Sökresultat:
1329 Uppsatser om Military security - Sida 9 av 89
Invasions- och insatsförsvaret : En professionsteoretisk jämförelse
This essay is on the subject of the changes that the Swedish military is undergoing. This essay will take the old ways of alignment thinking, were the military was to protect the nation against an invasion and compare it to the newer way of alignment thinking, where the military is to go abroad and do peacekeeping operations as there main objective. This comparison will be done by using Bengt Abrahamson theory about professions. He uses three parts one is specialised theoretical knowledge, another is ethics and the last is corps spirit. This theory will then be connected to four interviews.
??Auktorisation och ackreditering inom Försvarsmakten : En studie i nyttan av en standardiserad process för att hantera informationssäkerhet
???Information Technology is an essential part of the society today, not least in large ???organisations dealing with sensitive information. An example of such an organisation is the Swedish Armed Forces which indeed is in the need of ways to ensure information security in their Information Technology systems. The means which is used is an authorisation and accreditation process.All Information Technology systems go through a life cycle which includes realisation, usage, development and liquidation. In the Swedish Armed Forces the lifecycle is an authorisation process.
Den gemensamma utrikes och säkerhetspolitiken- Ett neo-funktionalistiskt perspektiv
This essay aims to explore the development of the common foreign and security policy within the European Union as well as the recent addition of the post of High representative in the field of the common foreign and security policy. This essay will attempt to achieve this trough exploring the questions; how have the aim of the European foreign policy developed, how the forms of cooperation has within this field developed and finally what impact will the recent addition of a high representative for the common foreign and security have. My aim is to answer these questions with the help of neo-functionalism.The results that came out of this essay point to the direction that the neo- functionalist premise about spill over effects and the notion about increased supranational influence turn out to have some validity in them. The study has shown that during the time the cooperation within the field of foreign and security policy have developed it is possible to see that supranational institutions will gain influence when the scope of integration within a policy area widens and deepens..
FN - i mäktiga staters tjänst En studie av hur FN påverkas av mäktiga stater
The United Nations is an important organization when it comes to international peace and security. Recent events in international politics, however, have brought about a widespread concern about the abilities of the organization. Powerful states have shosen to act outside of the organization to achieve their goals. They have furthermore a disproportionate influence on the decision-making body, the Security Council.The aim of this essay is to examine wheather UN can function productively as keeper of the international peace and security in the political climate of today, and to find out to what extent the powerful states harm the organization. I use a theoretical article, concerning states relations to international organisations, to analyse the acts of powerful states in UN.
Utvärdering av Falköpings kommuns Informations säkerhet
A student at the Technical University in Jönköping was given an assignment from Falköping municipality. The assignment was to evaluate their IT systems 'users' awareness of information security and even present suggestions for IT-Users to improve their information security within Falköping municipality.Falköping municipality consists today of seven administrations. The target groups for the study of the information security are a pilot group consisting of 30 IT Users and four different managers from various administrations within Falköping Municipality.The purpose of this work is mainly to indicate an understanding of the importance of the information security knowledge among IT Users in Falkopings municipality, mainly those who use their smartphones and tablets for work-related activities.This work aims to answer the following questions:? How wide is the awareness of information security among municipality's IT users?? How can information security improve among the municipality's IT users?Theories that work consists of are mainly what information security is, how it is handled and the threats and risks that may create problems for the municipality, basically when IT Users use their smart phones and tablets.The Work Implementation started with sending surveys to a pilot group of IT- system users and the student even interviewed four general managers working in Falköpings municipality. Both the questionnaires results and interviews results are presented in diagram and text.The result from both surveys and interviews was very positive and it shows that the municipality investigated IT-Users are very aware and have knowledge about information security, when they use their smart phones and tablets.
Teknologi & Numerär : Frågan om vem som vinner
The reason for this study is to settle the balance between technology and preponderance in war. Each theory claims its own superiority to be decisive when it comes to achieving military victories, but this study will show what actually happens when the two theories are analyzed together in the same conflict. To prove the conclusions, a case-study on Operation Gazelle is used. The study will describe the theories, what a military victory is and which party in the conflict came out victorious after this specific operation. Both sides? forces will be shown and compared.
Utvärdering av Near Field Communication och Certified Wireless USB : Säkerhet vid utveckling av applikationer
Today?s society is one where technological advances are made daily, which increases the need to stop and assess the risks against users? integrity when integrating new technology in contemporary systems all the greater. We have taken two technologies, Near Field Communication and Certified Wireless USB, whose envisioned area of use is to be integrated into mobile phones, and evaluated what security threats are revealed for the respective technologies. The threats against security have been identified through research of the standards and existing reports for each technology. Practical experiments have not been conducted on account of us not having access to any equipment to run such trials.
Bränsleceller i taktisk enhet
Inom Försvarsmakten används motordrivna generatorer för att förse många förbandsenheter med elektricitet. Dagens bullriga och vibrerande elverk är idag möjliga att ersätta med tystare bränsleceller. På köpet erhålls en bättre ergonomi för alla som arbetar i hytter som strömförsörjs av elverk. I rapporten redovisas funktionen för olika typer av bränsleceller, vilka bränslen de använder sig av och hur dessa kan transporteras. Dessutom redovisas hur två elverk används och vilka förbättringar som kan åstadkommas vid byte till bränsleceller.
En undersökning i datasäkerhet för hemanvändare : Är det nödvändigt att använda brandvägg?
The emphasize of this study is to evaluate security issues for home users having a personal computer connected to the Internet. It focus on the usage of advantages and disadvantages when using a firewall while connected to the Internet. The hypothesis is that it gives a better protection to install and use a firewall compared not to do so, due to security flaws in the operating system. The prediction was tested on a home user's personal computer. The testwork was divided into two major tests, each of them performed with, respectively without, a firewall.
Spatial TDMA in Ad Hoc Networks with Antenna Arrays
In modern military operations the requirements of transmitting large amounts of information have increased substantially during the last decade. This increases the demand for high-capacity radio networks. It is also very important that military decisions are made on recent and correct information and this implies that low and known delays are required. The existing military radio ommunications, within the Swedish army, do not meet the requirements for capacity and delay. We have investigated how the capacity and average delay can be improved in an Ad Hoc network with STDMA by using antenna arrays.
Examining Accuracy : Drönare och drönarangrepp: retorik, praktik och historia
The military conflicts of the early 21st century have seen the introduction and rise of a new military technology: the armed drone. With the United States acting as the driving force behind this technological advancement, the U.S Air Force and intelligence agency CIA have madedrones their weapon of choice for pursuing suspected terrorists and insurgents in various remotelocations. American military leaders and policy makers assert that the armed drone?s high levelof accuracy make it the best available weapons platform for this task. However, new researchshows that the use of drones may result in more civilian casualties than previously thought, andmay in fact be more fallible than conventional aircraft in this respect.
Smarta Kort : En del av en intelligent IT-lösning i hälso- och sjukvården?
Background: IT-security is included in the concept of information security, which considers all the security of handling information within an organisation. Good IT-security is about finding the right level of measurement, however, it is hard to implemement new IT-solutions in an organisation, particularly within the health care field, where sensitive information are handled daily. Lately the Swedish government, together with county- and city council, understand the importance of IT and health care. Carelink, an organisation of interest, is working actively for the presumption of benefit by using IT within the health care field. During spring 2006 the Swedish government introduced a national IT-strategy.
IT-säkerhet i små organisationer
IT- och informationssäkerhet är ett ständigt aktuellt ämnesområde. ITsäkerhetsarbetei små organisationer framstår som ett underforskat område. Föratt göra en kartläggning av hur arbete med risk, hot och säkerhet kan se ut i småorganisationer har vi genomfört en explorativ intervjustudie med representanterför små organisationer om deras arbete med IT- och informationssäkerhet. Vihar dessutom genomfört intervjuer med experter på området för att få ettbredare perspektiv. Tolkningen och analysen av intervjusvaren har utförtsgenom att först tolka svaren utifrån Security Controls och därefter analyserasvaren utifrån fem temaområden som vi funnit i materialet.
Militär identitet : En kvalitativ studie om att vara anställd soldat i Försvarsmakten
My study was conducted to provide a deeper understanding of the identity of employee soldiers in the armed forces and their experience of their role in the military context. To describe and identify the soldier's identity formation, values and norms working in group processes are taken into account. As the individual identifies her or himself whit the group, the various phenomena as hostility to other military groups arise. The individuals weld together with other group members to form strong normative relationships within the group. Through a qualitative research approach eight soldiers in a regiment in western Sweden were interviewed, four of them were group executives or deputy group leaders and others were ordinary soldiers.
Finns kvinnor i säkerhetspolitik? : En undersökning av den svenska säkerhetiseringsprocessen avseende svenskt deltagande i den militära insatsen Minusma i Mali utifrån ett feministiskt perspektiv
Scientists argue that gender affects foreign policy and security policy, that ideas of gender are inconstant and that there is a lack of feminist perspectives in International Relations. The changes seen in the global security context may have challenged the way politicians and scientists understand war and its impacts, and led to increased gender awareness.Using securitization theory and feminist international relations theory, the aim is to examine how women and men are being spoken of in the Swedish foreign policy discourse regarding participation in the UN-led stabilization mission Minusma in Mali. By applying a feminist perspective on the securitization process, the intention is to increase the knowledge of whether there is gender awareness in this context.The result shows that there is limited gender awareness. There is minor consideration for the conflict?s different implications on the situation for women and men.