Sökresultat:
5414 Uppsatser om Network perspective - Sida 5 av 361
Nätverksdemokrati -vad bör, är, kan den vara
The main objective of the essay is to define the meaning of the termgovernance network on the basis of democratic values ? both normative andimperial - with the aim to analyse the prospects to develop an effective anddemocratic governance. Democratic values as well as civil participation,enlightenment, responsibility and approachability are discussed, but also moreeffectivness orientated values.It is clear from the presentation how normative and democracy models putdifferent values in focus, with the consequence that other values are played downor pushed aside. Compared to imperial research in partnership ? by definition atype of network arrangement - and with a starting point in democracy andefficiency, the networks are discussed as political formation.In what sense can the actual existing network arrangements meet and fulfil thedefined political values? As no straight forward answer exists, there is an ongoingconflict between the political demand for slowness and the effectiveness demandfor flexibility and mobility..
Vikten av säkra nätverk
The purpose of this thesis is to show how to use vulnerability testing to identify and search for security flaws in networks of computers. The goal is partly to give a casual description of different types of methods of vulnerability testing and partly to present the method and results from a vulnerability test. A document containing the results of the vulnerability test will be handed over and a solution to the found high risk vulnerabilities. The goal is also to carry out and present this work as a form of a scholarly work.The problem was to show how to perform vulnerability tests and identify vulnerabilities in the organization's network and systems. Programs would be run under controlled circumstances in a way that they did not burden the network.
Barnets talan - en studie om beaktandet av barnperspektiv i den svenska Migrationsdomstolen : / The voice of a child - a study regarding a child perspective in the Migration Court of Law in Sweden
The following essay examines the conditions of whether a child perspective is recognised in the second authority of the new Swedish asylum process, the Migration Court of Law and inquire into the viewpoint of these decision makers as to what a child perspective in this context represents.The method used was a qualitative study that contained interviews with eight respondents, divided into four judges and four jurors. The material gained from the respondents was then analysed by using theories regarding a child perspective and theories that deal with interpretation of a text, ethics and court sociology.A few conditions of whether a child perspective is recognised has been revealed and we also found that the child perspective in theory is a wide perspective, that includes many aspects of how a child is recognised. In practice, however, the child perspective can be divided into two separate perspectives where one of them involves an adults view of a child?s perspective, and the other involves the perspective of a child, the child?s own view of its existence and perceived reality..
En kvalitativ studie om före detta kriminellas upplevelser av stöd och hjälp.
The aim of this study was to examine former criminals? experiences of help and support of importance to leave a criminal life style. The study consists of six interviews with former criminals and earlier studies on the subject. These studies show that relapse in crime are most common among those who are socially excluded from society. They also show that important factors to end a life in criminality are for example a supportive social network.
Att Införa IPv6 i ett IPv4-nätverk
Internet is growing every day and this is leading to an address depletion of the current IPv4 addresses. A new version of IPv4, called IPv6, is the protocol for addressing computers that will deal with this problem. IPv4 and IPv6 are unfortunately not compatible with each other. IPv4 and IPv6 have to co-exist for a long time until IPv6 will be the dominant protocol.The purpose of this thesis is to examine how a transition could be done or more correctly, how to deploy IPv6 in an already existing IPv4 network. After that part of the report a case study at the local Internet service provider Junet AB will be conducted.
How Venture Capitalists can use their Network in order to reduce the Information Asymmetries between themselves and the Venture Management Team
The purpose of this study is to increase the understanding of how venture capitalists can use their network in order to reduce information asymmetries between themselves and the venture management team. A qualitative approach with semi-structured interviews, consisting of open questions, have been used to receive gradate information in order to reach our explorative purpose. Our theoretical framework consists of relevant studies made on the dynamics of networks and the problems that can arise in the complex relationship between a principal and an agent. We have been interviewing two venture capital firms and therepresentatives from two business angel networks. We also made an additional interview with an influential financial actor in order to try to verify our conclusions Our conclusions are that an extensive network can be used by venture capitalists in order to; verify ventures? technologies, complement the competences in the venture management team, and arrange co-investments, resulting in reduced information asymmetries between themselves and the venture management team.
Analys av datakommunikationssäkerhet för VoIP-protokoll
Voice over IP (VoIP) is a relatively new technology that enables voice calls over data networks.With VoIP it is possible to lower expenses, and increase functionality and flexibility. FromSwedish Armed Forces point of view, the security issue is of great importance, why the focus inthis report is on the security aspect of the two most common open-source VoIP-protocols H.323and SIP, some of the most common attacks, and counter-measures for those attacks.Because of the level of complexity with a network running H.323 or SIP, and the fact that it hasyet to stand the same level of trial as of traditional telephony, a VoIP-system includes manyknown security-issues, and probably at present many unknown security flaws.The conclusion is that it takes great knowledge and insight about a VoIP-network based onH.323 or SIP to make the network satisfyingly safe as it is today, and is therefore perhaps not asuitable solution for the Swedish Armed Forces today for their more sensitive communications..
Tillförlitlighet i Stockholms elnät : En analys med hjälp av Tekla NIS
Outages in the electric grid can be costly for society. Because of this, reliability is one of the parameters used to regulate network companies. Reliability in electrical grids can be measured with SAIDI, system average interruption duration index, which for Fortum Distribution has increased in Stockholm?s distribution network (11 kV) in the early 2000?s.By using outage data for Stockholm from 2011-2013, sets of parameters to be used for reliability calculations in the network information program Tekla NIS were derived. Two different options for investment were then analysed: changing old cables with high fault frequencies, and installing automatic switching in distribution substations.
Stress och genusspecifika mönster bland ungdomar : En kvalitativ studie utifrån professionella aktörers upplevelser och erfarenheter av ungdomars stress
The aim of the study was to understand professionals? perceptions and experiences of adolescent stress. In the study I interested myself further if you can identify gender-specific patterns in the professional stories about young people's stress and stress related illness. Five interviews were conducted with professionals in psychiatry and social work. The thesis took its incipience in social constructionism.
Intelligenta Switchar
This master thesis has been carried out on behalf of Stoneridge Electronics AB and is an investigation ofhow intelligent switches can replace the traditionally used direct controlled switches. The concept ofintelligent switches is that the switches contain electronic identification components which, by connectingthem to a network, give the same function independent of the location of the switch. This infers anincreased flexibility and configurability which can be a great advantage in development, production andcustomization in the commercial vehicle industry. Especially in the current situation when commercialvehicle manufacturers provides more and more functions and dashboard configurations.LIN (Local Interconnect Network) is a network protocol introduced in 1999. It is a simpler and lower costcomplement to CAN (Controller Area Network) and is adapted for applications where the demands forbandwidth are lower, for example reading sensors and switchers.
Pratbubblan: den röda tråden : En studie av Karlstads Stadsnäts visuella kommunikation
The purpose of this study is to investigate whether Karlstad City Fiber Network visual elements in the form of a pair of speech bubbles fit into the organization's holistic external communication and branding. The study examines whether Karlstad City Fiber Network image of the organization and the speech bubbles match the stakeholders view and how the visual elements are perceived and recognized by stakeholders. The theory associated with the study is theories of corporate visual identity, image, identity and branding and visual communication. These three elements are important to be aware of when a generation of an effective external communications. Qualitative interviews with employees at Karlstad City Fiber Network and Karlstad municipality has undertaken to give an idea of ??what the organization wants to achieve and what their opinions are.
Anbudskalkyl mer användbar i byggprocessen
This report is written for a consultant networking company with the purpose to review the development ofthe company's remote connections from a user friendly and security perspective.This includes an investigation of the possibilities to consolidate existing authentication methods foraccessing customers. The problem lies in the amount of methods being used. Through case study wefound that smart cards, SMS-service, software and hardware tokens exist.The only method feasible from a security perspective is smart cards. Since the method is not commonlyused by the company's customers a standardization of it would be counterproductive.Also, the purpose of this report is to investigate how the ongoing internal development of the remoteconnection will affect the company's clients. Within this framework we have also verified a designsuggestion.We interpret, after the completion of the case study, that the internal development of the remoteconnection is marginally affected by legal perspectives.
Familjen är den enda vägen tillbaka hem. : En kvalitativ studie om personalens syn på familjens delaktighet i behandling av ungdomar.
ÖREBRO UNIVERSITYDepartment of Behavioural, Social and Legal SciencesProgram of social workSocial Work CC-essay in Social Work, 15 creditsAutumn term 2013The family is the only way back home? A qualitative study on staff?s view on family involvement in the treatment of adolescentsAuthors: Cakici, Nahrin and Claesson, SandraAbstractThe aim of this study is to investigate how the staff at residential treatment centers works to involve the family and the social network in youth?s treatment and how they experience that the involvement affects the young person. The aim is also to study the difficulties the staff experience in their work to involve the family and the social network. In this study, staff from two residential treatment centers in Sweden participated. The study is conducted based in on qualitative method in which four semi-structured telephone interviews and one group interview have been conducted.
"...i en macho-stämpel så ingår det väl inte att plugga.." : En studie om betydelsen av genus och klass i en arbetsökningsprocess
The aim of this thesis is to study a job-searching process and elements that affects it. The elements I have focused on are gender, class and social network. The study is based on interviews and a survey study with students from the educational program of Social work (Socialomsorgsutbildningen), that graduated 3 years ago. Through the survey I have examined their social-background and their job-searching process. The interviews are the main focus in the study.
Nulägesanalys och verifiering av autentiseringsmetoder : En studie på ett konsultbolag i nätverksbranschen
This report is written for a consultant networking company with the purpose to review the development ofthe company's remote connections from a user friendly and security perspective.This includes an investigation of the possibilities to consolidate existing authentication methods foraccessing customers. The problem lies in the amount of methods being used. Through case study wefound that smart cards, SMS-service, software and hardware tokens exist.The only method feasible from a security perspective is smart cards. Since the method is not commonlyused by the company's customers a standardization of it would be counterproductive.Also, the purpose of this report is to investigate how the ongoing internal development of the remoteconnection will affect the company's clients. Within this framework we have also verified a designsuggestion.We interpret, after the completion of the case study, that the internal development of the remoteconnection is marginally affected by legal perspectives.