Sökresultat:
1548 Uppsatser om NetIQ Security Manager - Sida 7 av 104
En butikschef, en butik- Kundlojaliteten blir unik! En studie om butikschefers egenskaper och dess påverkan på kundlojaliteten till butik
For a company to survive it has to make a profit. To make a profit transactions are necessary and to achieve this a company can choose to focus on creating loyal customers. Loyal customers can contribute to secured revenues, increased market shares and reduced marketing costs. Research within customer loyalty has mainly focused on different types of loyalty and the impact it has on customers behavior. However, there is a lack of research concerning which factors that create loyal customers.
Utvärdering av Near Field Communication och Certified Wireless USB : Säkerhet vid utveckling av applikationer
Today?s society is one where technological advances are made daily, which increases the need to stop and assess the risks against users? integrity when integrating new technology in contemporary systems all the greater. We have taken two technologies, Near Field Communication and Certified Wireless USB, whose envisioned area of use is to be integrated into mobile phones, and evaluated what security threats are revealed for the respective technologies. The threats against security have been identified through research of the standards and existing reports for each technology. Practical experiments have not been conducted on account of us not having access to any equipment to run such trials.
En undersökning i datasäkerhet för hemanvändare : Är det nödvändigt att använda brandvägg?
The emphasize of this study is to evaluate security issues for home users having a personal computer connected to the Internet. It focus on the usage of advantages and disadvantages when using a firewall while connected to the Internet. The hypothesis is that it gives a better protection to install and use a firewall compared not to do so, due to security flaws in the operating system. The prediction was tested on a home user's personal computer. The testwork was divided into two major tests, each of them performed with, respectively without, a firewall.
Etablering av köpcentra i Värmland : - med exemplet Töcksfors Shopping center
AbstractDuring the year 2005, a more and newer models of trade as shopping malls has been established in Värmland. Trough media (Wermlands the newspaper, Tvärsnytt) we have been able to follow the development of trade establishments as happened in the county, for example the establishment of Olav Thons Shopping center in Töcksfors. The aim and issues as then arisen in this study is part's why economic activities as shopping center increases precisely in Värmland, part's factors that governs the premise ice ring of a shopping center, were Töcksfors shopping center is functioned as an example, part's if shopping centers is a part of Värmland's new tourist activity? Through depth interviews with the region manager Urban Svanberg on Swedish business communities, the centre manager Helene Rödseth on Töcksfors shopping centre and the county tourist manager Monica Karlsson on Värmland's tourist council, some cultural geographic premise ice teories has been showed. For example this study has shown that trade in Värmland has been given birth to new trades in the county..
Somaliska pirater - ett mycket litet problem: En undersökning av Sveriges arbete gällande frågan om somaliska pirater under 2009-2010.
During 2009-2010 Sweden participated in an international military operation whose intention, according to the Swedish news media, was to fight Somali pirates. The purpose of this thesis is to study various decisions and documents behind the Swedish efforts, both military and foreign aid, regarding the matter of Somali pirates during the years 2009-2010 and analyze the results using an interpretation of the security-development-nexus-theory. The method used is text analysis based on the hermeneutic idea of understanding and interpretation.The thesis studies the international resolutions and national decisions that lead to the military operations in the Gulf of Aden and also the international strategies and national approaches regarding Sweden's assistance in the development of Somalia. The theoretical section contains an interpretation of the vast security-development-nexus-theory. The concepts of security and development are first presented separately and then collectively in terms of military security, societal security, economic security, regime security and human security.
En uppsats om hur golfklubbar kan anpassa sig till den individuella golfaren
Since 2005, the number of golf members in Swedish golf clubs has declined. This is a major problem for many golf clubs since it can lead to over establishment of golf courses. This essay is about how golf clubs in North West Skåne, the second golf densest area in the world, work to maintain their members. The sample consists of eight golf clubs which have been geographic delimited by a 30 km radius out of Helsingborg. The research is based on qualitative interviews with the manager of each golf club.
Smarta Kort : En del av en intelligent IT-lösning i hälso- och sjukvården?
Background: IT-security is included in the concept of information security, which considers all the security of handling information within an organisation. Good IT-security is about finding the right level of measurement, however, it is hard to implemement new IT-solutions in an organisation, particularly within the health care field, where sensitive information are handled daily. Lately the Swedish government, together with county- and city council, understand the importance of IT and health care. Carelink, an organisation of interest, is working actively for the presumption of benefit by using IT within the health care field. During spring 2006 the Swedish government introduced a national IT-strategy.
BIM - Förvaltarens Framtid
For nearly twenty years people have been talking about Product models, but given that the building industry is so conservative, it is hard to implement new working methods. Product models are these days known as Building Information Modeling, BIM. People often say they work with BIM but they often forget the most important part, the information. A 3D model should be linked with characteristics and information. Information that can be invaluable for the facility manager.We have a vision that in the best of worlds the facility manager would be able to "walk" into the model and see what kind of installations are inside the wall or in the roof.
IT-säkerhet i små organisationer
IT- och informationssäkerhet är ett ständigt aktuellt ämnesområde. ITsäkerhetsarbetei små organisationer framstår som ett underforskat område. Föratt göra en kartläggning av hur arbete med risk, hot och säkerhet kan se ut i småorganisationer har vi genomfört en explorativ intervjustudie med representanterför små organisationer om deras arbete med IT- och informationssäkerhet. Vihar dessutom genomfört intervjuer med experter på området för att få ettbredare perspektiv. Tolkningen och analysen av intervjusvaren har utförtsgenom att först tolka svaren utifrån Security Controls och därefter analyserasvaren utifrån fem temaområden som vi funnit i materialet.
Ledarskap och ideologisk implementering
Abstract: A public service sector in constant reformation is a common phenomenon in Sweden. This also includes the municipal care organisations. A central role in those reformations has the public middle chief who often is the one to implemented reforms to the organiza-tion's staff.This study is examining the role of the public middle manager in care organisations dur-ing the implementation of common ideologies value foundation in a present organisa-tion's reform. The study tries to elucidate in which way the public middle managers in municipal care organisations experience their roles, which expectations the management of the organisation has on their roles and how a present organisation changes inflict on the contents of the role. If the middle manager in a municipal care organisation feels like normative for the personal group is another aspect.There are four concepts used as theoretic framework in the study, organization, imple-mentation and public middle managers in a general aspect and the middle manager in a municipal care organisation in a specific aspect.
Finns kvinnor i säkerhetspolitik? : En undersökning av den svenska säkerhetiseringsprocessen avseende svenskt deltagande i den militära insatsen Minusma i Mali utifrån ett feministiskt perspektiv
Scientists argue that gender affects foreign policy and security policy, that ideas of gender are inconstant and that there is a lack of feminist perspectives in International Relations. The changes seen in the global security context may have challenged the way politicians and scientists understand war and its impacts, and led to increased gender awareness.Using securitization theory and feminist international relations theory, the aim is to examine how women and men are being spoken of in the Swedish foreign policy discourse regarding participation in the UN-led stabilization mission Minusma in Mali. By applying a feminist perspective on the securitization process, the intention is to increase the knowledge of whether there is gender awareness in this context.The result shows that there is limited gender awareness. There is minor consideration for the conflict?s different implications on the situation for women and men.
Människan och lärarprofessionen : En livsberättelse
The aim of this essay is to get a deeper understanding of a teachers' profession and to get knowledge of how earlier experiences can influence you as a teacher. I have interviewed a female teacher, Pia to get this understanding. As a tool to get the teacher's whole story I used the life story method. In her profession she is influenced by her own importance of security as a child.Her own needs of security has given her an deeper understanding for pupils like herself during the childhood; insecure and afraid. Her understanding for all kinds of behavior among the children has increased by her own experiences.The story shows that Pia is frustrated by the fact that she can't control her own working time.
Koncern som tillväxtinkubator för småföretag : ? En fallstudie i ett shared service centers möjligheter attstödja entreprenöriella småföretag
???Information Technology is an essential part of the society today, not least in large ???organisations dealing with sensitive information. An example of such an organisation is the Swedish Armed Forces which indeed is in the need of ways to ensure information security in their Information Technology systems. The means which is used is an authorisation and accreditation process.All Information Technology systems go through a life cycle which includes realisation, usage, development and liquidation. In the Swedish Armed Forces the lifecycle is an authorisation process.
Veto: En motivanalys av FN:s säkerhetsråds fem permanenta medlemmars agerande i konflikten i Syrien.
Aim: The aim of this study is to analyse the possible motives behind the actions of the five permanent members of the UN Security Council in relation to the conflict in Syria. The background of this aim is the Arab Spring and the protests and violence that have followed the uprising. While, in Libya, the UN Security Council adopted resolutions that allowed sanctions against the Libyan government, no such resolutions have been adopted yet in Syria.Theory: The principal theory of the analysis is Stephen D. Krasner´s theory on sovereignty.Method: I have researched various resolutions and statements done in the Security Council, together with official statements from the actors, through Hadenius´ motive analysis methodology and Gilje & Grimen and Ödmans theories on hermeneutics.Conclusion: The conclusion of the analysis is that there, in the case of Syria and Libya, are two different parties in the Security Council. One that stands for sovereignty and one that stands for intervention.
Utvärdering av Near Field Communication och Certified Wireless USB: Säkerhet vid utveckling av applikationer
Today?s society is one where technological advances are made daily, which
increases the need to stop and assess the risks against users? integrity when
integrating new technology in contemporary systems all the greater. We have
taken two technologies, Near Field Communication and Certified Wireless USB,
whose envisioned area of use is to be integrated into mobile phones, and
evaluated what security threats are revealed for the respective technologies.
The threats against security have been identified through research of the
standards and existing reports for each technology. Practical experiments have
not been conducted on account of us not having access to any equipment to run
such trials.