lengths or employees bringing personal flash drives into the company should be created and followed.As Internet become a worldwide phenomenon, the use of information technology is growing more than ever. With more use and accessibility to Internet, new threats against companies have also emerged. This report brings up the main issues that a company needs to regulate today.The standard for regulations and proposals for IT-security comes in a document called ISO 17799 and very complicated for those who are not experts in the field.

Tryggare kan ingen vara? En studie om den danska flexicurity-modellens lämplighet för Sverige

This paper discuss the possibilities to transfer the Danish labour market policy, called flexicurity, to Sweden. There are two main purposes of this essay. The first purpose is to discuss the reasons why the Danish labour market policy could be interesting for Sweden. The second purpose is to investigate which obstacles that might occur during the transfer. For guidance I have used two startingpoints which highlights the Danish flexicurity's pros and cons.

HAVECA-modellen - En metod för att fortlöpande säkra ett internt nätverk mot tredjepart

This thesis will address a problem concerning availability of information systems at an enterprise within the financial sector and its external suppliers, so called trusted third party. The information system resides on the internal network of the enterprise and must be available to both employees of the enterprise and the trusted third party simultaneously. This contradicts the company policy which disallows third parties access to the internal network. The HAVECA-model introduced in this thesis provides a framework of methods, each solving a sub problem identified in the model. The identified methods are hardening, verification, control and assurance, together supplying a method for continuously securing the internal network against a trusted third party.

Stadsdelsförnyelse i Norra Björksätra, Sandviken

The housing estates in the outskirts of Sandviken, consist of relatively large scale apartment buildings. This report, that is a B.A. thesis at 10 Swedish university points, aims to investigate and describe the opportunities to improve safety and security for inhabitants in Norra Björksätra. The purpose with this report is to make Norra Björksätra to a more attractive place to live in, by changing the negative trends in the area. Since demolition of at least some of the houses could be of current interest in some years; the purpose is also to investigate whether demolition or renewal of the area is the best solution.

Vidareutveckling och utvärdering av operatörsplatser på svenska stridsfartyg

The ability to handle potentially dangerous and hostile situations on a military vesselrequires that the equipment works effectively with the personnel that use it. It is importantthat this equipment can be used by different people. An operator on a military vesselshall be able to handle information about hostile threats, navigation and the steering ofunmanned vehicles. A operator console should therefore be constructed in such a waythat the operator can handle a large flow of information. And the information given bythe technical system should be displayed correctly to facilitate the operators ability tohandle and interpret the information correctly, in order for the operator to make thecorrect decision at any given moment.

Dolt i det öppna

Communication is a part of everyday life. The more sensitive information we handle, the more interesting the question around security of your information becomes. There are two ways of handling security around the information you want to communicate, either you control the means by which you are communicating. Or you control the way you communicate, making you able to use existing communication channels. Existing methods within cryptography enables two parties to communicate information securely.

En studie av zero knowledge-identifikationsprotokoll för smarta kort

Zero knowledge protocols is a lesser known type of protocol that can be used for identification. These protocols are especially designed not to reveal any information during an identification process that can be misused later on, neither by the one who should be convinced of the identity of the user, nor by anyone else that is eavesdropping. Many of these protocols are also especially designed for implementation in smart cards. The more common type of card with a magnetic stripe has during the last few years become more susceptible to attacks since they are easily copied. Smart cards combined with a secure identification protocol has been predicted to be the solution to this problem.

Samverkan 4 U : En studie om samverkan med organisationen Here 4 U

The present study sought to examine the collaborative role of the student organization Here 4 U and the impact of this collaboration on the organization and its partners. As a point of departure a questionnaire was distributed to supervisors, principals and other cooperation partners of Here 4 U, the most prominent quantitative results of which were related to previous research, new institutional theory and empowerment theory. It turned out that partners interacting with Here 4 U felt that the collaboration was necessary and wanted to continue with it. The respondents to the questionnaire were asked to define the concept of collaboration. Factors emphasized by respondents included feeling of community, security, and common goals.

Ledningens skådespel: Hur tolkar aktieanalytiker bolagsledningars framföranden?

There has been an increase in the importance and amount of information concerning publicly traded stocks in recent years. When analyzing and valuing stocks finding new ways of collecting information has therefore increased in importance. This thesis aims to explore how meetings with management can impact the stock valuation done by the security analysts. Furthermore the case study examines what kind of information analysts can receive by interpreting management at these meetings. This case study of ten Swedish security analysts show that the analyst?s stock valuation is directly or indirectly affected by the meetings.

Small scale pig production in Takeo province ina rural area of Cambodia

Cambodia, in Southeast Asia, has tropical monsoonal climate with distinct dry and rain seasons. Many people are poor and live in rural areas. Farmers mainly culture rice, and raise pigs, cattle and poultry as well. During two months, a minor field study was performed in Cambodia. The main purpose was to evaluate the impact of contributions done by projects that started in 2005 and were managed by the local organization CelAgrid.

Logistisk kulmination - en eller två sidor av myntet? : En betraktelse utifrån ett annorlunda perspektiv

Logistic Culmination ? One or Two Sides of the Coin?An Observation From a Different Point of View Logistic culmination can be compared to a stretched rubber band. If combat units moves in direction away from the supplies the rubber band will gradually stretch. The rubber band will eventually burst and at that point the logistic culmination will be a fact. But if the rubber band was to be let go before bursting, it will instead be contracted.

Requirement Specification for Information Security to Health Systems, Case Study : IMIS

During 2001-2002 a prototype, IMIS (Integrated Mobile Information System) was developed at BTH (Blekinge University of Technology) to demonstrate how mobile IT-systems can be used in healthcare. The prototype was based on the activity theory of Engeström. An ongoing project started in spring 2003. The purpose of the project is further development of IMIS with special focus in the diabetes healthcare. Participants in the project are scientists and students at BTH, ALMI Företagspartner, Blekinge FoU-enhet, Barndiabetesförbundet Blekinge, Blekinge Diabetesförening, Vårdcentralen Ronneby and Vårdcentralen Sölvesborg.

Säkerhetsmedvetenhet vid daglig IT-interaktion hos hemanvändare

Dagligen interagerar människor med IT-system och internetanvändning har blivit en viktig del i många människors liv. Med fler användare än någonsin hanteras ofantliga mängder information och samhället ställer allt högre krav på IT-säkerhet. När det gäller att skydda sin integritet, tillgänglighet och sekretess vid internetanvändning fokuseras det ofta på tekniska åtgärder, såsom brandvägg och antivirusprogram. De tekniska åtgärderna skyddar användaren till viss del, men det räcker inte för att förhindra ett bekvämt och naivt mänskligt beteende. När säkerheten brister beror det oftast på den mänskliga faktorn.

<- Föregående sida 20 Nästa sida ->