Sök:

Sökresultat:

1548 Uppsatser om NetIQ Security Manager - Sida 11 av 104

Ledarskap inom ramen för ett systemutvecklingsprojekt : fokus på en arbetsprocess med stöd i Vattenfallsmodellen

Many research reports mention the fact that a huge number of all system development projects never reach a successful ending; with other words never fulfil formulated goals. By identifying and forming success factors (and in some aspect risk factors) that the project manager in practice can use, this study may be seen as a step in the direction towards minimising the high number of failed system development projects. The purpose of this research report is to investigate how a system development project, where the development process is based on a specific development or process model (in this case the Waterfall model), can and should be driven. I aim to clarify what is demanded of a project leader for the specific development process and give an account for which eventual leadership qualities that can be well suited for given situation in relation to the need for technical competence. Among other things the project manager should inspire confidence, drive, be a decision maker, engage and own some form of basic knowledge in the field of system development.

Homesupport for elderly people with psychiatric disabilities

This essay deals with the support and help offered to elderly people over 65 with mental disabilities out of personnel from a special support team. We have chosen to use the qualitative method to answer our questions. We have four semi-structured interviews with all staff from the support team we have been in contact with, three nurses/nursing assistants and project manager for the support team. We have recognized five themes and divided the text into six different categories and disciplines that answers and highlights the importance of meeting clients' needs, increase their independence and quality of life. Our theme is security, continuity, time, treatment and relations.

Kända Varumärke - Större, Starkare, Säkrare

In todays high-technological society where the Internet plays a central role in our day-to-day life, many e-retailers are not able to attract customers to complete a transaction on their website. In order to succeed, many e-commerce sites must improve several safety aspects regarding online payment, in order to be perceived as a reliable and secured retailer. The purpose of this paper is to investigate if increment in various combinations and aspects in online payment will in fact improve the customer's perception of the e-retailer and result in completed transactions. In order to investigate this aspect, an experiment was conducted to be able to compare eight independent groups, that each had been exposed to a different security scenario on the online payment website of either a known or unknown retailer. Our results clearly prove that perceived security of the retailer's payment website increases willingness to purchase from the retailer.

Folkpartiets syn på svensk säkerhets- och utrikespolitik 1956-1974 : En jämförande analys av Folkpartiets syn på svensk säkerhets- och utrikespolitiska frågor i förhållande till regeringen

The socialdemokrats? long possession of government power from the 1930?s to 1976 gave them the opportunity to put their stamp on Swedish domestic and foreign affairs in the shadow of the cold war. The government policy in security and foreign affairs, therefore, was that of the socialdemokratic party. The stance of the government has been researched, but it lacks focus on the opposition. The purpose of this paper is to analyse Folkpartiet´s view of security and foreign affairs in comparison with government policy.

Libyenkrisen ? en humanitär intervention? : En kvalitativ textanalys som syftar till att förklara motiven bakom NATO:s och FN:s beslut att intervenera Libyen

Humanitarian intervention is a concept that generates several problems in our time. The idea of humanitarian intervention concerns the modern norms of sovereignty and noninterventional principals. It also concerns the conventional norm, which declares that states are not allowed to interfere in other states? internal affairs. The use of military force to implement humanitarian intervention is restricted according to international law.

Att färdas i symbios : ett gång -och cykelstråk anpassat efter trafikanternas rörelsemönster och behov

The aim of this paper is to examine the layout of public spaces and its effect on human behavior with focus on the relation between pedestrians and cyclists movement patterns in a specific path. The study emanates from the security aspect of pedestrians and cyclists, and builds upon previous theories and empirical studies about perception, security, information design, environmental psychology and behavior. The result shows that individual behavior and movement pattern differs with age, purpose, physical- and other conditions, and layout of the surroundings. A design proposal for improved layout of a path and a node between different oncoming paths has been developed to aid the users? needs, where a separation of walkways and bike lanes forms zones of security for the purpose of better orientation and a better flow between the users..

Bluetooth and security

Detta arbete behandlar hur Bluetooth fungerar samt säkerheten kring Bluetooth och några allmänt tillgängliga attack verktyg. Syftet med uppsatsen är att försöka fastställa hur säkert Bluetooth är i dagens läge. Bluetooth har länge varit tillgängligt för att utbyta data över korta avstånd. Därför har man valt att implementera det i kommunikationsenheter som mobiltelefoner och laptops med mera. Det har funnits en debatt om hur säkert Bluetooth är. För att kunna genomföra denna undersökning så har vi satt oss in i hur Bluetooth fungerar, vilka allmänt tillgängliga attacker och implementationer av dessa, som finns.

Säkerhet och integritet i närfältskommunikation

Context. In today?s society we use smart cards in many areas, NFC is a smart card technology that allows contactless interaction between a reader and the tag, the tag is often in the form of a card. NFC can be used for various payment methods or as access card to a building which makes life easier. In previous studies, the technique has proven to be weak to attacks using an NFC reader connected to a computer.

Säkerhetshot och lösningar för privatpersoner med bredband

As more and more people gain access to broadband in their properties, the security threats get bigger. A lot more people also have computers that they carry home from work where they store important information concerning the company. The information stored on theese computers can be very easy to retrieve if you have the will and the skill to do it. Very few people have any knowledge how to protect themselves from theese threats..

Lärarstudenters lektionsplaneringar i svenska. : En diskursanalys om lärarstudenters didaktiska val.

This study is based on interviews with four managers in public elderly care and four managers in private elderly care. The aim of this paper is to examine how these managers are experiencing their leadership in relation to conflict management, and if the managers leadership differs depending on private or public elderly care. Leadership and conflict management are theories that have been used in order to analyze the empirical findings. Previous research that has been used in the study concerns ?leadership/leadership styles?, ?conflict management?, ?to be active in the private/public elderly care?.

Rysslands politiska utveckling : En fallstudie över svensk säkerhetspolitik

The Swedish security policy has changed from stressing neutrality to embrace co-operation within the EU and other organisations. New threats like terrorism, boarder-crossing criminality and natural disasters require new ways to deal with this type of problems to protect the society. Since the beginning of 21st century the high Russian economic growth has made it possible for the country to play an increasingly role as a superpower on the international political stage. In the same time the democratic development has been replaced by an autocratic rule which has obstructed the Russian- European relations. From a Swedish security policy view the Russian political development is of importance and the picture of Russian as a threat has changed from 1996 to 2008/09.

Hur används vetenskap och forskning i den politiska debatten? : Idéanalys av debatten kring försäkringsmedicinskt beslutsstöd

How is research and science being used in political debate? An idea analysis of the debate about försäkringsmedicinskt beslutsstöd (decision tool in healthcare security)This is a case study on different types of research use (utilization) The aim of this paper is to examine how the politicians make use of expertise and research in the parliamentary debate surrounding the decision tool in healthcare security (försäkringsmedicinskt beslutsstöd). The aim is also to find out to what extent different types of research use are present in this debate. In this case study the qualitative method of idea analysis is being used on the empirical material. The tool of analysis is based upon the theories of research use by Amara et al.

Dominerande affärsmodeller inom området informationssäkerhet

Computers together with Internet have been growing enormously, during the last decade and the area of information technology has been growing in the same speed. As long as the surrounding environment evolves, the business models must within the IT-area, keep the same pace. So, how do business corporations handle this change to attract customers? How do the dominant business models look like? In many cases, they are apparently much the same. But what differences can we see and what areas can be improved? We have showed that the IT area isn?t just one, it consist of several segments.

Ett anpassat ledningssystem för informationssäkerhet : - Hur gör en liten organisation med hög personalomsättning?

This paper aims to find out how to implement an information security management (ISMS) system that is based on ISO/IEC 27001-standard into a small organization with high employee turnover. The standard employs the PDCA-method as a course of action for implementing the standard. The reason for implementing such a system is to introduce information security to the organization and to maintain it despite the changes in management. The paper based it?s survey on a case study of a student nation in Uppsala, Sweden.

Ledarskap inom ramen för ett systemutvecklingsprojekt - fokus på en arbetsprocess med stöd i Vattenfallsmodellen

Many research reports mention the fact that a huge number of all system development projects never reach a successful ending; with other words never fulfil formulated goals. By identifying and forming success factors (and in some aspect risk factors) that the project manager in practice can use, this study may be seen as a step in the direction towards minimising the high number of failed system development projects. The purpose of this research report is to investigate how a system development project, where the development process is based on a specific development or process model (in this case the Waterfall model), can and should be driven. I aim to clarify what is demanded of a project leader for the specific development process and give an account for which eventual leadership qualities that can be well suited for given situation in relation to the need for technical competence. Among other things the project manager should inspire confidence, drive, be a decision maker, engage and own some form of basic knowledge in the field of system development.

<- Föregående sida 11 Nästa sida ->